4 | -- | 21 | Shihyu Chou, Eric Jui-Lin Lu, Yi-Hui Chen. X-RDR: a role-based delegation processor for web-based information systems |
22 | -- | 33 | Jia Song. Segment-based proxy caching for distributed cooperative media content servers |
34 | -- | 39 | Chuan Zhan, Xianliang Lu, Meng-shu Hou, Xu Zhou. A LVQ-based neural network anti-spam email approach |
40 | -- | 47 | Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak. Hierarchical key management scheme using polynomial interpolation |
48 | -- | 55 | Ting Yi Chang, Min-Shiang Hwang, Wei-Pang Yang. A new multi-stage secret sharing scheme using one-way function |
56 | -- | 62 | Meng-shu Hou, Xianliang Lu, Xu Zhou, Chuan Zhan. A trust model of p2p system based on confirmation theory |
63 | -- | 69 | Xu Zhou, Xianliang Lu, Meng-shu Hou, Chuan Zhan. A speed-based adaptive dynamic parallel downloading technique |
70 | -- | 84 | Ya-Fen Chang, Chin-Chen Chang. An efficient authentication protocol for mobile satellite communication systems |
85 | -- | 89 | Wei-Chi Ku, Min-Hung Chiang, Shen-Tien Chang. Weaknesses of Yoon-Ryu-Yoo s hash-based password authentication scheme |
90 | -- | 96 | Wei-Chi Ku, Shuai-Min Chen. Cryptanalysis of a flexible remote user authentication scheme using smart cards |