References
- Y. Ku, O. Choi, K. Kim, T. Shon, M. Hong, H. Yeh, and J.-H. Kim, Two-factor authentication system based on extended OTP mechanism, Int. J. Comput. Math. 90 (12) (2013), pp. 2512–2529.
- M.-Q. Fan, P.-P. Liu, H.-X. Wang, and H.-J. Li, A semi-fragile watermarking scheme for authenticating audio signal based on dual-tree complex wavelet transform and discrete cosine transform, Int. J. Comput. Math. 90 (12) (2013), pp. 2588–2602.
- K. Jeong, Y. Lee, J. Sung, and S. Hong, Improved differential fault analysis on PRESENT-80/128, Int. J. Comput. Math. 90 (2013), pp. 2553–2563.
- Y. Liu, Y.S. Lee, H.-K. Zhang, T.-Y. Wu, and C.-H. Lo, Modelling and simulations for DDoS attacks mitigation in identifier–locator split network, Int. J. Comput. Math. 90 (12) (2013), pp. 2541–2552.
- Y. Lu and J. Li, New forward-secure public-key encryption without random oracles, Int. J. Comput. Math. 90 (12) (2013), pp. 2603–2613.
- J. Song, K. Lee, and H. Lee, Biclique cryptanalysis on lightweight block cipher: HIGHT and Piccolo, Int. J. Comput. Math. 90 (12) (2013), pp. 2564–2580.
- Y.-Y. Chen, Y.-.J Wang, and J.-K. Jan, The design of speedy seamless safe messaging mechanism in VANET, Int. J. Comput. Math. 90 (2013), pp. 2614–2630.
- H. Yi, S. Kim, G. Ma, and J.H. Yi, Elastic password authentication scheme using the Passcell-based virtual scroll wheel, Int. J. Comput. Math. 90 (12) (2013), pp. 2530–2540.
- W.-C. Yau, R.C.-W. Phan, S.-H. Heng, and B.-M. Goi, Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester, Int. J. Comput. Math. 90 (12) (2013), pp. 2581–2587.