Table of contents for issues of Journal of Discrete Mathematical Sciences and Cryptography

Last update: Wed Sep 3 08:18:59 MDT 2014                Valid HTML 3.2!

Volume 1, Number 1, 1998
Volume 1, Number 2-3, 1998
Volume 2, Number 1, 1999
Volume 2, Number 2-3, 1999
Volume 3, Number 1-3, 2000
Volume 4, Number 1, 2001
Volume 4, Number 2-3, 2001
Volume 5, Number 1, 2002
Volume 5, Number 2, 2002
Volume 5, Number 3, 2002
Volume 6, Number 1, 2003
Volume 6, Number 2-3, 2003
Volume 7, Number 1, 2003
Volume 7, Number 2, 2004
Volume 7, Number 3, 2004
Volume 8, Number 1, 2005
Volume 8, Number 2, 2005
Volume 8, Number 3, 2005
Volume 9, Number 1, 2006
Volume 9, Number 2, 2006
Volume 9, Number 3, 2006
Volume 10, Number 1, February, 2007
Volume 10, Number 2, April, 2007
Volume 10, Number 3, 2007
Volume 10, Number 4, August, 2007
Volume 10, Number 5, October, 2007
Volume 10, Number 6, December, 2007
Volume 11, Number 1, February, 2008
Volume 11, Number 2, April, 2008
Volume 11, Number 3, June, 2008
Volume 11, Number 4, August, 2008
Volume 11, Number 5, October, 2008
Volume 11, Number 6, December, 2008
Volume 12, Number 1, February, 2009
Volume 12, Number 2, April, 2009
Volume 12, Number 3, June, 2009
Volume 12, Number 4, August, 2009
Volume 12, Number 5, October, 2009
Volume 12, Number 6, December, 2009
Volume 13, Number 1, February, 2010
Volume 13, Number 2, April, 2010
Volume 13, Number 3, June, 2010
Volume 13, Number 4, August, 2010
Volume 13, Number 5, October, 2010
Volume 13, Number 6, December, 2010
Volume 14, Number 1, February, 2011
Volume 14, Number 2, April, 2011
Volume 14, Number 3, June, 2011
Volume 14, Number 4, August, 2011
Volume 14, Number 5, October, 2011
Volume 14, Number 6, December, 2011


Journal of Discrete Mathematical Sciences and Cryptography
Volume 1, Number 1, 1998

             Stefano Innamorati   The non-existence of certain large
                                  minimal blocking sets  . . . . . . . . . 1--26
                 Mauro Zannetti   Note on a characterization of projective
                                  planes . . . . . . . . . . . . . . . . . 27--28
            Giuseppe Monaco and   
                 Antonio Monaco   Development of a determinant in function
                                  of the differences among the elements of
                                  each line  . . . . . . . . . . . . . . . 29--47
                   S. K. Prasad   On fuzziness in a probability space  . . 73--77
                V. R. Kulli and   
               B. Janakiram and   
                  Radha R. Iyer   Split bondage numbers of a graph . . . . 79--84
                  Prem Nath and   
                 M. M. Kaur and   
                  Ranjeet Singh   Some derivations of the Shannon entropy  85--100

Journal of Discrete Mathematical Sciences and Cryptography
Volume 1, Number 2-3, 1998

                   R. Ameri and   
                   M. M. Zahedi   Fuzzy direct sum and fuzzy (weakly)
                                  prime and primary subhypermodules  . . . 101--116
             Luigia Berardi and   
                  Fulvio Zuanni   On minimal blocking sets in
                                  non-symmetric designs  . . . . . . . . . 117--125
              Osvaldo Ferri and   
                 Stefania Ferri   Graphic characterization of quadric
                                  cones in a Galois space ${\rm PG}(3,q)$  127--131
                B. Basavanagoud   Quasi-total graphs with crossing numbers 133--142


Journal of Discrete Mathematical Sciences and Cryptography
Volume 2, Number 1, 1999

                 Biagio Palumbo   Classes of arithmetical multiplicative
                                  functions and numerical derivative . . . 1--20
               Lucia Gionfriddo   On the parameter $m_2(h)$ for graphs . . 31--34
        L. Maria Abatangelo and   
                  Manuela Erroi   Uniform 20-sets of class $[0,2,3,4,5]$
                                  in ${\rm AG}(2,7)$ . . . . . . . . . . . 35--44
        Fernando di Gennaro and   
              Salvatore Furneri   On $C_\lambda$ and $F_\lambda$
                                  multiplicative functions in Dirichlet
                                  ring . . . . . . . . . . . . . . . . . . 59--72
                M. H. Al-Towaiq   An improved algorithm for the iterative
                                  refinement method  . . . . . . . . . . . 73--76
                 Nicola Teodori   A characterization of irreducible
                                  configuration $(n_3)$  . . . . . . . . . 77--83

Journal of Discrete Mathematical Sciences and Cryptography
Volume 2, Number 2-3, 1999

            Giuseppe Monaco and   
                 Antonio Monaco   Various genesis of permutations;
                                  determinants; square matrices as
                                  graphical schemes; generalization of
                                  Sarrus' rule and its historical
                                  precedents . . . . . . . . . . . . . . . 141--177
                V. R. Kulli and   
               B. Janakiram and   
                  Radha R. Iyer   The cototal domination number of a graph 179--184
                 D. G. Akka and   
                    M. S. Patil   $2$-minimally nonouterplanar
                                  semitotal-block graphs and total-block
                                  graphs . . . . . . . . . . . . . . . . . 185--196
                 Eugene Spiegel   Algebraic radicals and incidence
                                  algebras . . . . . . . . . . . . . . . . 197--204


Journal of Discrete Mathematical Sciences and Cryptography
Volume 3, Number 1-3, 2000

          Guglielmo Morgari and   
               Oscar Steila and   
                   Michele Elia   On the linear complexity of product
                                  sequences of linear recurring sequences  1--9
          H. Chandrashekhar and   
                     M. Nagaraj   Key-lock pair mechanism for access
                                  control using tribes of Farey fractions  11--22
             Kishore K. Das and   
         Nibedita Bhattacharjee   Some aspects of modified factorial
                                  series distributions . . . . . . . . . . 23--40
               Michele Elia and   
      J. Carmelo Interlando and   
         Reginaldo Palazzo, Jr.   Computing the reciprocal of units in
                                  Galois rings . . . . . . . . . . . . . . 41--55
                 Antonio Maturo   Fuzzy events and their probability
                                  assessments  . . . . . . . . . . . . . . 83--94
          H. Chandrashekhar and   
                     M. Nagaraj   Discrete quaternion Fourier transform in
                                  signal processing systems  . . . . . . . 95--112
                  Ram Ratan and   
                   P. K. Saxena   Image processing based techniques for
                                  securing documents . . . . . . . . . . . 113--129
                S. Arumugam and   
              J. Suresh Suseela   On graphoidal graphs . . . . . . . . . . 131--137
           V. Radhakrishnan and   
           T. C. Venkatesan and   
                 K. Krithivasan   Exact and approximate matching of matrix
                                  languages  . . . . . . . . . . . . . . . 139--156
                  S. K. Pal and   
                   P. K. Saxena   Enhancement of highly noisy speech
                                  signals  . . . . . . . . . . . . . . . . 157--172
            Md. Asim Uddin Khan   The corruption prevention model  . . . . 173--178
                S. Mukhopadhyay   A decision support system for medical
                                  diagnosis  . . . . . . . . . . . . . . . 179--192
            S. Mukhopadhyay and   
                    M. K. Singh   An approximate solution of an unbalanced
                                  transportation problem . . . . . . . . . 193--202
                Michael J. Ryan   The distribution model the more for less
                                  (nothing) paradox and economies of scale
                                  and scope: some nonlinear extensions . . 203--211
              Kun Soo Chang and   
               Sunkyung Kim and   
                         Il Yoo   Translation theorem of conditional
                                  Yeh--Wiener integrals  . . . . . . . . . 213--225
                    H. M. Serag   Distributed control for cooperative
                                  systems governed by Schrodinger operator 227--234
                 M. Bidkham and   
                    K. K. Dewan   Some extremal problems of polynomials    235--242
                 A. Cambini and   
                     L. Martein   Second order optimality conditions . . . 243--252
                   R. C. Mittal   Orthogonal wavelets  . . . . . . . . . . 253--262


Journal of Discrete Mathematical Sciences and Cryptography
Volume 4, Number 1, 2001

              A. Lourdusamy and   
                S. Somasundaram   Pebbling $C_5\times C_5$ using linear
                                  programming  . . . . . . . . . . . . . . 1--15
               M. M. Zahedi and   
         M. R. Khorashadi-Zadeh   Some categoric connections between fuzzy
                                  hypergraphs, subhypergroups, graphs,
                                  subgroups and subsets  . . . . . . . . . 17--32
              Franco Eugeni and   
              Raffaele Mascella   A note on generalized Fibonacci numbers  33--45
                     E. Foundas   Some results of Black's permutations . . 47--55
                V. R. Kulli and   
               B. Janakiram and   
                 Radha. R. Iyer   Regular number of a graph  . . . . . . . 57--64
               Francesco Fabris   Sharpening the Gilbert--Varshamov bound
                                  in the finite case . . . . . . . . . . . 65--75
                  R. Murali and   
                 K. S. Harinath   Laceability and distance graphs  . . . . 77--86
       Hakan Özakta\cs and   
Mustafa Ç. Pìnar and   
         Mustafa Akgül and   
         Tahsin Kurç and   
                 Cevdet Aykanat   An algorithm with long steps for the
                                  simultaneous block projections approach
                                  for the linear feasibility problem . . . 87--108

Journal of Discrete Mathematical Sciences and Cryptography
Volume 4, Number 2-3, 2001

                V. R. Kulli and   
                 Nanda S. Warad   On the total closed neighbourhood graph
                                  of a graph . . . . . . . . . . . . . . . 109--114
            Kuang-hua Hsueh and   
            Patrick S. Chen and   
                  Peter Chu and   
              John Kwan-han Liu   The procedure for synthesizing ratio
                                  judgements . . . . . . . . . . . . . . . 115--120
              Franco Eugeni and   
                 Mauro Zannetti   Generalized configurations . . . . . . . 121--131
                  Andrea Sgarro   Blind coding: authentication frauds from
                                  the point of view of rate-distortion
                                  theory . . . . . . . . . . . . . . . . . 133--150
                V. R. Kulli and   
                  M. S. Biradar   The blict graph and blitact graph of a
                                  graph  . . . . . . . . . . . . . . . . . 151--162
               Yogesh Singh and   
                      C. S. Rai   An information theoretic approach to
                                  blind source separation  . . . . . . . . 163--175
               Yanxun Chang and   
           Giovanni Lo Faro and   
                       Hao Shen   Support sizes of completely decomposable
                                  triple systems . . . . . . . . . . . . . 177--188
               Iiro Honkala and   
                  Tero Laihonen   On the probability of undetected error
                                  for binary codes used for combined
                                  correction and detection . . . . . . . . 189--197


Journal of Discrete Mathematical Sciences and Cryptography
Volume 5, Number 1, 2002

             Alicia Maccari and   
                 Olga Rueda and   
                   Vilma Viazzi   A survey on edge reconstruction of
                                  graphs . . . . . . . . . . . . . . . . . 1--11
               Ira Antonopoulou   A user authentication protocol based on
                                  the intractability of the 3-coloring
                                  problem  . . . . . . . . . . . . . . . . 17--21
                   Ta-Chung Chu   Ranking fuzzy numbers by a ratio of
                                  relative areas . . . . . . . . . . . . . 23--34
              Franco Eugeni and   
                Daniela Tondini   Klein's discrete model: the case of odd
                                  order  . . . . . . . . . . . . . . . . . 35--41
            Rosa Stangarone and   
                 Luisella Verdi   Essentially $s$-fold secure
                                  authentication systems of level $l$  . . 43--50
             Antonio Maturo and   
                 Mauro Zannetti   Rédei blocking sets with two Rédei lines
                                  and quasigroups  . . . . . . . . . . . . 51--62
                      Prem Nath   On determining a representation for
                                  measures of entropy possessing branching
                                  property without assuming symmetry . . . 63--75
              Yi-Shiung Yeh and   
              Chu-Hsing Lin and   
                   Wei-Shen Lai   Construct message authentication code
                                  with SHA and AEA . . . . . . . . . . . . 77--83
               M. M. Zahedi and   
               H. Moradi Kouchi   (Anti-) fuzzy (normal)
                                  sub-$F$-polygroups and fuzzy
                                  $\alpha$-cosets  . . . . . . . . . . . . 85--104

Journal of Discrete Mathematical Sciences and Cryptography
Volume 5, Number 2, 2002

                Cynthia Chi and   
            Daniela Ferrero and   
           Charles Hallford and   
               Rebecca Williams   On the edge sums of de Bruijn graphs . . 105--117
           Giuseppe Gentile and   
              Renato Migliorato   Hypergroupoids and cryptosystems . . . . 119--138
              Osvaldo Ferri and   
             Stefania Ferri and   
          Antonella Giallonardo   On the elliptic quadrics of ${\rm
                                  PG}(2s+1,q)$ . . . . . . . . . . . . . . 139--143
                S. Arumugam and   
            Indra Rajasingh and   
      P. Roushini Leely Pushpam   A note on the graphoidal covering number
                                  of a graph . . . . . . . . . . . . . . . 145--150
           Min-Shiang Hwang and   
             Chao-Chen Yang and   
              Shiang-Feng Tzeng   Improved digital signature scheme based
                                  on factoring and discrete logarithms . . 151--155
     Konstantinos G. Girtis and   
          George A. Tsihrintzis   Diffraction tomographic imaging
                                  algorithms. I. Data models and inversion 157--178
                  Y. P. Chu and   
               W. C. Chiang and   
                Y. H. Huang and   
                      C. L. Lee   A generalized delay allocation model for
                                  rate-based packet scheduling algorithms  179--197
            Chin Ching Chiu and   
                  Yi-Shiung Yeh   A massively parallel algorithm based on
                                  DNA computations for constructing
                                  minimal spanning trees . . . . . . . . . 199--214

Journal of Discrete Mathematical Sciences and Cryptography
Volume 5, Number 3, 2002

             M. L. Aggarwal and   
                 Veena Budhraja   On construction of some new symmetric
                                  and asymmetric orthogonal arrays . . . . 215--225
                 Stefania Ferri   On some type $(1,m,n)_2$ sets of ${\rm
                                  PG}(3,q)$  . . . . . . . . . . . . . . . 227--230
                  Michel Mitton   On maximally nonlinear and extremal
                                  balanced Boolean functions . . . . . . . 231--253
                 E. Foundas and   
               G. Chondrocoukis   Classifications and inferences of
                                  collective preferences . . . . . . . . . 255--280
     Konstantinos G. Girtis and   
          George A. Tsihrintzis   Diffraction tomographic imaging
                                  algorithms. II. Random data inversion
                                  and super-resolution . . . . . . . . . . 281--301


Journal of Discrete Mathematical Sciences and Cryptography
Volume 6, Number 1, 2003

                 T. W. Chen and   
                      J. Y. Lin   Control design based on minimization of
                                  quadratic index with an observer-based
                                  structure  . . . . . . . . . . . . . . . 1--19
                  S. Armeni and   
          D. Christodulakis and   
             I. Kostopoulos and   
            Y. C. Stamatiou and   
                       M. Xenos   Secure information hiding based on
                                  computationally intractable problems . . 21--33
             M. L. Aggarwal and   
                    Seema Gupta   Nested balanced incomplete block designs
                                  derivable from simplex codes . . . . . . 35--44
              Chu-Hsing Lin and   
              Yi-Shiung Yeh and   
                    Chen-Yu Lee   Keyed/unkeyed SHA-2  . . . . . . . . . . 45--58
             M. C. Bhandari and   
                  C. Durairajan   On the covering radius of simplex codes  59--69
                 Stefania Ferri   On the irreducible cubs containing the
                                  maximum number of points of a Fano plane 71--75
                 Mauro Zannetti   A combinatorial characterization of
                                  quadric Veronesean . . . . . . . . . . . 77--82
                D\uanu\ct Marcu   A note on the balanced hypergraphs . . . 83--84
            Hamamache Kheddouci   A dual of $4$-regular graph for $G
                                  \times C_{2n}$ . . . . . . . . . . . . . 85--96
             R. A. Borzooei and   
                 P. Corsini and   
                   M. M. Zahedi   Some kinds of positive implicative hyper
                                  $K$-ideals . . . . . . . . . . . . . . . 97--108

Journal of Discrete Mathematical Sciences and Cryptography
Volume 6, Number 2-3, 2003

                       R. Ameri   On categories of hypergroups and
                                  hypermodules . . . . . . . . . . . . . . 121--132
             Piergiulio Corsini   On Chinese hyperstructures . . . . . . . 133--137
                    Daniel Hort   A construction of hypergroups from
                                  ordered structures and their morphisms   139--150
               Giuseppe Gentile   A note on quasi-Steiner hypergroupoids   151--160
              A. Iranmanesh and   
                 A. H. Babareza   Transposition hypergroups and complement
                                  hypergroups  . . . . . . . . . . . . . . 161--168
           James Jantosciak and   
          Christos G. Massouros   Strong identities and fortification in
                                  transposition hypergroups  . . . . . . . 169--193
               Violeta Leoreanu   Commutative hypergroups associated with
                                  arbitrary hypergroups  . . . . . . . . . 195--198
                 A. Madanshekaf   $H_v$-structures associated with
                                  $PQ$-hyperoperations . . . . . . . . . . 199--205
         Gerasimos G. Massouros   On the attached hypergroups of the order
                                  of an automation . . . . . . . . . . . . 207--215
        Rita Procesi Ciampi and   
                   Rosaria Rota   Polynomials over multiplicative
                                  hyperrings . . . . . . . . . . . . . . . 217--225
             A. Rahnamai Barghi   A class of hyperrings  . . . . . . . . . 227--233
             Thomas Vougiouklis   The $h/v$-structures . . . . . . . . . . 235--243
              Renato Migliorato   Canonical $v$-hypergroups and
                                  $\omega$-hypergroups . . . . . . . . . . 245--256


Journal of Discrete Mathematical Sciences and Cryptography
Volume 7, Number 1, 2003

                 Mauro Zannetti   A combinatorial characterization of Baer
                                  subspaces  . . . . . . . . . . . . . . . 1--3
          Biagio Buccimazza and   
            Bal Kishan Dass and   
                     Sapna Jain   High-density-burst error detection . . . 5--21
               Cheng-Fen Lu and   
               Shiuh-Pyng Shieh   Re-keying algorithms for symmetric
                                  cryptosystems  . . . . . . . . . . . . . 23--27
            Fernando Di Gennaro   Which blocking sets are hypergroups? . . 29--36
               Hannah Chung and   
            Daniela Ferrero and   
                Alan Taylor and   
               Jeremy Warshauer   Diameter of path graphs  . . . . . . . . 49--54
              Wei-Kuei Chen and   
                     Chun-I Fan   Blind one-time signature and its
                                  applications . . . . . . . . . . . . . . 55--69
              Yi-Shiung Yeh and   
                   Ta-Shan Tsui   A concurrent multi-string matching from
                                  multi-text algorithm based on the
                                  algorithm of Hamiltonian path problem
                                  and DNA computation  . . . . . . . . . . 71--96
              R. Selvakumar and   
               P. Balasubramani   Kernel code and its controllability  . . 97--101
                  M. Yamuna and   
                   N. Sridharan   Every $\gamma$-excellent,
                                  $\gamma$-flexible graph is $\gamma_{\rm
                                  bi}$-excellent . . . . . . . . . . . . . 103--110
             Ching-Hung Hsu and   
                  Ming-Chih Lai   A new cipher scheme based on one-way
                                  hash function and IDEA . . . . . . . . . 111--120
                  Yuh-Min Tseng   A cryptographic key assignment scheme
                                  for access control in a hierarchy with
                                  exceptions . . . . . . . . . . . . . . . 121--132

Journal of Discrete Mathematical Sciences and Cryptography
Volume 7, Number 2, 2004

     Konstantinos G. Girtis and   
          George A. Tsihrintzis   Diffraction tomographic imaging
                                  algorithms. III. Angularly limited data  133--159
                  Alberto Amato   Intersections and parallelism in
                                  $P_3$-designs  . . . . . . . . . . . . . 161--166
                  Partha P. Dey   Exploring invariant linear codes through
                                  generators and centralizers  . . . . . . 167--178
                S. Arumugam and   
            Indra Rajasingh and   
      P. Roushini Leely Pushpam   Graphs with unique minimum acyclic
                                  graphoidal cover. I  . . . . . . . . . . 179--186
                 Stefania Ferri   On some singular irreducible cubics of
                                  $\rm PG(2,2)$  . . . . . . . . . . . . . 203--208
      J. Carmelo Interlando and   
                   Michele Elia   On the effective computation of
                                  isomorphisms between
                                  $\sigma_{\mathbb{F}}(\germ
                                  O_{\mathbb{F}}/\germ p)$ and ${\rm
                                  GF}(N_{\mathbb{F}}(\germ p))$  . . . . . 209--225
                  Michel Mitton   Theoretical upper bounds on the covering
                                  radii of Boolean functions . . . . . . . 237--248
              Hera Antonopoulou   On threshold properties  . . . . . . . . 249--254

Journal of Discrete Mathematical Sciences and Cryptography
Volume 7, Number 3, 2004

              Sandro Rajola and   
          Maria Scafati Tallini   The sets of type $(0,n)$ and the Steiner
                                  triple systems in a finite affine plane  261--266
                 Stefania Ferri   Addendum to: ``On some type $(1,m,n)_2$
                                  sets of $\rm PG(3,q)$'' [J. Discrete
                                  Math. Sci. Cryptography 5 (2002), no. 3,
                                  227--230; \refcno 1986732] . . . . . . . 267--269
               Ta-Chung Chu and   
              Kuo-Shi Huang and   
                 Tzu-Ming Chang   COA defuzzification method for
                                  evaluating $C_{pk}$ under fuzzy
                                  environments . . . . . . . . . . . . . . 271--280
               Lin-Chuan Wu and   
              Yi-Shiung Yeh and   
                    Chun-I. Fan   Fail-stop blind signature scheme based
                                  on the integer factorization . . . . . . 281--290
                S. Georgiou and   
                 C. Koukouvinos   New visual cryptographic schemes derived
                                  from orthogonal and mixed orthogonal
                                  arrays . . . . . . . . . . . . . . . . . 291--306
         Ilias S. Kotsireas and   
           Christos Koukouvinos   Inequivalent Hadamard matrices with
                                  buckets  . . . . . . . . . . . . . . . . 307--317
              Marios Poulos and   
            Maria Rangoussi and   
   Vasilios Chrissikopoulos and   
           Agelos Evangelou and   
             Fotis Georgiacodis   Comparative analysis of the
                                  computational geometry and neural
                                  network classification methods for
                                  person identification purposes via the
                                  EEG. I . . . . . . . . . . . . . . . . . 319--347
            Najib A. Kofahi and   
            Turki Al-Somani and   
                Khalid Al-Zamil   Performance study of some symmetric
                                  block cipher algorithms under Linux
                                  operating system . . . . . . . . . . . . 359--370


Journal of Discrete Mathematical Sciences and Cryptography
Volume 8, Number 1, 2005

                Shiuh-Jeng Wang   Vowel-consonant addressing mode on
                                  hashing for English letter-oriented keys 1--25
            Qassem M. Al-Hassan   On inverses of tridiagonal matrices  . . 49--58
           P. Balasubramani and   
                 R. Viswanathan   Characterizations of the
                                  $0$-distributive poset . . . . . . . . . 81--98
                      Prem Nath   On the measurable solutions of some
                                  functional equations useful in
                                  information theory . . . . . . . . . . . 99--115
             Brice Effantin and   
            Hamamache Kheddouci   Exact values for the $b$-chromatic
                                  number of a power complete $k$-ary tree  117--129

Journal of Discrete Mathematical Sciences and Cryptography
Volume 8, Number 2, 2005

           Willi Geiselmann and   
              Rainer Steinwandt   A key substitution attack on ${\rm
                                  SFLASH}^{v3}$  . . . . . . . . . . . . . 137--141
              Rosanna Iembo and   
         Massimo Squillante and   
                    Aldo Ventre   Common fixed points for families of
                                  commutative transformations  . . . . . . 175--188
             C. Koukouvinos and   
                      P. Mantas   Some combinatorial constructions for
                                  optimal mixed-level supersaturated
                                  designs  . . . . . . . . . . . . . . . . 189--201
                Michael Ratiner   The method of S-box construction . . . . 203--215
             V. Swaminathan and   
                    P. Jeyanthi   On super vertex-magic labeling . . . . . 217--224
             Luigia Berardi and   
            Bal Kishan Dass and   
                     Sapna Jain   Bound for solid burst error correction
                                  with Lee weight  . . . . . . . . . . . . 225--235
                 Maurizio Lucci   A combinatorial characterization of two
                                  skew lines . . . . . . . . . . . . . . . 237--239
         Ilias S. Kotsireas and   
           Christos Koukouvinos   Genetic algorithms for the construction
                                  of Hadamard matrices with two circulant
                                  cores  . . . . . . . . . . . . . . . . . 241--250
           Abulimiti Yiming and   
                  Masami Yasuda   A note on properties for a complementary
                                  graph and its tree graph . . . . . . . . 251--259
                 Stefania Ferri   The cubic curves of ${\rm PG}(2,3)$  . . 261--266
                 Maurizio Lucci   On $(q+1)^2$-sets of class $[0,1,m,n]_1$
                                  in ${\rm PG}(4,q)$ . . . . . . . . . . . 267--270
           Vu Dong Tô and   
      Reihaneh Safavi-Naini and   
                    Yejing Wang   $2$-secure codes from $2$-SFP codes  . . 287--304

Journal of Discrete Mathematical Sciences and Cryptography
Volume 8, Number 3, 2005

            Ming-Hsin Chang and   
                  Yi-Shiung Yeh   Proxy signature schemes with time
                                  limitation . . . . . . . . . . . . . . . 305--314
                  Michel Mitton   An analysis and an improvement of
                                  iterative fast correlation attacks . . . 315--342
              Yi-Shiung Yeh and   
                  I-Te Chen and   
                  Chan-Chi Wang   Randomizing encryption mode  . . . . . . 355--364
      N. Shajareh-Pour Salavati   On the generalized permutations  . . . . 365--372
            B. Basavanagoud and   
                Veena N. Mathad   Graph equations for line graphs, blitact
                                  graphs and blict graphs  . . . . . . . . 373--379
              Chen-Ming Fan and   
                     H. J. Shyr   $\delta$-codes and $\delta$-languages    381--394
                    Ngo Dac Tan   On the classification problem for
                                  tetravalent metacirculant graphs . . . . 403--412
            N. Vijayarangan and   
               R. Vijayasarathy   Primitive polynomials testing
                                  methodology  . . . . . . . . . . . . . . 427--435
                    Chih-Yao Lo   The operation of the elliptic curve
                                  cryptology in IPv6 . . . . . . . . . . . 437--446
          Raffaele Mascella and   
                Luca G. Tallini   Combinatorial properties of balanced
                                  codes over the complex $m$-th roots of
                                  unity and efficient coding algorithms    447--458
          Raffaele Mascella and   
                Luca G. Tallini   On efficient high-order spectral-null
                                  codes over the $m$-ary alphabet  . . . . 459--481
                 Brice Effantin   The $b$-chromatic number of power graphs
                                  of complete caterpillars . . . . . . . . 483--502


Journal of Discrete Mathematical Sciences and Cryptography
Volume 9, Number 1, 2006

                 A. Suganya and   
                N. Vijayarangan   Landau--Ramanujan keyed hash functions
                                  for message authentication . . . . . . . 1--8
        Sucheta Chakrabarti and   
                   R. K. Khanna   A new visual cryptography scheme for STS
                                  based access structures  . . . . . . . . 9--23
                   Michele Elia   Representation of primes as the sums of
                                  two squares in the golden section
                                  quadratic field  . . . . . . . . . . . . 25--37
               Matteo Gaeta and   
             Gerardo Iovane and   
                Enver Sangineto   A $3$D geometric approach to face
                                  detection and facial expression
                                  recognition  . . . . . . . . . . . . . . 39--53
                    Jinhua Wang   The spectrum of nested group divisible
                                  designs of type $t^n$  . . . . . . . . . 55--65
           S. Soma Sundaram and   
               A. Nagarajan and   
            M. Anantha Krishnan   Path point cover . . . . . . . . . . . . 67--71
               Doost Ali Mojdeh   On the extending of $k$-regular graphs
                                  and their strong defining spectrum . . . 73--86
           Yung-Tsang Chang and   
               Jung-Hua Hsu and   
                       S. S. Yu   A sublinear time string prefix square
                                  detection algorithm  . . . . . . . . . . 87--95
                    T. Alderson   Some generalizations of Rédei's theorem   97--106
             H. Evangelaras and   
                 C. Koukouvinos   New light on certain two level designs
                                  using Gröbner bases . . . . . . . . . . . 107--124
             H. Evangelaras and   
             C. Koukouvinos and   
                      E. Lappas   An efficient algorithm for the
                                  identification of isomorphic orthogonal
                                  arrays . . . . . . . . . . . . . . . . . 125--132
            Chin-Chen Chang and   
                   Jung-San Lee   An anonymous and flexible $t$-out-of-$n$
                                  electronic voting scheme . . . . . . . . 133--151
           Cheng-Hsing Yang and   
                Shiuh-Jeng Wang   Weighted bipartite graph for locating
                                  optimal LSB substitution for secret
                                  embedding  . . . . . . . . . . . . . . . 153--164
                  Yu-Kuang Zhao   A characterization of prefix $n$-power
                                  words  . . . . . . . . . . . . . . . . . 165--176
           Doost Ali Mojdeh and   
               Nader Jafari Rad   Connected geodomination in graphs  . . . 177--186
          Raffaele Mascella and   
                Luca G. Tallini   Theory and design of $m$-ary balanced
                                  codes which are invariant under symbol
                                  permutation  . . . . . . . . . . . . . . 187--200

Journal of Discrete Mathematical Sciences and Cryptography
Volume 9, Number 2, 2006

               M. M. Zahedi and   
                   L. Torkzadeh   A classification of hyper $K$-algebras
                                  of order $3$ . . . . . . . . . . . . . . 201--213
   Bala Shanthi Karunagaram and   
              J. Paulraj Joseph   On domination parameters and maximum
                                  degree of a graph  . . . . . . . . . . . 215--223
                H. Ahrabian and   
              A. Nowzari-Dalini   Parallel generation of $t$-ary trees
                                  with ballot-sequences  . . . . . . . . . 225--234
                Ngo Dac Tan and   
             Chawalit Iamjaroen   A necessary condition for maximal
                                  nonhamiltonian Burkard--Hammer graphs    235--252
           M. Sethumadhavan and   
           C. Yogha Lakxmie and   
              C. Vijayagovindan   A construction of $p$-ary balanced
                                  sequence with large $k$-error linear
                                  complexity . . . . . . . . . . . . . . . 253--261
                Paul Manuel and   
              Bharati Rajan and   
            Indra Rajasingh and   
                M. Chris Monica   Landmarks in torus networks  . . . . . . 263--271
                 Stefania Ferri   The singular absolutely irreducible
                                  cubics of $\rm PG(2,3)$  . . . . . . . . 291--305
         Shigeichi Hirasawa and   
                 Masao Kasahara   Exponential error bounds and decoding
                                  complexity for block concatenated codes
                                  with tail biting trellis inner codes . . 307--320
              Yi-Shiung Yeh and   
                  I-Te Chen and   
              Ting-Yu Huang and   
                  Chan-Chi Wang   Dynamic extended DES . . . . . . . . . . 321--330
                S. Georgiou and   
             C. Koukouvinos and   
                      E. Lappas   Extremal doubly-even self-dual codes
                                  from Hadamard matrices . . . . . . . . . 331--339
             H. Evangelaras and   
                 C. Koukouvinos   Interaction detection in Latin and
                                  hyper-Latin squares  . . . . . . . . . . 341--348
                Laurent Poinsot   Bent functions on a finite nonabelian
                                  group  . . . . . . . . . . . . . . . . . 349--364
             C. Koukouvinos and   
                  P. Mantas and   
                   S. Stylianou   A block-stepwise method for analyzing a
                                  specific type of supersaturated designs  383--402

Journal of Discrete Mathematical Sciences and Cryptography
Volume 9, Number 3, 2006

            A. Anto Kinsley and   
                S. Somasundaram   Domination based algorithm to $k$-center
                                  problem  . . . . . . . . . . . . . . . . 403--416
                  Michel Mitton   On the Walsh--Fourier analysis of
                                  Boolean functions  . . . . . . . . . . . 429--439
                Ching-Jing Kung   32-bit multipliers for linear
                                  congruential random number generators    441--448
            Shiuh-Jeng Wang and   
                    Pei-Shun Hu   Key management for pay-TV broadcast
                                  systems in hierarchy . . . . . . . . . . 449--476
              Andrea Sgarro and   
                Luca Bortolussi   Codeword distinguishability in minimum
                                  diversity decoding . . . . . . . . . . . 487--502
             H. Evangelaras and   
             C. Koukouvinos and   
                      K. Mylona   On Hadamard embeddability  . . . . . . . 503--512
      Koduganti Venkata Rao and   
                 P. S. Avadhani   Authentication based on wavelet
                                  transformations  . . . . . . . . . . . . 513--521
            Chin-Chen Chang and   
                    Jen-Ho Yang   An efficient ID-based user
                                  identification scheme for mutual
                                  authentication in mobile environments    537--548
               Ya-Fen Chang and   
            Chin-Chen Chang and   
                   Chia-Lin Kao   Comments on WLT attack on an enhanced
                                  timestamp-based password authentication
                                  scheme . . . . . . . . . . . . . . . . . 549--555
                 R. Butkote and   
                     K. Denecke   Characterization of sets of discrete
                                  functions by algebraic identities  . . . 557--572
            Chin-Chen Chang and   
                   Jung-San Lee   Security enhancement of Yang--Li
                                  hierarchical access control mechanism    573--582
                  C. S. Gan and   
                      V. C. Koo   Enumerations of the maximum rectilinear
                                  crossing numbers of complete and
                                  complete multi-partite graphs  . . . . . 583--590


Journal of Discrete Mathematical Sciences and Cryptography
Volume 10, Number 1, February, 2007

              Yi-Shiung Yeh and   
              Ting-Yu Huang and   
                  I-Te Chen and   
                 Shih-Chin Chou   Analyze SHA-1 in message schedule  . . . 1--7
            Jörn Quistorff   Fundamentals of coding type problems . . 9--39
                   R. Ameri and   
                    H. Hedayati   On $k$-hyperideals of semihyperrings . . 41--54
                   R. Ameri and   
                    H. Hedayati   On $k$-hyperideals of semihyperrings . . 41--54
                 Yas Alsultanny   Systematic approach for image
                                  partitioning and shuffling . . . . . . . 55--71
           A. V. N. Krishna and   
            S. N. N. Pandit and   
                 A. Vinaya Babu   A generalized scheme for data encryption
                                  technique using a randomized matrix key  73--81
        V. Barrera-Figueroa and   
            J. Sosa-Pedroza and   
        J. López-Bonilla   Numerical approach to King's analytical
                                  study for circular loop antenna  . . . . 83--92
            Ya-Fen F. Chang and   
         Chin-Chen C. Chang and   
               Yi-Fang F. Cheng   Robust non-interactive $t$-out-of-$n$
                                  oblivious transfer based on the RSA
                                  cryptosystem . . . . . . . . . . . . . . 93--109
     Mohamed Hussain Al-Ibrahim   A designated verifier signature using
                                  secret sharing technique . . . . . . . . 111--123
                Israt Jahan and   
        Mohammad Zahidur Rahman   A realistic divisible transferable
                                  electronic cash for general use  . . . . 125--150

Journal of Discrete Mathematical Sciences and Cryptography
Volume 10, Number 2, April, 2007

         M. Borges-Quintana and   
       M. A. Borges-Trenard and   
      E. Mart\'ìnez-Moro   On a Gröbner bases structure associated
                                  to linear codes  . . . . . . . . . . . . 151--191
             Chia-Chi C. Wu and   
             Chin-Chen C. Chang   Attacks on provably secure
                                  proxy-protected signature schemes based
                                  on factoring . . . . . . . . . . . . . . 193--204
                     J. Ratsaby   Dimension and Boolean functions with
                                  long runs  . . . . . . . . . . . . . . . 205--225
                   Joel Ratsaby   On the VC-dimension and Boolean
                                  functions with long runs . . . . . . . . 205--225
           Hsiao-Lih L. Jen and   
          Tai-Chang C. Hsia and   
                 M. Babul Hasan   A study of methods for construction of
                                  balanced incomplete block design . . . . 227--243
            A. P. Santhakumaran   Periphery with respect to cliques in
                                  graphs . . . . . . . . . . . . . . . . . 245--254
                S. Georgiou and   
             C. Koukouvinos and   
                      E. Lappas   Self-dual codes over some prime fields
                                  constructed from skew-Hadamard matrices  255--266
       Debdeep Mukhopadhyay and   
         Dipanwita RoyChowdhury   Fault based attack of the Rijndael
                                  cryptosystem . . . . . . . . . . . . . . 267--290
                   Meena Kumari   Indices to measure the cryptographic
                                  strength of S-box  . . . . . . . . . . . 291--312

Journal of Discrete Mathematical Sciences and Cryptography
Volume 10, Number 3, 2007

       Sotiria Antonopoulou and   
        Yannis C. Stamatiou and   
              Malvina Vamvakari   An asymptotic expansion for the
                                  $q$-binomial series using singularity
                                  analysis for generating functions  . . . 313--328
            S. Antonopoulou and   
            Y. C. Stamatiou and   
                   M. Vamvakari   An asymptotic expansion for the
                                  $q$-binomial series using singularity
                                  analysis for generating functions  . . . 313--328
            M. Thiyagarajan and   
                      N. Sairam   Verification of the correctness of
                                  compiler optimization using co-induction 329--349
            Jung-San S. Lee and   
             Chin-Chen C. Chang   Security enhancement of key
                                  authentication schemes based on discrete
                                  logarithms . . . . . . . . . . . . . . . 351--358
                     S. J. Wang   Information hiding at oblivious
                                  watermarking scheme upon alternative
                                  threshold in spatial domains . . . . . . 359--384
                     V. Longani   An algorithm for finding the number of
                                  shortest routes on square lattices . . . 385--393
                  Vites Longani   An algorithm for partitioning an integer
                                  $n$ as a sum of $k$ positive integers    395--399
                 Jorma Jormakka   On finding Fermat's pairs  . . . . . . . 401--413
        A. P. Santhakumaran and   
                        J. John   Edge geodetic number of a graph  . . . . 415--432
          Y. B. Maralabhavi and   
         Venkanagouda M. Goudar   Lict edge semientire graph of a planar
                                  graph  . . . . . . . . . . . . . . . . . 433--438
                G. Laccetti and   
                      G. Schmid   Brute force attacks on hash functions    439--460

Journal of Discrete Mathematical Sciences and Cryptography
Volume 10, Number 4, August, 2007

                Paul Manuel and   
              Kalim Qureshi and   
             Albert William and   
              Albert Muthumalai   VLSI layout of Benes networks  . . . . . 461--472
              Jean-Lue L. Baril   Hamiltonian paths for involutions in the
                                  square of a Cayley graph . . . . . . . . 473--484
                  Lila Kari and   
             Kalpana Mahalingam   $k$-involution codes and related sets    485--503
                    L. Kari and   
                  K. Mahalingam   $k$-involution codes and related sets    485--503
             B. Chaluvaraju and   
                    N. D. Soner   Complementary total domination in graphs 505--516
            A. P. Shanthini and   
              A. Antonysamy and   
               T. Tamil Chelvam   User-friendly genetic algorithm  . . . . 517--536
               Aminu A. Ibrahim   A counting scheme and some algebraic
                                  properties of a class of special
                                  permutation patterns . . . . . . . . . . 537--546
                  C. C. Lee and   
                M. S. Hwang and   
                      C. W. Lin   An efficient multi-round anonymous
                                  auction protocol . . . . . . . . . . . . 547--557
           Stephanie Deacon and   
      Eduardo Dueñez and   
             José Iovino   A public-key threshold crypto system
                                  based on residue rings . . . . . . . . . 559--571
           Robert H.-J. Lin and   
               Chih-Pin Yen and   
              Peter S. Deng and   
                  K.-C. Fan and   
       Jennifer Shu-Jen Lin and   
                      Peter Chu   Analysis of the $\epsilon$-algorithm to
                                  accelerate the convergence . . . . . . . 573--580
              Jean Dayantis and   
Jean-François F. Palierne   A search for primes from lesser primes   581--602

Journal of Discrete Mathematical Sciences and Cryptography
Volume 10, Number 5, October, 2007

         Chin-Chen C. Chang and   
            Chia-Yin Y. Lee and   
                   Yu-Wei W. Su   A mutual authenticated key agreement
                                  scheme over insecure networks  . . . . . 603--612
                V. R. Kulli and   
                     R. R. Iyer   Inverse total domination in graphs . . . 613--620
            F. O. Ikpotokin and   
                 S. C. Chiemeke   Mathematical derivation of the multi-peg
                                  Tower of Hanoi algorithm . . . . . . . . 621--636
            M. R. Darafsheh and   
                     Y. Farjami   Calculating the set of orders of
                                  elements in the finite linear groups . . 637--653
               Hon-Chan C. Chen   A simple optimal parallel algorithm for
                                  constructing a spanning tree of a
                                  trapezoid graph  . . . . . . . . . . . . 655--660
             B. Jaya Prasad and   
          T. Tamizh Chelvam and   
       S. Robinson Chellathurai   Private domination number of a graph . . 661--666
          T. Tamizh Chelvam and   
                 B. Jaya Prasad   Common point domination number . . . . . 667--676
        A. P. Santhakumaran and   
                        J. John   The edge Steiner number of a graph . . . 677--696
          P. Vasudeva Reddy and   
               M. Padmavathamma   An authenticated key exchange protocol
                                  in elliptic curve cryptography . . . . . 697--705
                 F. J. Ogwu and   
                   M. Talib and   
                G. A. Aderounmu   The performance of TCP/IP over wireless
                                  ATM network  . . . . . . . . . . . . . . 707--720
                 R. Sweetly and   
              J. Paulraj Joseph   Radio number of graphs of diameter three 721--730

Journal of Discrete Mathematical Sciences and Cryptography
Volume 10, Number 6, December, 2007

       S. V. Sathyanarayana and   
           M. Aswatha Kumar and   
                K. N. Hari Bhat   Generation of pseudorandom sequence over
                                  elliptic curve group and their
                                  properties . . . . . . . . . . . . . . . 731--747
                  K. S. Hsu and   
                R. C. Soong and   
                 K. C. Chen and   
                      T. S. Lan   A computerized approach to the design of
                                  automobile suspension system . . . . . . 749--761
             Luigia Berardi and   
                 Manuela Romani   On the size of a blocking set in a
                                  symmetric design . . . . . . . . . . . . 763--774
              Osvaldo Ferri and   
                 Stefania Ferri   A remark on the Segr\`e theorem  . . . . 775--778
               Jyoti Saxena and   
                  C. S. Rai and   
                   P. K. Bansal   ICA based GSIC receiver for multirate
                                  DS-CDMA systems  . . . . . . . . . . . . 779--792
                Laurent Poinsot   Perfect nonlinear S-boxes on the
                                  real-line  . . . . . . . . . . . . . . . 793--813
              M. Seenivasan and   
              A. Lourdusamy and   
      M. Ravi \@Ramasubramanian   Triangular mean labeling of graphs . . . 815--822
                 Stefania Ferri   On some graphic characterizations of
                                  cubic curves in ${\rm PG}(2, 2)$ and in
                                  ${\rm PG}(2, 3)$ . . . . . . . . . . . . 823--843
                      Anonymous   Index of Volume 10 . . . . . . . . . . . 845--850


Journal of Discrete Mathematical Sciences and Cryptography
Volume 11, Number 1, February, 2008

                     N. S. Babu   On perfect codes in rank distance  . . . 1--11
                       D. Marcu   A generalization of a result of A. Renyi 13--17
                       D. Marcu   A study on the $k$-ordered Hamiltonian
                                  graphs . . . . . . . . . . . . . . . . . 19--31
                Y. F. Huang and   
                      K. L. Wen   Weighting analysis by using grey method  33--58
                      H. Om and   
                       R. Patwa   Affine transformation in cryptography    59--65
                  G. Ghiani and   
                   E. Manni and   
                       C. Triki   The lane covering problem with time
                                  windows  . . . . . . . . . . . . . . . . 67--81
                  G. Iovane and   
                   E. Sangineto   LICoS: Landmark-based Identikit
                                  Composition and Suspect Retrieval  . . . 83--98
                  C. I. Hou and   
                   C. Y. Lo and   
                      J. H. Leu   A digital application of data encryption 99--111
                 E. Foundas and   
                 Ch. Lytras and   
                    C. Patsakis   Improved algorithms for the calculation
                                  of Fibonacci numbers . . . . . . . . . . 113--120

Journal of Discrete Mathematical Sciences and Cryptography
Volume 11, Number 2, April, 2008

               R. H. J. Lin and   
                    G. Jung and   
               J. S. J. Lin and   
                         P. Chu   Further analysis on matrix operation of
                                  AHP  . . . . . . . . . . . . . . . . . . 121--130
               C. Hong-Song and   
                  Z. Jianyu and   
                   H. W. J. Lee   A novel NP-based security scheme for
                                  AODV routing protocol  . . . . . . . . . 131--145
                  A. Juarna and   
                  V. Vajnovszki   Combinatorial isomorphism between
                                  Fibonacci classes  . . . . . . . . . . . 147--158
                    A. A. Kanso   Mixer --- a new stream cipher  . . . . . 159--179
                 E. Foundas and   
                C. Patsakis and   
               G. Chondrocoukis   Lucas permutations and some notes on
                                  Fibonacci permutations . . . . . . . . . 181--190
                      M. Mitton   Boolean functions of $n$ variables and
                                  permutations on $F_n$  . . . . . . . . . 191--200
                      M. Mitton   Minimal polynomial of Cayley graph
                                  adjacency matrix for Boolean functions   201--207
              P. T. Artikis and   
                  C. T. Artikis   Random sums of integral part models in
                                  computer systems operations  . . . . . . 209--217
                M. Sundaram and   
                  R. Ponraj and   
                S. Somasundaram   On graph labeling parameters . . . . . . 219--229
            M. K. Viswanath and   
                   A. R. Deepti   An improvised version of Hill's cipher   231--237
                  R. Ponraj and   
                S. Somasundaram   Mean labeling of graphs obtained by
                                  identifying two graphs . . . . . . . . . 239--252

Journal of Discrete Mathematical Sciences and Cryptography
Volume 11, Number 3, June, 2008

                T. L. Huang and   
                  C. W. Liu and   
                 C. C. Chao and   
                  K. T. Lee and   
                T. Y. Hwang and   
                    C. M. Chung   Upper core point detection using
                                  improved ant colony optimization
                                  algorithm  . . . . . . . . . . . . . . . 253--265
                M. I. Islam and   
              M. Zulhasnine and   
                     M. R. Amin   Performance evaluation of rake receiver
                                  of DS-CDMA under AWGN environments . . . 267--279
                  Y. S. Kim and   
                    J. H. Chang   A proxy fail-stop signature scheme with
                                  proxy revocation . . . . . . . . . . . . 281--295
           M. Sethumadhavan and   
                  M. Sindhu and   
              C. Srinivasan and   
                     C. Kavitha   An algorithm for $k$-error joint linear
                                  complexity of binary multisequences  . . 297--304
                 H. Ibrahim and   
                   R. Ramli and   
                   M. H. Hassan   Combinatorial design for a conference:
                                  constructing a balanced three-parallel
                                  session schedule . . . . . . . . . . . . 305--317
                   Y. Kumar and   
                   N. R. Pillai   On shift sequences for interleaved
                                  construction of signal sets with low
                                  correlation  . . . . . . . . . . . . . . 319--331
                      A. K. Das   An unconditionally secure location-aware
                                  key management scheme for static sensor
                                  networks . . . . . . . . . . . . . . . . 333--355
             S. Chakrabarti and   
                      S. K. Pal   A new online extended visual
                                  cryptography scheme for STS access
                                  structures . . . . . . . . . . . . . . . 357--374

Journal of Discrete Mathematical Sciences and Cryptography
Volume 11, Number 4, August, 2008

                  Y. S. Yeh and   
                  M. C. Kao and   
                      W. S. Lai   The orthogonal signature . . . . . . . . 375--384
                 C. C. Wang and   
                  M. C. Kao and   
                      Y. S. Yeh   Low information leakage random padding
                                  scheme for block encryption  . . . . . . 385--391
                A. K. Verma and   
                    M. Dave and   
                    R. C. Joshi   DNA cryptography: a novel paradigm for
                                  secure routing in Mobile Ad hoc Networks
                                  (MANETs) . . . . . . . . . . . . . . . . 393--404
                  N. Glinos and   
                Y. C. Stamatiou   On the equivalence between random graph
                                  models . . . . . . . . . . . . . . . . . 405--419
             J. J. Jesintha and   
                  G. Sethuraman   A new class of graceful rooted trees . . 421--435
                R. E. Atani and   
                S. E. Atani and   
                S. Mirzakuchaki   Public key cryptography using semigroup
                                  actions and semirings  . . . . . . . . . 437--445
                 R. Procesi and   
                        R. Rota   Multiplicative HV-rings and
                                  complementary hyperstructures  . . . . . 447--456
                       S. Ferri   Graphic characterizations of twisted
                                  cubic in ${\rm PG}(3, q)$  . . . . . . . 457--460
                       D. Marcu   An approximate chromatic number of a
                                  graph  . . . . . . . . . . . . . . . . . 461--464
                     G. Ikorong   A reformulation of the Goldbach
                                  conjecture . . . . . . . . . . . . . . . 465--469
                  S. Mathew and   
                    K. P. Jacob   JERIM-320: a 320-bit hash function with
                                  dual applications --- a statistical
                                  analysis . . . . . . . . . . . . . . . . 471--482
                       L. Clark   Ascents and descents in random trees . . 483--492
                    M. Basu and   
             Md. M. Rahaman and   
                      S. Bagchi   $3-(2m, 2m | 1, 2m | 2 | 1)$ design for
                                  first order Reed--Muller code $R(1,m)$   493--500

Journal of Discrete Mathematical Sciences and Cryptography
Volume 11, Number 5, October, 2008

                     N. Han and   
                       Z. Liang   On the graceful permutation graphs
                                  conjecture . . . . . . . . . . . . . . . 501--526
                  H. Azanchiler   Extension of line-splitting operation
                                  from graphs to binary matroids . . . . . 527--536
                      O. Khadir   Algorithm for factoring some RSA and
                                  Rabin moduli . . . . . . . . . . . . . . 537--543
                  C. Y. Lee and   
                      W. S. Lai   Extended DSA . . . . . . . . . . . . . . 545--550
                       S. Ferri   On the non singular quartics of ${\rm
                                  PG}(2, 3)$ . . . . . . . . . . . . . . . 551--558
              K. A. Germina and   
                K. Abhishek and   
                   K. L. Princy   Further results on set-valued graphs . . 559--566
                    P. H. Huang   A study of applying parallel THBL
                                  algorithm to a fighter plane system  . . 567--577
           S. S. Dhenakaran and   
           E. R. Naganathan and   
               C. Ganesamoorthy   Multiple symmetric keys using Banach
                                  fixed point theorem  . . . . . . . . . . 579--587
                 P. Chandra and   
                R. K. Singh and   
                       Y. Singh   Generation of mutants for Boolean
                                  expression . . . . . . . . . . . . . . . 589--607
                    H. T. Chang   Mathematical development and analysis to
                                  conflict resolution  . . . . . . . . . . 609--618
                      Anonymous   Errata: Volume 11 Number 5 . . . . . . . 619

Journal of Discrete Mathematical Sciences and Cryptography
Volume 11, Number 6, December, 2008

                  P. P. Dey and   
                 M. Asifuzzaman   A note on the code of projective plane
                                  of order four  . . . . . . . . . . . . . 621--637
                     F. Guo and   
                      Y. Mu and   
                        Z. Chen   Multi-identity management for
                                  identity-based cryptography  . . . . . . 639--672
                  M. Sharma and   
                M. K. Kowar and   
                      M. Sharma   An improved evolutionary algorithm for
                                  secured image using adaptive genetic
                                  algorithm  . . . . . . . . . . . . . . . 673--683
                  L. Cinque and   
                  G. Iovane and   
                   E. Sangineto   Comparing SIFT and LDA based face
                                  recognition approaches . . . . . . . . . 685--704
                     S. Mou and   
               Md. I. Islam and   
                     M. R. Amin   Dynamic channel allocation in mobile
                                  cellular networks  . . . . . . . . . . . 705--714
   Ikorong Anouk Gilbert Nemron   An original abstract over the twin
                                  primes, the Goldbach conjecture, the
                                  friendly numbers, the perfect numbers,
                                  the Mersenne composite numbers, and the
                                  Sophie Germain primes  . . . . . . . . . 715--726
              M. Seenivasan and   
                  A. Lourdusamy   Vertex equitable labeling of graphs  . . 727--735
                  L. Navaei and   
                    R. Dayanian   Hidden message via hypothesis testing
                                  and information --- theoretic model  . . 737--746
                      Anonymous   Index of Volume 11 (2008)  . . . . . . . 747--752


Journal of Discrete Mathematical Sciences and Cryptography
Volume 12, Number 1, February, 2009

                  G. Iovane and   
                G. Ingenito and   
                       M. Leone   Motion tracking using fuzzy logic and
                                  consistent labeling for multiple objects
                                  in multiple cameras vision . . . . . . . 1--42
                   A. P. Kazemi   Geodomination in graphs II . . . . . . . 43--50
               Md. I. Islam and   
                      J. K. Das   Performance comparison of two and three
                                  beam SDMA traffic in mobile cellular
                                  network  . . . . . . . . . . . . . . . . 51--61
          T. Sitthiwiratham and   
                   C. Promsakon   Planarity of joined graphs . . . . . . . 63--69
                     V. Longani   Applications of Polya's theorem to
                                  distribution problems and partitions of
                                  integers . . . . . . . . . . . . . . . . 71--77
                   Q. Al-Hassan   On inverses of pentadiagonal matrices    79--91
           A. N. Ghameshlou and   
           S. M. Sheikholeslami   Signed (total) domination numbers and
                                  Laplacian spectrum of graphs . . . . . . 93--99
                S. Settepanella   Blocking sets in the complement of
                                  hyperplane arrangements in projective
                                  space  . . . . . . . . . . . . . . . . . 101--107
              A. Lourdusamy and   
                C. Muthulakshmi   Generalized $t$-pebbling number of a
                                  graph  . . . . . . . . . . . . . . . . . 109--120

Journal of Discrete Mathematical Sciences and Cryptography
Volume 12, Number 2, April, 2009

                       A. Nitaj   Application of ECM to a class of RSA
                                  keys . . . . . . . . . . . . . . . . . . 121--137
                    M. Saha and   
                D. Roychowdhury   Provably secure key establishment
                                  protocol using one-way functions . . . . 139--158
                  A. Lizzio and   
                    M. A. Munda   Maximum embedding of a ${\rm E2}(v - w,
                                  4, 1)$ into a ${\rm P}(v, 4, e)$ . . . . 159--166
             M. Sattanathan and   
                        R. Kala   Degree prime graph . . . . . . . . . . . 167--173
                Y. Cengellenmis   The gray image of the cyclic codes over
                                  ${IF2}[u] / u_2 - 1$ . . . . . . . . . . 175--178
              T. T. Chelvam and   
             S. R. Chellathurai   A note on split domination number of a
                                  graph  . . . . . . . . . . . . . . . . . 179--186
                       S. Ferri   On class $[m, n]1k$-sets in ${\rm PG}(2,
                                  3)$  . . . . . . . . . . . . . . . . . . 187--191
                Y. S. Pawar and   
                    P. V. Patil   Semiprime elements and relative
                                  annihilators in multiplicative lattices  193--204
              C. T. Artikis and   
                  P. T. Artikis   Integral part models in information
                                  systems and educational processes  . . . 205--215
                   C. C. Wu and   
                   Y. L. Wu and   
                     P. C. Yang   Multiple attribute decision making
                                  assessment on the notebook computer
                                  industry performance . . . . . . . . . . 217--237
                Y. Cengellenmis   On $(1 - u_2)$-cyclic and cyclic codes
                                  over ${\rm IF}p + u{\rm IF}p + u_2{\rm
                                  IF}p$  . . . . . . . . . . . . . . . . . 239--243
                A. Elumalai and   
                  G. Sethuraman   Gracefulness of union of cycle with
                                  parallel chords and complete bipartite
                                  graphs or paths  . . . . . . . . . . . . 245--252

Journal of Discrete Mathematical Sciences and Cryptography
Volume 12, Number 3, June, 2009

              L. J. Rozario and   
                   Md. I. Islam   Performance estimation of call admission
                                  control schemes based voice/data
                                  integrated wireless cellular network
                                  with customer retrials . . . . . . . . . 253--294
            B. Basavanagoud and   
                 K. G. Mirajkar   On permanent graphs  . . . . . . . . . . 295--311
               E. S. Ismail and   
             N. M. F. Tahat and   
                    R. R. Ahmad   A new signature scheme based on
                                  factoring and discrete logarithms  . . . 313--318
                      N. J. Rad   A note on $y L / t$-vertex critical
                                  graphs . . . . . . . . . . . . . . . . . 319--322
                      M. Mitton   On Boolean bent functions  . . . . . . . 323--333
              C. T. Artikis and   
                  P. T. Artikis   Discrete random sums in processes of
                                  systemics arising in cybernetics and
                                  informatics  . . . . . . . . . . . . . . 335--345
                   Z. Liang and   
                        S. Yang   On DRC covering --- a survey . . . . . . 347--351
              R. Padmavathy and   
                    C. Bhagvati   Performance analysis of index calculus
                                  method . . . . . . . . . . . . . . . . . 353--371
                    R. Kala and   
              T. R. N. Vasantha   Restrained bondage number of a graph . . 373--380

Journal of Discrete Mathematical Sciences and Cryptography
Volume 12, Number 4, August, 2009

                   Z. Liang and   
                        J. Wang   Constructions of optimal packing and
                                  covering of the complete multigraph with
                                  applications . . . . . . . . . . . . . . 381--410
                S. Alikhani and   
                     Y. H. Peng   Dominating sets of centipedes  . . . . . 411--428
              S. R. Hutsell and   
                G. W. Greenwood   Efficient algebraic representation of
                                  quantum circuits . . . . . . . . . . . . 429--449
                      H. Om and   
                   T. K. Sarkar   Neural network based intrusion detection
                                  system for detecting changes in hardware
                                  profile  . . . . . . . . . . . . . . . . 451--466
                 V. Vilfred and   
                 C. Jayasekaran   Interchange similar self vertex
                                  switchings in graphs . . . . . . . . . . 467--480
              B. D. Acharya and   
              K. A. Germina and   
               K. L. Princy and   
                      S. B. Rao   Embedding and NP-completeness theorems
                                  for set-graceful, topologically
                                  set-graceful and set-sequential graphs   481--487
                   A. P. Kazemi   On the domination number of some graphs  489--493
              R. S. Lekshmi and   
                      R. Anitha   Perfect matching dominating cycle --- a
                                  new dominating cycle . . . . . . . . . . 495--508

Journal of Discrete Mathematical Sciences and Cryptography
Volume 12, Number 5, October, 2009

                  P. Freyre and   
                    N. Diaz and   
                  E. R. Morgado   Some algorithms related to matrices with
                                  entries in a finite field  . . . . . . . 509--519
                H. Hedayati and   
                      Z. Jafari   Connections between interval valued
                                  fuzzy graphs and fuzzy groups with $(S,
                                  T)$-norms  . . . . . . . . . . . . . . . 521--531
                  P. Freyre and   
                    N. Diaz and   
                  E. R. Morgado   Fast algorithm for the multiplication of
                                  a row vector by a randomly selected
                                  matrix $A$ . . . . . . . . . . . . . . . 533--549
                J. Dayantis and   
                 J.-F. Palierne   Complementary results on the search of
                                  primes from lesser primes  . . . . . . . 551--559
   Ikorong Anouk Gilbert Nemron   A simplification of the difficult part
                                  of the Berge last conjecture . . . . . . 561--569
   Ikorong Anouk Gilbert Nemron   A simple dissertation around the Berge
                                  problem and the Hadwiger conjecture  . . 571--593
                  C. C. Lee and   
                K. Y. Huang and   
                    S. Y. Huang   On-line password guessing attack on
                                  Lu--Cao key agreement protocol for
                                  secure authentication  . . . . . . . . . 595--598
                       N. Daili   Some probabilistic approaches to some
                                  asymptotic prime numbers formulae  . . . 599--614
             C. Koukouvinos and   
                  E. Lappas and   
                    D. E. Simos   Encryption schemes using orthogonal
                                  arrays . . . . . . . . . . . . . . . . . 615--628

Journal of Discrete Mathematical Sciences and Cryptography
Volume 12, Number 6, December, 2009

                G. W. Helmy and   
                M. A. Ahmed and   
                M. N. El-Derini   Using co-operating agents for partial
                                  results protection in mobile agent
                                  paradigm . . . . . . . . . . . . . . . . 629--647
                 M. C. Chiu and   
                  L. J. Yeh and   
                      C. H. Yeh   The development of tactile testing
                                  machine on tact switch . . . . . . . . . 649--669
                     R. U. Rani   A novel single source shortest path
                                  algorithm  . . . . . . . . . . . . . . . 671--680
                  Y. Talebi and   
          M. S. Esmaeilifar and   
                    S. Azizpour   A kind of intersection graph of vector
                                  space  . . . . . . . . . . . . . . . . . 681--689
               Md. I. Islam and   
                  J. K. Das and   
                     M. R. Amin   Call admission scheme of mixed traffic
                                  for mobile cellular networks . . . . . . 691--705
                    M. Zannetti   A combinatorial characterization of
                                  parabolic quadrics . . . . . . . . . . . 707--715
                J. C. Huang and   
                      W. T. Pan   Performing stock closing price
                                  prediction through the use of principle
                                  component regression in association with
                                  general regression neural network  . . . 717--728
                 R. Sweetly and   
              J. Paulraj Joseph   The radio number of $(W_n \colon 2)$
                                  graphs . . . . . . . . . . . . . . . . . 729--736
              R. Stangarone and   
                       L. Verdi   Cryptosystems involving one
                                  factorizations of graphs . . . . . . . . 737--743
                    D. Poulakis   A public key encryption scheme based on
                                  factoring and discrete logarithm . . . . 745--752
                      Anonymous   Index of Volume 12 (2009)  . . . . . . . 753--758
                      Anonymous   Contents --- Volume 12 Number 6 (2009)   A--A


Journal of Discrete Mathematical Sciences and Cryptography
Volume 13, Number 1, February, 2010

                H. B. Bahar and   
                 M. Sokouti and   
                     B. Sokouti   A first study of improving transposition
                                  cryptosystem . . . . . . . . . . . . . . 1--9
                       S. Ferri   Combinatorial characterizations of $(2q
                                  + 1)$-caps in ${\rm PG}(r, q)$ . . . . . 11--15
                  K. Y. Lin and   
                  J. C. Lin and   
                 J. M. Chen and   
                       T. C. Wu   Defense automatic malicious tools based
                                  on navigation behavior . . . . . . . . . 17--27
              R. Padmavathy and   
                    C. Bhagvati   Ephemeral key recovery using index
                                  calculus method  . . . . . . . . . . . . 29--43
             M. S. Mulaudzi and   
                    O. Akinyemi   $q$-Enumeration of alternating
                                  permutations of odd length . . . . . . . 45--67
                      M. Mitton   Convolution and generalized difference
                                  sets . . . . . . . . . . . . . . . . . . 69--83
               N. Kobayashi and   
              T. Matsushima and   
                    S. Hirasawa   An accurate density evolution analysis
                                  for a finite-state Markov channel  . . . 85--97
             G. Shobhalatha and   
                      K. Suresh   Lattice properties in dioids . . . . . . 99--104

Journal of Discrete Mathematical Sciences and Cryptography
Volume 13, Number 2, April, 2010

                S. Hirasawa and   
                    M. Kasahara   A note on performance of generalized
                                  tail biting trellis codes  . . . . . . . 105--122
                    H. Hedayati   $t$-Implication-based fuzzy interior
                                  hyperideals of semihypergroups . . . . . 123--140
            A. K. Mohapatra and   
                     N. Prakash   Wired equivalent privacy reinvestigated  141--151
                  L. Cinque and   
                  G. Iovane and   
                   M. Manzo and   
                   E. Sangineto   Face recognition using SIFT features and
                                  a region-based ranking . . . . . . . . . 153--170
                 L. Berardi and   
                        R. Rota   A construction of a key exchange
                                  protocol . . . . . . . . . . . . . . . . 171--174
               B. D. Sharma and   
                      N. Sookoo   Eigenvalues of the difference matrices
                                  of the Lee partition . . . . . . . . . . 175--183
                 A. Kouadri and   
                  L. Chiter and   
                      M. Zelmat   A radial basis function neural network
                                  optimized through modified DIRECT
                                  algorithm based-model for a three
                                  interconnected water tank  . . . . . . . 185--200
                      Anonymous   Table of Contents --- Volume 13 Number 2 A--A

Journal of Discrete Mathematical Sciences and Cryptography
Volume 13, Number 3, June, 2010

                        Y. Feng   $p$-Fuzzy quasi-hypergroups obtained
                                  from fuzzy binary relations  . . . . . . 201--208
                 C. Porkodi and   
           R. Arumuganathan and   
                       K. Vidya   Single authority electronic voting based
                                  on elliptic curves . . . . . . . . . . . 209--217
                S. J. Hwang and   
                     C. H. Chao   An efficient non-interactive deniable
                                  authentication protocol with anonymous
                                  sender protection  . . . . . . . . . . . 219--231
                  S. K. Pal and   
                  S. Kapoor and   
                   A. Arora and   
               R. Chaudhary and   
                     J. Khurana   Design of strong cryptographic schemes
                                  based on Latin Squares . . . . . . . . . 233--256
                  B. Saxena and   
                      S. K. Pal   Some new concepts in fuzzy arithmetic    257--270
                          R. Li   Eigenvalues, Laplacian eigenvalues, and
                                  Hamiltonian connectivity of graphs . . . 271--275
                  R. Vasuki and   
                   A. Nagarajan   On the construction of new classes of
                                  super mean graphs  . . . . . . . . . . . 277--290
                  C. M. Fan and   
                    C. C. Huang   A note of solutions to the morphic
                                  involution language equations  . . . . . 291--298
                  M. J. Lee and   
                  M. K. Kuo and   
                     Y. R. Chen   An antimagic labeling in $K2n,2n | nC4$  299--304
                      Anonymous   Contents --- Volume 13 Number 03 June
                                  2010 . . . . . . . . . . . . . . . . . . A--A

Journal of Discrete Mathematical Sciences and Cryptography
Volume 13, Number 4, August, 2010

                  S. Swapna and   
               A. D. Dileep and   
               C. C. Sekhar and   
                        S. Kant   Block cipher identification using
                                  support vector classification and
                                  regression . . . . . . . . . . . . . . . 305--318
               S. Nagireddy and   
               H. A. Murthy and   
                        S. Kant   Identification of Encryption Method for
                                  Block Ciphers using Histogram Method . . 319--328
                    S. Kant and   
                  V. Sharma and   
                   N. Verma and   
                     B. K. Dass   Identification scheme for romanized
                                  Indian languages from their plain and
                                  ciphered bit stream  . . . . . . . . . . 329--345
                    S. Kant and   
              R. K. Asthana and   
                   B. L. Jangid   Comparative performance of the
                                  classifiers for cryptosystem
                                  identification . . . . . . . . . . . . . 347--368
                   T. Saito and   
              T. Matsushima and   
                    S. Hirasawa   A note on automatic construction
                                  algorithms for orthogonal designs of
                                  experiments using error correcting codes 369--381
                    T. Suko and   
              T. Matsushima and   
                    S. Hirasawa   Asymptotic property of universal
                                  lossless coding for independent
                                  piecewise identically distributed
                                  sources  . . . . . . . . . . . . . . . . 383--391
              Hui-Chin Tang and   
                K. H. Hsieh and   
                  Hwapeng Chang   A 4217th-order multiple recursive random
                                  number generator with modulus $2^{31} -
                                  69$  . . . . . . . . . . . . . . . . . . 393--398
                      Anonymous   Book Reviews . . . . . . . . . . . . . . 399--405
                      Anonymous   Contents --- Volume 13 (04 August 2010)  A--A

Journal of Discrete Mathematical Sciences and Cryptography
Volume 13, Number 5, October, 2010

                     S. Pal and   
                    P. Bhowmick   Cubic approximation of curve-shaped
                                  objects in $Z_2$: a generalized approach
                                  based on discrete curvature  . . . . . . 407--427
                    H. Po-Hsian   A weight-based data hiding method for
                                  binary image using selective binary
                                  numeral system . . . . . . . . . . . . . 429--444
                N. Vijayarangan   Hard problems in elliptic curve scalar
                                  multiplication . . . . . . . . . . . . . 445--452
              B. D. Acharya and   
                  K. A. Germina   Vertex-graceful graphs . . . . . . . . . 453--463
                       N. Daili   About binomial densities: some
                                  applications in number theory  . . . . . 465--472
                   O. Ferri and   
                       S. Ferri   Graphic characterizations of the
                                  $k$-caps and $k$-arcs in ${\rm PG}(r,
                                  q)$  . . . . . . . . . . . . . . . . . . 473--477
              Hui-Chin Tang and   
           Kuang-Hang Hsieh and   
                  Hwapeng Chang   A 32-bit linear congruential random
                                  number generator with prime modulus  . . 479--486
                P. V. Reddy and   
                  B. U. Rao and   
                       T. Gowri   ID-based directed proxy signature scheme
                                  from bilinear pairings . . . . . . . . . 487--500
                      Anonymous   Contents --- Volume 13 Number 05 October
                                  2010 . . . . . . . . . . . . . . . . . . A--A

Journal of Discrete Mathematical Sciences and Cryptography
Volume 13, Number 6, December, 2010

                  G. Iovane and   
                P. Giordano and   
                G. Ingenito and   
                   M. Leone and   
                    A. Nocerino   Biometric watermarking via wavelet
                                  approach, reverse engineering in
                                  infosecurity and dematerialization of
                                  public administration  . . . . . . . . . 501--542
                       M. Kures   The composition of polynomials by the
                                  substitution principle . . . . . . . . . 543--552
                  B. D. Acharya   Signed intersection graphs . . . . . . . 553--569
                     L. Poinsot   Doubly perfect nonlinear Boolean
                                  permutations . . . . . . . . . . . . . . 571--582
                   A. P. Kazemi   Every $K1,7$ and $K1,3$-free, $3$-vertex
                                  critical graph of even order has a
                                  perfect matching . . . . . . . . . . . . 583--591
              Hui-Chin Tang and   
                K. H. Hsieh and   
                     T. L. Chao   A backward heuristic algorithm for
                                  two-term multiple recursive random
                                  number generators  . . . . . . . . . . . 593--600
            B. Basavanagoud and   
                    P. V. Patil   A criterion for (non-)planarity of the
                                  transformation graph $G(xyz)$ when $xyz
                                  = - + +$ . . . . . . . . . . . . . . . . 601--610
                      Anonymous   Index of Volume 13 (2010)  . . . . . . . 611--616
                      Anonymous   Contents --- Volume 13 Number 06
                                  December 2010  . . . . . . . . . . . . . A--A


Journal of Discrete Mathematical Sciences and Cryptography
Volume 14, Number 1, February, 2011

              T. T. Chelvam and   
                        T. Asir   A note on total graph of $Z(n)$  . . . . 1--7
            M. H. Al-Towaiq and   
                 H. K. Al-Bzoor   An efficient algorithm for the solution
                                  of second order PDE's using Taylor
                                  expansion polynomials  . . . . . . . . . 9--31
T. G. Jaíyé\colá   On three cryptographic identities in
                                  left universal Osborn loops  . . . . . . 33--50
                       Z. Liang   Coverings and packings of complete
                                  directed graphs by odd circuits  . . . . 51--75
                   N. Begum and   
                    M. Alam and   
                   Md. I. Islam   Fingerprint detection based on DWT a new
                                  approach . . . . . . . . . . . . . . . . 77--87
                S. J. Peter and   
                   S. P. Victor   An integrated approach for local outlier
                                  detection using dynamic minimum spanning
                                  tree . . . . . . . . . . . . . . . . . . 89--106
                      Anonymous   Contents --- Vol. 14 # 01 February 2011  A

Journal of Discrete Mathematical Sciences and Cryptography
Volume 14, Number 2, April, 2011

                  E. Elsheh and   
                     A. Youssef   Cryptanalysis of a public key
                                  cryptosystem based on boolean
                                  permutations . . . . . . . . . . . . . . 107--115
                 C. L. Chin and   
                    C. C. Huang   Some properties of involution codes  . . 117--127
                 E. Syahrul and   
                  J. Dubois and   
                  V. Vajnovszki   Combinatorial transforms: Applications
                                  in lossless image compression  . . . . . 129--147
                    S. J. Peter   Minimum spanning tree based clustering
                                  for outlier detection  . . . . . . . . . 149--166
                    S. J. Peter   Structural similarity clustering for
                                  detection of outliers and hubs using
                                  minimum spanning tree  . . . . . . . . . 167--183
                  T. C. Kao and   
                     H. C. Tang   An exhaustive analysis of two-term
                                  multiple recursive random number
                                  generators with double precision
                                  floating point restricted multipliers    185--191
                  R. Vasuki and   
                   A. Nagarajan   Further results on super mean graphs . . 193--206
                      Anonymous   Contents --- Vol. 14 # 02 April 2011 . . A

Journal of Discrete Mathematical Sciences and Cryptography
Volume 14, Number 3, June, 2011

                  G. Iovane and   
                  L. Puccio and   
                 G. Lamponi and   
                    A. Amorosia   Electronic access key based on
                                  innovative Information Fusion technique
                                  involving prime numbers and biometric
                                  data . . . . . . . . . . . . . . . . . . 207--225
                    S. J. Peter   Structural similarity micro clustering
                                  algorithm for local outliers and hubs
                                  using dynamic minimum spanning tree  . . 227--247
                    J. John and   
                 A. Vijayan and   
                     S. Sujitha   The forcing edge covering number of a
                                  graph  . . . . . . . . . . . . . . . . . 249--259
                 J. Bhaumik and   
               D. Roy Chowdhury   Nimix: An involutary nonlinear vectorial
                                  boolean function . . . . . . . . . . . . 261--277
           M. K. A. Jebitha and   
                   J. P. Joseph   Domination in transformation graph
                                  $G-+-$ . . . . . . . . . . . . . . . . . 279--303
                      Anonymous   Contents --- Vol. 14 # 03 June 2011  . . A

Journal of Discrete Mathematical Sciences and Cryptography
Volume 14, Number 4, August, 2011

         G. A. M. Abdelhady and   
               F. S. Helail and   
                  A. A. Elkouny   New DES based on elliptic curves . . . . 305--315
                      R. Amutha   Performance analysis of $64$-ary
                                  triangular quadrature amplitude
                                  modulation . . . . . . . . . . . . . . . 317--332
                 D. R. Stoddart   The groups H3 and H4 of a class of
                                  certain cyclically presented groups are
                                  $2$-generated  . . . . . . . . . . . . . 333--340
                 H. C. Tang and   
                K. H. Hsieh and   
                     C. J. Wang   A partial exhaustive search for good
                                  two-term third-order multiple recursive
                                  random number generators . . . . . . . . 341--348
             T. Karthikeyan and   
                S. J. Peter and   
            S. Chidambaranathan   Meta clusters through minimum spanning
                                  tree based clustering for performance
                                  analysis of students . . . . . . . . . . 349--367
                     S. Das and   
               D. Roy Chowdhury   On usage of cellular automata in
                                  strengthening stream ciphers . . . . . . 369--390
                N. Vijayarangan   Communication protocols based on CAAA
                                  attributes . . . . . . . . . . . . . . . 391--404
                      Anonymous   Contents --- Vol. 14 # 04 August 2011    A

Journal of Discrete Mathematical Sciences and Cryptography
Volume 14, Number 5, October, 2011

                    S. J. Peter   A novel dynamic minimum spanning tree
                                  based clustering method for image mining 405--419
                S. Arumugam and   
                      L. Martin   Degrees and degree sequence of $k$-edge
                                  $d$-critical graphs  . . . . . . . . . . 421--429
                    J. Dayantis   Generalised Arnold numbers and series    431--444
                F. A. Eteme and   
                    J. A. Tsimi   A modal $[.\,.]$-valent approach of the
                                  notion of code . . . . . . . . . . . . . 445--473
                    S. J. Peter   Detection of outliers and hubs using
                                  minimum spanning tree based on
                                  analytical perspective of degree numbers 475--488
                    S. J. Peter   Nonparametric search algorithm for
                                  outliers and hubs using minimum spanning
                                  tree . . . . . . . . . . . . . . . . . . 489--502
                      Anonymous   Contents --- Vol. 14 # 05 October 2011   A

Journal of Discrete Mathematical Sciences and Cryptography
Volume 14, Number 6, December, 2011

               B. D. Sharma and   
                      N. Sookoo   Generalized Krawtchouk polynomials and
                                  the complete weight enumerator of the
                                  dual code  . . . . . . . . . . . . . . . 503--514
            H. Antonopoulou and   
                  N. Glinos and   
                Y. C. Stamatiou   An identity derived from the solution of
                                  a class of differential equations for
                                  the evolution of a key agreement
                                  protocol . . . . . . . . . . . . . . . . 515--520
                 D. Ferrero and   
                S. Varghese and   
                 A. Vijayakumar   Power domination in honeycomb networks   521--529
                          R. Li   A note on the average distance of a
                                  graph  . . . . . . . . . . . . . . . . . 531--536
                     C. K. Chen   Relation between the releasing strategy
                                  and the domestic rentals on the U.S.
                                  Major Film . . . . . . . . . . . . . . . 537--558
Fidéle Ayissi Etémé and   
              Jean Arnaud Tsimi   A $m \Theta$ approach of the algebraic
                                  theory of linear codes . . . . . . . . . 559--581
                S. J. Peter and   
            S. Chidambaranathan   An efficient divisive-agglomerative
                                  hierarchical clustering algorithm using
                                  minimum spanning tree  . . . . . . . . . 583--595
                    K. Zhao and   
                      Z. Li and   
                        D. Chen   New sufficient condition and Hamiltonian
                                  and traceable  . . . . . . . . . . . . . 597--602
                      Anonymous   Index of Volume 14 (2011)  . . . . . . . 603--606
                      Anonymous   Contents --- Vol. 14 # 06 December 2011  A