5 | -- | 18 | Yongming Xie, Yan Zhang. A secure, service priority-based incentive scheme for delay tolerant networks |
19 | -- | 26 | Mohsen Toorani. Cryptanalysis of a robust key agreement based on public key authentication |
27 | -- | 33 | Mohammad Hossein Faghihi Sereshgi, Mohammad Dakhilalian, Mohsen Shakiba. Biclique cryptanalysis of MIBS-80 and PRESENT-80 block ciphers |
34 | -- | 42 | Changhui Hu, Lidong Han, Siu-Ming Yiu. Efficient and secure multi-functional searchable symmetric encryption schemes |
43 | -- | 53 | Yushu Zhang, Di Xiao, Kwok-Wo Wong, Jiantao Zhou, Sen Bai, Moting Su. Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization |
54 | -- | 59 | Jianhong Zhang, Xubing Zhao, Jian Mao. et al.'s certificateless aggregate signature scheme |
60 | -- | 71 | Xuping Zhang, Feng Ye, Sucheng Fan, Jinghong Guo, Guoliang Xu, Yi Qian. An adaptive security protocol for a wireless sensor-based monitoring network in smart grid transmission lines |