Last update:
Thu Apr 25 10:07:09 MDT 2024
Stefano Innamorati The non-existence of certain large
minimal blocking sets . . . . . . . . . 1--26
Mauro Zannetti Note on a characterization of projective
planes . . . . . . . . . . . . . . . . . 27--28
Giuseppe Monaco and
Antonio Monaco Development of a determinant in function
of the differences among the elements of
each line . . . . . . . . . . . . . . . 29--47
S. K. Prasad On fuzziness in a probability space . . 73--77
V. R. Kulli and
B. Janakiram and
Radha R. Iyer Split bondage numbers of a graph . . . . 79--84
Prem Nath and
M. M. Kaur and
Ranjeet Singh Some derivations of the Shannon entropy 85--100
R. Ameri and
M. M. Zahedi Fuzzy direct sum and fuzzy (weakly)
prime and primary subhypermodules . . . 101--116
Luigia Berardi and
Fulvio Zuanni On minimal blocking sets in
non-symmetric designs . . . . . . . . . 117--125
Osvaldo Ferri and
Stefania Ferri Graphic characterization of quadric
cones in a Galois space ${\rm PG}(3,q)$ 127--131
B. Basavanagoud Quasi-total graphs with crossing numbers 133--142
Biagio Palumbo Classes of arithmetical multiplicative
functions and numerical derivative . . . 1--20
Lucia Gionfriddo On the parameter $m_2(h)$ for graphs . . 31--34
L. Maria Abatangelo and
Manuela Erroi Uniform 20-sets of class $[0,2,3,4,5]$
in ${\rm AG}(2,7)$ . . . . . . . . . . . 35--44
Fernando di Gennaro and
Salvatore Furneri On $C_\lambda$ and $F_\lambda$
multiplicative functions in Dirichlet
ring . . . . . . . . . . . . . . . . . . 59--72
M. H. Al-Towaiq An improved algorithm for the iterative
refinement method . . . . . . . . . . . 73--76
Nicola Teodori A characterization of irreducible
configuration $(n_3)$ . . . . . . . . . 77--83
Giuseppe Monaco and
Antonio Monaco Various genesis of permutations;
determinants; square matrices as
graphical schemes; generalization of
Sarrus' rule and its historical
precedents . . . . . . . . . . . . . . . 141--177
V. R. Kulli and
B. Janakiram and
Radha R. Iyer The cototal domination number of a graph 179--184
D. G. Akka and
M. S. Patil $2$-minimally nonouterplanar
semitotal-block graphs and total-block
graphs . . . . . . . . . . . . . . . . . 185--196
Eugene Spiegel Algebraic radicals and incidence
algebras . . . . . . . . . . . . . . . . 197--204
Guglielmo Morgari and
Oscar Steila and
Michele Elia On the linear complexity of product
sequences of linear recurring sequences 1--9
H. Chandrashekhar and
M. Nagaraj Key-lock pair mechanism for access
control using tribes of Farey fractions 11--22
Kishore K. Das and
Nibedita Bhattacharjee Some aspects of modified factorial
series distributions . . . . . . . . . . 23--40
Michele Elia and
J. Carmelo Interlando and
Reginaldo Palazzo, Jr. Computing the reciprocal of units in
Galois rings . . . . . . . . . . . . . . 41--55
Antonio Maturo Fuzzy events and their probability
assessments . . . . . . . . . . . . . . 83--94
H. Chandrashekhar and
M. Nagaraj Discrete quaternion Fourier transform in
signal processing systems . . . . . . . 95--112
Ram Ratan and
P. K. Saxena Image processing based techniques for
securing documents . . . . . . . . . . . 113--129
S. Arumugam and
J. Suresh Suseela On graphoidal graphs . . . . . . . . . . 131--137
V. Radhakrishnan and
T. C. Venkatesan and
K. Krithivasan Exact and approximate matching of matrix
languages . . . . . . . . . . . . . . . 139--156
S. K. Pal and
P. K. Saxena Enhancement of highly noisy speech
signals . . . . . . . . . . . . . . . . 157--172
Md. Asim Uddin Khan The corruption prevention model . . . . 173--178
S. Mukhopadhyay A decision support system for medical
diagnosis . . . . . . . . . . . . . . . 179--192
S. Mukhopadhyay and
M. K. Singh An approximate solution of an unbalanced
transportation problem . . . . . . . . . 193--202
Michael J. Ryan The distribution model the more for less
(nothing) paradox and economies of scale
and scope: some nonlinear extensions . . 203--211
Kun Soo Chang and
Sunkyung Kim and
Il Yoo Translation theorem of conditional
Yeh--Wiener integrals . . . . . . . . . 213--225
H. M. Serag Distributed control for cooperative
systems governed by Schrodinger operator 227--234
M. Bidkham and
K. K. Dewan Some extremal problems of polynomials 235--242
A. Cambini and
L. Martein Second order optimality conditions . . . 243--252
R. C. Mittal Orthogonal wavelets . . . . . . . . . . 253--262
A. Lourdusamy and
S. Somasundaram Pebbling $C_5\times C_5$ using linear
programming . . . . . . . . . . . . . . 1--15
M. M. Zahedi and
M. R. Khorashadi-Zadeh Some categoric connections between fuzzy
hypergraphs, subhypergroups, graphs,
subgroups and subsets . . . . . . . . . 17--32
Franco Eugeni and
Raffaele Mascella A note on generalized Fibonacci numbers 33--45
E. Foundas Some results of Black's permutations . . 47--55
V. R. Kulli and
B. Janakiram and
Radha. R. Iyer Regular number of a graph . . . . . . . 57--64
Francesco Fabris Sharpening the Gilbert--Varshamov bound
in the finite case . . . . . . . . . . . 65--75
R. Murali and
K. S. Harinath Laceability and distance graphs . . . . 77--86
Hakan Özakta\cs and
Mustafa Ç. Pìnar and
Mustafa Akgül and
Tahsin Kurç and
Cevdet Aykanat An algorithm with long steps for the
simultaneous block projections approach
for the linear feasibility problem . . . 87--108
V. R. Kulli and
Nanda S. Warad On the total closed neighbourhood graph
of a graph . . . . . . . . . . . . . . . 109--114
Kuang-hua Hsueh and
Patrick S. Chen and
Peter Chu and
John Kwan-han Liu The procedure for synthesizing ratio
judgements . . . . . . . . . . . . . . . 115--120
Franco Eugeni and
Mauro Zannetti Generalized configurations . . . . . . . 121--131
Andrea Sgarro Blind coding: authentication frauds from
the point of view of rate-distortion
theory . . . . . . . . . . . . . . . . . 133--150
V. R. Kulli and
M. S. Biradar The blict graph and blitact graph of a
graph . . . . . . . . . . . . . . . . . 151--162
Yogesh Singh and
C. S. Rai An information theoretic approach to
blind source separation . . . . . . . . 163--175
Yanxun Chang and
Giovanni Lo Faro and
Hao Shen Support sizes of completely decomposable
triple systems . . . . . . . . . . . . . 177--188
Iiro Honkala and
Tero Laihonen On the probability of undetected error
for binary codes used for combined
correction and detection . . . . . . . . 189--197
Alicia Maccari and
Olga Rueda and
Vilma Viazzi A survey on edge reconstruction of
graphs . . . . . . . . . . . . . . . . . 1--11
Ira Antonopoulou A user authentication protocol based on
the intractability of the 3-coloring
problem . . . . . . . . . . . . . . . . 17--21
Ta-Chung Chu Ranking fuzzy numbers by a ratio of
relative areas . . . . . . . . . . . . . 23--34
Franco Eugeni and
Daniela Tondini Klein's discrete model: the case of odd
order . . . . . . . . . . . . . . . . . 35--41
Rosa Stangarone and
Luisella Verdi Essentially $s$-fold secure
authentication systems of level $l$ . . 43--50
Antonio Maturo and
Mauro Zannetti Rédei blocking sets with two Rédei lines
and quasigroups . . . . . . . . . . . . 51--62
Prem Nath On determining a representation for
measures of entropy possessing branching
property without assuming symmetry . . . 63--75
Yi-Shiung Yeh and
Chu-Hsing Lin and
Wei-Shen Lai Construct message authentication code
with SHA and AEA . . . . . . . . . . . . 77--83
M. M. Zahedi and
H. Moradi Kouchi (Anti-) fuzzy (normal)
sub-$F$-polygroups and fuzzy
$\alpha$-cosets . . . . . . . . . . . . 85--104
Cynthia Chi and
Daniela Ferrero and
Charles Hallford and
Rebecca Williams On the edge sums of de Bruijn graphs . . 105--117
Giuseppe Gentile and
Renato Migliorato Hypergroupoids and cryptosystems . . . . 119--138
Osvaldo Ferri and
Stefania Ferri and
Antonella Giallonardo On the elliptic quadrics of ${\rm
PG}(2s+1,q)$ . . . . . . . . . . . . . . 139--143
S. Arumugam and
Indra Rajasingh and
P. Roushini Leely Pushpam A note on the graphoidal covering number
of a graph . . . . . . . . . . . . . . . 145--150
Min-Shiang Hwang and
Chao-Chen Yang and
Shiang-Feng Tzeng Improved digital signature scheme based
on factoring and discrete logarithms . . 151--155
Konstantinos G. Girtis and
George A. Tsihrintzis Diffraction tomographic imaging
algorithms. I. Data models and inversion 157--178
Y. P. Chu and
W. C. Chiang and
Y. H. Huang and
C. L. Lee A generalized delay allocation model for
rate-based packet scheduling algorithms 179--197
Chin Ching Chiu and
Yi-Shiung Yeh A massively parallel algorithm based on
DNA computations for constructing
minimal spanning trees . . . . . . . . . 199--214
M. L. Aggarwal and
Veena Budhraja On construction of some new symmetric
and asymmetric orthogonal arrays . . . . 215--225
Stefania Ferri On some type $(1,m,n)_2$ sets of ${\rm
PG}(3,q)$ . . . . . . . . . . . . . . . 227--230
Michel Mitton On maximally nonlinear and extremal
balanced Boolean functions . . . . . . . 231--253
E. Foundas and
G. Chondrocoukis Classifications and inferences of
collective preferences . . . . . . . . . 255--280
Konstantinos G. Girtis and
George A. Tsihrintzis Diffraction tomographic imaging
algorithms. II. Random data inversion
and super-resolution . . . . . . . . . . 281--301
T. W. Chen and
J. Y. Lin Control design based on minimization of
quadratic index with an observer-based
structure . . . . . . . . . . . . . . . 1--19
S. Armeni and
D. Christodulakis and
I. Kostopoulos and
Y. C. Stamatiou and
M. Xenos Secure information hiding based on
computationally intractable problems . . 21--33
M. L. Aggarwal and
Seema Gupta Nested balanced incomplete block designs
derivable from simplex codes . . . . . . 35--44
Chu-Hsing Lin and
Yi-Shiung Yeh and
Chen-Yu Lee Keyed/unkeyed SHA-2 . . . . . . . . . . 45--58
M. C. Bhandari and
C. Durairajan On the covering radius of simplex codes 59--69
Stefania Ferri On the irreducible cubs containing the
maximum number of points of a Fano plane 71--75
Mauro Zannetti A combinatorial characterization of
quadric Veronesean . . . . . . . . . . . 77--82
D\uanu\ct Marcu A note on the balanced hypergraphs . . . 83--84
Hamamache Kheddouci A dual of $4$-regular graph for $G
\times C_{2n}$ . . . . . . . . . . . . . 85--96
R. A. Borzooei and
P. Corsini and
M. M. Zahedi Some kinds of positive implicative hyper
$K$-ideals . . . . . . . . . . . . . . . 97--108
R. Ameri On categories of hypergroups and
hypermodules . . . . . . . . . . . . . . 121--132
Piergiulio Corsini On Chinese hyperstructures . . . . . . . 133--137
Daniel Hort A construction of hypergroups from
ordered structures and their morphisms 139--150
Giuseppe Gentile A note on quasi-Steiner hypergroupoids 151--160
A. Iranmanesh and
A. H. Babareza Transposition hypergroups and complement
hypergroups . . . . . . . . . . . . . . 161--168
James Jantosciak and
Christos G. Massouros Strong identities and fortification in
transposition hypergroups . . . . . . . 169--193
Violeta Leoreanu Commutative hypergroups associated with
arbitrary hypergroups . . . . . . . . . 195--198
A. Madanshekaf $H_v$-structures associated with
$PQ$-hyperoperations . . . . . . . . . . 199--205
Gerasimos G. Massouros On the attached hypergroups of the order
of an automation . . . . . . . . . . . . 207--215
Rita Procesi Ciampi and
Rosaria Rota Polynomials over multiplicative
hyperrings . . . . . . . . . . . . . . . 217--225
A. Rahnamai Barghi A class of hyperrings . . . . . . . . . 227--233
Thomas Vougiouklis The $h/v$-structures . . . . . . . . . . 235--243
Renato Migliorato Canonical $v$-hypergroups and
$\omega$-hypergroups . . . . . . . . . . 245--256
Mauro Zannetti A combinatorial characterization of Baer
subspaces . . . . . . . . . . . . . . . 1--3
Biagio Buccimazza and
Bal Kishan Dass and
Sapna Jain High-density-burst error detection . . . 5--21
Cheng-Fen Lu and
Shiuh-Pyng Shieh Re-keying algorithms for symmetric
cryptosystems . . . . . . . . . . . . . 23--27
Fernando Di Gennaro Which blocking sets are hypergroups? . . 29--36
Hannah Chung and
Daniela Ferrero and
Alan Taylor and
Jeremy Warshauer Diameter of path graphs . . . . . . . . 49--54
Wei-Kuei Chen and
Chun-I Fan Blind one-time signature and its
applications . . . . . . . . . . . . . . 55--69
Yi-Shiung Yeh and
Ta-Shan Tsui A concurrent multi-string matching from
multi-text algorithm based on the
algorithm of Hamiltonian path problem
and DNA computation . . . . . . . . . . 71--96
R. Selvakumar and
P. Balasubramani Kernel code and its controllability . . 97--101
M. Yamuna and
N. Sridharan Every $\gamma$-excellent,
$\gamma$-flexible graph is $\gamma_{\rm
bi}$-excellent . . . . . . . . . . . . . 103--110
Ching-Hung Hsu and
Ming-Chih Lai A new cipher scheme based on one-way
hash function and IDEA . . . . . . . . . 111--120
Yuh-Min Tseng A cryptographic key assignment scheme
for access control in a hierarchy with
exceptions . . . . . . . . . . . . . . . 121--132
Konstantinos G. Girtis and
George A. Tsihrintzis Diffraction tomographic imaging
algorithms. III. Angularly limited data 133--159
Alberto Amato Intersections and parallelism in
$P_3$-designs . . . . . . . . . . . . . 161--166
Partha P. Dey Exploring invariant linear codes through
generators and centralizers . . . . . . 167--178
S. Arumugam and
Indra Rajasingh and
P. Roushini Leely Pushpam Graphs with unique minimum acyclic
graphoidal cover. I . . . . . . . . . . 179--186
Stefania Ferri On some singular irreducible cubics of
$\rm PG(2,2)$ . . . . . . . . . . . . . 203--208
J. Carmelo Interlando and
Michele Elia On the effective computation of
isomorphisms between
$\sigma_{\mathbb{F}}(\germ
O_{\mathbb{F}}/\germ p)$ and ${\rm
GF}(N_{\mathbb{F}}(\germ p))$ . . . . . 209--225
Michel Mitton Theoretical upper bounds on the covering
radii of Boolean functions . . . . . . . 237--248
Hera Antonopoulou On threshold properties . . . . . . . . 249--254
Sandro Rajola and
Maria Scafati Tallini The sets of type $(0,n)$ and the Steiner
triple systems in a finite affine plane 261--266
Stefania Ferri Addendum to: ``On some type $(1,m,n)_2$
sets of $\rm PG(3,q)$'' [J. Discrete
Math. Sci. Cryptography 5 (2002), no. 3,
227--230; \refcno 1986732] . . . . . . . 267--269
Ta-Chung Chu and
Kuo-Shi Huang and
Tzu-Ming Chang COA defuzzification method for
evaluating $C_{pk}$ under fuzzy
environments . . . . . . . . . . . . . . 271--280
Lin-Chuan Wu and
Yi-Shiung Yeh and
Chun-I. Fan Fail-stop blind signature scheme based
on the integer factorization . . . . . . 281--290
S. Georgiou and
C. Koukouvinos New visual cryptographic schemes derived
from orthogonal and mixed orthogonal
arrays . . . . . . . . . . . . . . . . . 291--306
Ilias S. Kotsireas and
Christos Koukouvinos Inequivalent Hadamard matrices with
buckets . . . . . . . . . . . . . . . . 307--317
Marios Poulos and
Maria Rangoussi and
Vasilios Chrissikopoulos and
Agelos Evangelou and
Fotis Georgiacodis Comparative analysis of the
computational geometry and neural
network classification methods for
person identification purposes via the
EEG. I . . . . . . . . . . . . . . . . . 319--347
Najib A. Kofahi and
Turki Al-Somani and
Khalid Al-Zamil Performance study of some symmetric
block cipher algorithms under Linux
operating system . . . . . . . . . . . . 359--370
Shiuh-Jeng Wang Vowel-consonant addressing mode on
hashing for English letter-oriented keys 1--25
Qassem M. Al-Hassan On inverses of tridiagonal matrices . . 49--58
P. Balasubramani and
R. Viswanathan Characterizations of the
$0$-distributive poset . . . . . . . . . 81--98
Prem Nath On the measurable solutions of some
functional equations useful in
information theory . . . . . . . . . . . 99--115
Brice Effantin and
Hamamache Kheddouci Exact values for the $b$-chromatic
number of a power complete $k$-ary tree 117--129
Willi Geiselmann and
Rainer Steinwandt A key substitution attack on ${\rm
SFLASH}^{v3}$ . . . . . . . . . . . . . 137--141
Rosanna Iembo and
Massimo Squillante and
Aldo Ventre Common fixed points for families of
commutative transformations . . . . . . 175--188
C. Koukouvinos and
P. Mantas Some combinatorial constructions for
optimal mixed-level supersaturated
designs . . . . . . . . . . . . . . . . 189--201
Michael Ratiner The method of S-box construction . . . . 203--215
V. Swaminathan and
P. Jeyanthi On super vertex-magic labeling . . . . . 217--224
Luigia Berardi and
Bal Kishan Dass and
Sapna Jain Bound for solid burst error correction
with Lee weight . . . . . . . . . . . . 225--235
Maurizio Lucci A combinatorial characterization of two
skew lines . . . . . . . . . . . . . . . 237--239
Ilias S. Kotsireas and
Christos Koukouvinos Genetic algorithms for the construction
of Hadamard matrices with two circulant
cores . . . . . . . . . . . . . . . . . 241--250
Abulimiti Yiming and
Masami Yasuda A note on properties for a complementary
graph and its tree graph . . . . . . . . 251--259
Stefania Ferri The cubic curves of ${\rm PG}(2,3)$ . . 261--266
Maurizio Lucci On $(q+1)^2$-sets of class $[0,1,m,n]_1$
in ${\rm PG}(4,q)$ . . . . . . . . . . . 267--270
Vu Dong Tô and
Reihaneh Safavi-Naini and
Yejing Wang $2$-secure codes from $2$-SFP codes . . 287--304
Ming-Hsin Chang and
Yi-Shiung Yeh Proxy signature schemes with time
limitation . . . . . . . . . . . . . . . 305--314
Michel Mitton An analysis and an improvement of
iterative fast correlation attacks . . . 315--342
Yi-Shiung Yeh and
I-Te Chen and
Chan-Chi Wang Randomizing encryption mode . . . . . . 355--364
N. Shajareh-Pour Salavati On the generalized permutations . . . . 365--372
B. Basavanagoud and
Veena N. Mathad Graph equations for line graphs, blitact
graphs and blict graphs . . . . . . . . 373--379
Chen-Ming Fan and
H. J. Shyr $\delta$-codes and $\delta$-languages 381--394
Ngo Dac Tan On the classification problem for
tetravalent metacirculant graphs . . . . 403--412
N. Vijayarangan and
R. Vijayasarathy Primitive polynomials testing
methodology . . . . . . . . . . . . . . 427--435
Chih-Yao Lo The operation of the elliptic curve
cryptology in IPv6 . . . . . . . . . . . 437--446
Raffaele Mascella and
Luca G. Tallini Combinatorial properties of balanced
codes over the complex $m$-th roots of
unity and efficient coding algorithms 447--458
Raffaele Mascella and
Luca G. Tallini On efficient high-order spectral-null
codes over the $m$-ary alphabet . . . . 459--481
Brice Effantin The $b$-chromatic number of power graphs
of complete caterpillars . . . . . . . . 483--502
A. Suganya and
N. Vijayarangan Landau--Ramanujan keyed hash functions
for message authentication . . . . . . . 1--8
Sucheta Chakrabarti and
R. K. Khanna A new visual cryptography scheme for STS
based access structures . . . . . . . . 9--23
Michele Elia Representation of primes as the sums of
two squares in the golden section
quadratic field . . . . . . . . . . . . 25--37
Matteo Gaeta and
Gerardo Iovane and
Enver Sangineto A $3$D geometric approach to face
detection and facial expression
recognition . . . . . . . . . . . . . . 39--53
Jinhua Wang The spectrum of nested group divisible
designs of type $t^n$ . . . . . . . . . 55--65
S. Soma Sundaram and
A. Nagarajan and
M. Anantha Krishnan Path point cover . . . . . . . . . . . . 67--71
Doost Ali Mojdeh On the extending of $k$-regular graphs
and their strong defining spectrum . . . 73--86
Yung-Tsang Chang and
Jung-Hua Hsu and
S. S. Yu A sublinear time string prefix square
detection algorithm . . . . . . . . . . 87--95
T. Alderson Some generalizations of Rédei's theorem 97--106
H. Evangelaras and
C. Koukouvinos New light on certain two level designs
using Gröbner bases . . . . . . . . . . . 107--124
H. Evangelaras and
C. Koukouvinos and
E. Lappas An efficient algorithm for the
identification of isomorphic orthogonal
arrays . . . . . . . . . . . . . . . . . 125--132
Chin-Chen Chang and
Jung-San Lee An anonymous and flexible $t$-out-of-$n$
electronic voting scheme . . . . . . . . 133--151
Cheng-Hsing Yang and
Shiuh-Jeng Wang Weighted bipartite graph for locating
optimal LSB substitution for secret
embedding . . . . . . . . . . . . . . . 153--164
Yu-Kuang Zhao A characterization of prefix $n$-power
words . . . . . . . . . . . . . . . . . 165--176
Doost Ali Mojdeh and
Nader Jafari Rad Connected geodomination in graphs . . . 177--186
Raffaele Mascella and
Luca G. Tallini Theory and design of $m$-ary balanced
codes which are invariant under symbol
permutation . . . . . . . . . . . . . . 187--200
M. M. Zahedi and
L. Torkzadeh A classification of hyper $K$-algebras
of order $3$ . . . . . . . . . . . . . . 201--213
Bala Shanthi Karunagaram and
J. Paulraj Joseph On domination parameters and maximum
degree of a graph . . . . . . . . . . . 215--223
H. Ahrabian and
A. Nowzari-Dalini Parallel generation of $t$-ary trees
with ballot-sequences . . . . . . . . . 225--234
Ngo Dac Tan and
Chawalit Iamjaroen A necessary condition for maximal
nonhamiltonian Burkard--Hammer graphs 235--252
M. Sethumadhavan and
C. Yogha Lakxmie and
C. Vijayagovindan A construction of $p$-ary balanced
sequence with large $k$-error linear
complexity . . . . . . . . . . . . . . . 253--261
Paul Manuel and
Bharati Rajan and
Indra Rajasingh and
M. Chris Monica Landmarks in torus networks . . . . . . 263--271
Stefania Ferri The singular absolutely irreducible
cubics of $\rm PG(2,3)$ . . . . . . . . 291--305
Shigeichi Hirasawa and
Masao Kasahara Exponential error bounds and decoding
complexity for block concatenated codes
with tail biting trellis inner codes . . 307--320
Yi-Shiung Yeh and
I-Te Chen and
Ting-Yu Huang and
Chan-Chi Wang Dynamic extended DES . . . . . . . . . . 321--330
S. Georgiou and
C. Koukouvinos and
E. Lappas Extremal doubly-even self-dual codes
from Hadamard matrices . . . . . . . . . 331--339
H. Evangelaras and
C. Koukouvinos Interaction detection in Latin and
hyper-Latin squares . . . . . . . . . . 341--348
Laurent Poinsot Bent functions on a finite nonabelian
group . . . . . . . . . . . . . . . . . 349--364
C. Koukouvinos and
P. Mantas and
S. Stylianou A block-stepwise method for analyzing a
specific type of supersaturated designs 383--402
A. Anto Kinsley and
S. Somasundaram Domination based algorithm to $k$-center
problem . . . . . . . . . . . . . . . . 403--416
Michel Mitton On the Walsh--Fourier analysis of
Boolean functions . . . . . . . . . . . 429--439
Ching-Jing Kung 32-bit multipliers for linear
congruential random number generators 441--448
Shiuh-Jeng Wang and
Pei-Shun Hu Key management for pay-TV broadcast
systems in hierarchy . . . . . . . . . . 449--476
Andrea Sgarro and
Luca Bortolussi Codeword distinguishability in minimum
diversity decoding . . . . . . . . . . . 487--502
H. Evangelaras and
C. Koukouvinos and
K. Mylona On Hadamard embeddability . . . . . . . 503--512
Koduganti Venkata Rao and
P. S. Avadhani Authentication based on wavelet
transformations . . . . . . . . . . . . 513--521
Chin-Chen Chang and
Jen-Ho Yang An efficient ID-based user
identification scheme for mutual
authentication in mobile environments 537--548
Ya-Fen Chang and
Chin-Chen Chang and
Chia-Lin Kao Comments on WLT attack on an enhanced
timestamp-based password authentication
scheme . . . . . . . . . . . . . . . . . 549--555
R. Butkote and
K. Denecke Characterization of sets of discrete
functions by algebraic identities . . . 557--572
Chin-Chen Chang and
Jung-San Lee Security enhancement of Yang--Li
hierarchical access control mechanism 573--582
C. S. Gan and
V. C. Koo Enumerations of the maximum rectilinear
crossing numbers of complete and
complete multi-partite graphs . . . . . 583--590
Yi-Shiung Yeh and
Ting-Yu Huang and
I-Te Chen and
Shih-Chin Chou Analyze SHA-1 in message schedule . . . 1--7
Jörn Quistorff Fundamentals of coding type problems . . 9--39
R. Ameri and
H. Hedayati On $k$-hyperideals of semihyperrings . . 41--54
R. Ameri and
H. Hedayati On $k$-hyperideals of semihyperrings . . 41--54
Yas Alsultanny Systematic approach for image
partitioning and shuffling . . . . . . . 55--71
A. V. N. Krishna and
S. N. N. Pandit and
A. Vinaya Babu A generalized scheme for data encryption
technique using a randomized matrix key 73--81
V. Barrera-Figueroa and
J. Sosa-Pedroza and
J. López-Bonilla Numerical approach to King's analytical
study for circular loop antenna . . . . 83--92
Ya-Fen F. Chang and
Chin-Chen C. Chang and
Yi-Fang F. Cheng Robust non-interactive $t$-out-of-$n$
oblivious transfer based on the RSA
cryptosystem . . . . . . . . . . . . . . 93--109
Mohamed Hussain Al-Ibrahim A designated verifier signature using
secret sharing technique . . . . . . . . 111--123
Israt Jahan and
Mohammad Zahidur Rahman A realistic divisible transferable
electronic cash for general use . . . . 125--150
M. Borges-Quintana and
M. A. Borges-Trenard and
E. Mart\'ìnez-Moro On a Gröbner bases structure associated
to linear codes . . . . . . . . . . . . 151--191
Chia-Chi C. Wu and
Chin-Chen C. Chang Attacks on provably secure
proxy-protected signature schemes based
on factoring . . . . . . . . . . . . . . 193--204
J. Ratsaby Dimension and Boolean functions with
long runs . . . . . . . . . . . . . . . 205--225
Joel Ratsaby On the VC-dimension and Boolean
functions with long runs . . . . . . . . 205--225
Hsiao-Lih L. Jen and
Tai-Chang C. Hsia and
M. Babul Hasan A study of methods for construction of
balanced incomplete block design . . . . 227--243
A. P. Santhakumaran Periphery with respect to cliques in
graphs . . . . . . . . . . . . . . . . . 245--254
S. Georgiou and
C. Koukouvinos and
E. Lappas Self-dual codes over some prime fields
constructed from skew-Hadamard matrices 255--266
Debdeep Mukhopadhyay and
Dipanwita RoyChowdhury Fault based attack of the Rijndael
cryptosystem . . . . . . . . . . . . . . 267--290
Meena Kumari Indices to measure the cryptographic
strength of S-box . . . . . . . . . . . 291--312
Sotiria Antonopoulou and
Yannis C. Stamatiou and
Malvina Vamvakari An asymptotic expansion for the
$q$-binomial series using singularity
analysis for generating functions . . . 313--328
S. Antonopoulou and
Y. C. Stamatiou and
M. Vamvakari An asymptotic expansion for the
$q$-binomial series using singularity
analysis for generating functions . . . 313--328
M. Thiyagarajan and
N. Sairam Verification of the correctness of
compiler optimization using co-induction 329--349
Jung-San S. Lee and
Chin-Chen C. Chang Security enhancement of key
authentication schemes based on discrete
logarithms . . . . . . . . . . . . . . . 351--358
S. J. Wang Information hiding at oblivious
watermarking scheme upon alternative
threshold in spatial domains . . . . . . 359--384
V. Longani An algorithm for finding the number of
shortest routes on square lattices . . . 385--393
Vites Longani An algorithm for partitioning an integer
$n$ as a sum of $k$ positive integers 395--399
Jorma Jormakka On finding Fermat's pairs . . . . . . . 401--413
A. P. Santhakumaran and
J. John Edge geodetic number of a graph . . . . 415--432
Y. B. Maralabhavi and
Venkanagouda M. Goudar Lict edge semientire graph of a planar
graph . . . . . . . . . . . . . . . . . 433--438
G. Laccetti and
G. Schmid Brute force attacks on hash functions 439--460
Paul Manuel and
Kalim Qureshi and
Albert William and
Albert Muthumalai VLSI layout of Benes networks . . . . . 461--472
Jean-Lue L. Baril Hamiltonian paths for involutions in the
square of a Cayley graph . . . . . . . . 473--484
Lila Kari and
Kalpana Mahalingam $k$-involution codes and related sets 485--503
L. Kari and
K. Mahalingam $k$-involution codes and related sets 485--503
B. Chaluvaraju and
N. D. Soner Complementary total domination in graphs 505--516
A. P. Shanthini and
A. Antonysamy and
T. Tamil Chelvam User-friendly genetic algorithm . . . . 517--536
Aminu A. Ibrahim A counting scheme and some algebraic
properties of a class of special
permutation patterns . . . . . . . . . . 537--546
C. C. Lee and
M. S. Hwang and
C. W. Lin An efficient multi-round anonymous
auction protocol . . . . . . . . . . . . 547--557
Stephanie Deacon and
Eduardo Dueñez and
José Iovino A public-key threshold crypto system
based on residue rings . . . . . . . . . 559--571
Robert H.-J. Lin and
Chih-Pin Yen and
Peter S. Deng and
K.-C. Fan and
Jennifer Shu-Jen Lin and
Peter Chu Analysis of the $\epsilon$-algorithm to
accelerate the convergence . . . . . . . 573--580
Jean Dayantis and
Jean-François F. Palierne A search for primes from lesser primes 581--602
Chin-Chen C. Chang and
Chia-Yin Y. Lee and
Yu-Wei W. Su A mutual authenticated key agreement
scheme over insecure networks . . . . . 603--612
V. R. Kulli and
R. R. Iyer Inverse total domination in graphs . . . 613--620
F. O. Ikpotokin and
S. C. Chiemeke Mathematical derivation of the multi-peg
Tower of Hanoi algorithm . . . . . . . . 621--636
M. R. Darafsheh and
Y. Farjami Calculating the set of orders of
elements in the finite linear groups . . 637--653
Hon-Chan C. Chen A simple optimal parallel algorithm for
constructing a spanning tree of a
trapezoid graph . . . . . . . . . . . . 655--660
B. Jaya Prasad and
T. Tamizh Chelvam and
S. Robinson Chellathurai Private domination number of a graph . . 661--666
T. Tamizh Chelvam and
B. Jaya Prasad Common point domination number . . . . . 667--676
A. P. Santhakumaran and
J. John The edge Steiner number of a graph . . . 677--696
P. Vasudeva Reddy and
M. Padmavathamma An authenticated key exchange protocol
in elliptic curve cryptography . . . . . 697--705
F. J. Ogwu and
M. Talib and
G. A. Aderounmu The performance of TCP/IP over wireless
ATM network . . . . . . . . . . . . . . 707--720
R. Sweetly and
J. Paulraj Joseph Radio number of graphs of diameter three 721--730
S. V. Sathyanarayana and
M. Aswatha Kumar and
K. N. Hari Bhat Generation of pseudorandom sequence over
elliptic curve group and their
properties . . . . . . . . . . . . . . . 731--747
K. S. Hsu and
R. C. Soong and
K. C. Chen and
T. S. Lan A computerized approach to the design of
automobile suspension system . . . . . . 749--761
Luigia Berardi and
Manuela Romani On the size of a blocking set in a
symmetric design . . . . . . . . . . . . 763--774
Osvaldo Ferri and
Stefania Ferri A remark on the Segr\`e theorem . . . . 775--778
Jyoti Saxena and
C. S. Rai and
P. K. Bansal ICA based GSIC receiver for multirate
DS-CDMA systems . . . . . . . . . . . . 779--792
Laurent Poinsot Perfect nonlinear S-boxes on the
real-line . . . . . . . . . . . . . . . 793--813
M. Seenivasan and
A. Lourdusamy and
M. Ravi \@Ramasubramanian Triangular mean labeling of graphs . . . 815--822
Stefania Ferri On some graphic characterizations of
cubic curves in ${\rm PG}(2, 2)$ and in
${\rm PG}(2, 3)$ . . . . . . . . . . . . 823--843
Anonymous Index of Volume 10 . . . . . . . . . . . 845--850
N. S. Babu On perfect codes in rank distance . . . 1--11
D. Marcu A generalization of a result of A. Renyi 13--17
D. Marcu A study on the $k$-ordered Hamiltonian
graphs . . . . . . . . . . . . . . . . . 19--31
Y. F. Huang and
K. L. Wen Weighting analysis by using grey method 33--58
H. Om and
R. Patwa Affine transformation in cryptography 59--65
G. Ghiani and
E. Manni and
C. Triki The lane covering problem with time
windows . . . . . . . . . . . . . . . . 67--81
G. Iovane and
E. Sangineto LICoS: Landmark-based Identikit
Composition and Suspect Retrieval . . . 83--98
C. I. Hou and
C. Y. Lo and
J. H. Leu A digital application of data encryption 99--111
E. Foundas and
Ch. Lytras and
C. Patsakis Improved algorithms for the calculation
of Fibonacci numbers . . . . . . . . . . 113--120
R. H. J. Lin and
G. Jung and
J. S. J. Lin and
P. Chu Further analysis on matrix operation of
AHP . . . . . . . . . . . . . . . . . . 121--130
C. Hong-Song and
Z. Jianyu and
H. W. J. Lee A novel NP-based security scheme for
AODV routing protocol . . . . . . . . . 131--145
A. Juarna and
V. Vajnovszki Combinatorial isomorphism between
Fibonacci classes . . . . . . . . . . . 147--158
A. A. Kanso Mixer --- a new stream cipher . . . . . 159--179
E. Foundas and
C. Patsakis and
G. Chondrocoukis Lucas permutations and some notes on
Fibonacci permutations . . . . . . . . . 181--190
M. Mitton Boolean functions of $n$ variables and
permutations on $F_n$ . . . . . . . . . 191--200
M. Mitton Minimal polynomial of Cayley graph
adjacency matrix for Boolean functions 201--207
P. T. Artikis and
C. T. Artikis Random sums of integral part models in
computer systems operations . . . . . . 209--217
M. Sundaram and
R. Ponraj and
S. Somasundaram On graph labeling parameters . . . . . . 219--229
M. K. Viswanath and
A. R. Deepti An improvised version of Hill's cipher 231--237
R. Ponraj and
S. Somasundaram Mean labeling of graphs obtained by
identifying two graphs . . . . . . . . . 239--252
T. L. Huang and
C. W. Liu and
C. C. Chao and
K. T. Lee and
T. Y. Hwang and
C. M. Chung Upper core point detection using
improved ant colony optimization
algorithm . . . . . . . . . . . . . . . 253--265
M. I. Islam and
M. Zulhasnine and
M. R. Amin Performance evaluation of rake receiver
of DS-CDMA under AWGN environments . . . 267--279
Y. S. Kim and
J. H. Chang A proxy fail-stop signature scheme with
proxy revocation . . . . . . . . . . . . 281--295
M. Sethumadhavan and
M. Sindhu and
C. Srinivasan and
C. Kavitha An algorithm for $k$-error joint linear
complexity of binary multisequences . . 297--304
H. Ibrahim and
R. Ramli and
M. H. Hassan Combinatorial design for a conference:
constructing a balanced three-parallel
session schedule . . . . . . . . . . . . 305--317
Y. Kumar and
N. R. Pillai On shift sequences for interleaved
construction of signal sets with low
correlation . . . . . . . . . . . . . . 319--331
A. K. Das An unconditionally secure location-aware
key management scheme for static sensor
networks . . . . . . . . . . . . . . . . 333--355
S. Chakrabarti and
S. K. Pal A new online extended visual
cryptography scheme for STS access
structures . . . . . . . . . . . . . . . 357--374
Y. S. Yeh and
M. C. Kao and
W. S. Lai The orthogonal signature . . . . . . . . 375--384
C. C. Wang and
M. C. Kao and
Y. S. Yeh Low information leakage random padding
scheme for block encryption . . . . . . 385--391
A. K. Verma and
M. Dave and
R. C. Joshi DNA cryptography: a novel paradigm for
secure routing in Mobile Ad hoc Networks
(MANETs) . . . . . . . . . . . . . . . . 393--404
N. Glinos and
Y. C. Stamatiou On the equivalence between random graph
models . . . . . . . . . . . . . . . . . 405--419
J. J. Jesintha and
G. Sethuraman A new class of graceful rooted trees . . 421--435
R. E. Atani and
S. E. Atani and
S. Mirzakuchaki Public key cryptography using semigroup
actions and semirings . . . . . . . . . 437--445
R. Procesi and
R. Rota Multiplicative HV-rings and
complementary hyperstructures . . . . . 447--456
S. Ferri Graphic characterizations of twisted
cubic in ${\rm PG}(3, q)$ . . . . . . . 457--460
D. Marcu An approximate chromatic number of a
graph . . . . . . . . . . . . . . . . . 461--464
G. Ikorong A reformulation of the Goldbach
conjecture . . . . . . . . . . . . . . . 465--469
S. Mathew and
K. P. Jacob JERIM-320: a 320-bit hash function with
dual applications --- a statistical
analysis . . . . . . . . . . . . . . . . 471--482
L. Clark Ascents and descents in random trees . . 483--492
M. Basu and
Md. M. Rahaman and
S. Bagchi $3-(2m, 2m | 1, 2m | 2 | 1)$ design for
first order Reed--Muller code $R(1,m)$ 493--500
N. Han and
Z. Liang On the graceful permutation graphs
conjecture . . . . . . . . . . . . . . . 501--526
H. Azanchiler Extension of line-splitting operation
from graphs to binary matroids . . . . . 527--536
O. Khadir Algorithm for factoring some RSA and
Rabin moduli . . . . . . . . . . . . . . 537--543
C. Y. Lee and
W. S. Lai Extended DSA . . . . . . . . . . . . . . 545--550
S. Ferri On the non singular quartics of ${\rm
PG}(2, 3)$ . . . . . . . . . . . . . . . 551--558
K. A. Germina and
K. Abhishek and
K. L. Princy Further results on set-valued graphs . . 559--566
P. H. Huang A study of applying parallel THBL
algorithm to a fighter plane system . . 567--577
S. S. Dhenakaran and
E. R. Naganathan and
C. Ganesamoorthy Multiple symmetric keys using Banach
fixed point theorem . . . . . . . . . . 579--587
P. Chandra and
R. K. Singh and
Y. Singh Generation of mutants for Boolean
expression . . . . . . . . . . . . . . . 589--607
H. T. Chang Mathematical development and analysis to
conflict resolution . . . . . . . . . . 609--618
Anonymous Errata: Volume 11 Number 5 . . . . . . . 619
P. P. Dey and
M. Asifuzzaman A note on the code of projective plane
of order four . . . . . . . . . . . . . 621--637
F. Guo and
Y. Mu and
Z. Chen Multi-identity management for
identity-based cryptography . . . . . . 639--672
M. Sharma and
M. K. Kowar and
M. Sharma An improved evolutionary algorithm for
secured image using adaptive genetic
algorithm . . . . . . . . . . . . . . . 673--683
L. Cinque and
G. Iovane and
E. Sangineto Comparing SIFT and LDA based face
recognition approaches . . . . . . . . . 685--704
S. Mou and
Md. I. Islam and
M. R. Amin Dynamic channel allocation in mobile
cellular networks . . . . . . . . . . . 705--714
Ikorong Anouk Gilbert Nemron An original abstract over the twin
primes, the Goldbach conjecture, the
friendly numbers, the perfect numbers,
the Mersenne composite numbers, and the
Sophie Germain primes . . . . . . . . . 715--726
M. Seenivasan and
A. Lourdusamy Vertex equitable labeling of graphs . . 727--735
L. Navaei and
R. Dayanian Hidden message via hypothesis testing
and information --- theoretic model . . 737--746
Anonymous Index of Volume 11 (2008) . . . . . . . 747--752
G. Iovane and
G. Ingenito and
M. Leone Motion tracking using fuzzy logic and
consistent labeling for multiple objects
in multiple cameras vision . . . . . . . 1--42
A. P. Kazemi Geodomination in graphs II . . . . . . . 43--50
Md. I. Islam and
J. K. Das Performance comparison of two and three
beam SDMA traffic in mobile cellular
network . . . . . . . . . . . . . . . . 51--61
T. Sitthiwiratham and
C. Promsakon Planarity of joined graphs . . . . . . . 63--69
V. Longani Applications of Polya's theorem to
distribution problems and partitions of
integers . . . . . . . . . . . . . . . . 71--77
Q. Al-Hassan On inverses of pentadiagonal matrices 79--91
A. N. Ghameshlou and
S. M. Sheikholeslami Signed (total) domination numbers and
Laplacian spectrum of graphs . . . . . . 93--99
S. Settepanella Blocking sets in the complement of
hyperplane arrangements in projective
space . . . . . . . . . . . . . . . . . 101--107
A. Lourdusamy and
C. Muthulakshmi Generalized $t$-pebbling number of a
graph . . . . . . . . . . . . . . . . . 109--120
A. Nitaj Application of ECM to a class of RSA
keys . . . . . . . . . . . . . . . . . . 121--137
M. Saha and
D. Roychowdhury Provably secure key establishment
protocol using one-way functions . . . . 139--158
A. Lizzio and
M. A. Munda Maximum embedding of a ${\rm E2}(v - w,
4, 1)$ into a ${\rm P}(v, 4, e)$ . . . . 159--166
M. Sattanathan and
R. Kala Degree prime graph . . . . . . . . . . . 167--173
Y. Cengellenmis The gray image of the cyclic codes over
${IF2}[u] / u_2 - 1$ . . . . . . . . . . 175--178
T. T. Chelvam and
S. R. Chellathurai A note on split domination number of a
graph . . . . . . . . . . . . . . . . . 179--186
S. Ferri On class $[m, n]1k$-sets in ${\rm PG}(2,
3)$ . . . . . . . . . . . . . . . . . . 187--191
Y. S. Pawar and
P. V. Patil Semiprime elements and relative
annihilators in multiplicative lattices 193--204
C. T. Artikis and
P. T. Artikis Integral part models in information
systems and educational processes . . . 205--215
C. C. Wu and
Y. L. Wu and
P. C. Yang Multiple attribute decision making
assessment on the notebook computer
industry performance . . . . . . . . . . 217--237
Y. Cengellenmis On $(1 - u_2)$-cyclic and cyclic codes
over ${\rm IF}p + u{\rm IF}p + u_2{\rm
IF}p$ . . . . . . . . . . . . . . . . . 239--243
A. Elumalai and
G. Sethuraman Gracefulness of union of cycle with
parallel chords and complete bipartite
graphs or paths . . . . . . . . . . . . 245--252
L. J. Rozario and
Md. I. Islam Performance estimation of call admission
control schemes based voice/data
integrated wireless cellular network
with customer retrials . . . . . . . . . 253--294
B. Basavanagoud and
K. G. Mirajkar On permanent graphs . . . . . . . . . . 295--311
E. S. Ismail and
N. M. F. Tahat and
R. R. Ahmad A new signature scheme based on
factoring and discrete logarithms . . . 313--318
N. J. Rad A note on $y L / t$-vertex critical
graphs . . . . . . . . . . . . . . . . . 319--322
M. Mitton On Boolean bent functions . . . . . . . 323--333
C. T. Artikis and
P. T. Artikis Discrete random sums in processes of
systemics arising in cybernetics and
informatics . . . . . . . . . . . . . . 335--345
Z. Liang and
S. Yang On DRC covering --- a survey . . . . . . 347--351
R. Padmavathy and
C. Bhagvati Performance analysis of index calculus
method . . . . . . . . . . . . . . . . . 353--371
R. Kala and
T. R. N. Vasantha Restrained bondage number of a graph . . 373--380
Z. Liang and
J. Wang Constructions of optimal packing and
covering of the complete multigraph with
applications . . . . . . . . . . . . . . 381--410
S. Alikhani and
Y. H. Peng Dominating sets of centipedes . . . . . 411--428
S. R. Hutsell and
G. W. Greenwood Efficient algebraic representation of
quantum circuits . . . . . . . . . . . . 429--449
H. Om and
T. K. Sarkar Neural network based intrusion detection
system for detecting changes in hardware
profile . . . . . . . . . . . . . . . . 451--466
V. Vilfred and
C. Jayasekaran Interchange similar self vertex
switchings in graphs . . . . . . . . . . 467--480
B. D. Acharya and
K. A. Germina and
K. L. Princy and
S. B. Rao Embedding and NP-completeness theorems
for set-graceful, topologically
set-graceful and set-sequential graphs 481--487
A. P. Kazemi On the domination number of some graphs 489--493
R. S. Lekshmi and
R. Anitha Perfect matching dominating cycle --- a
new dominating cycle . . . . . . . . . . 495--508
P. Freyre and
N. Diaz and
E. R. Morgado Some algorithms related to matrices with
entries in a finite field . . . . . . . 509--519
H. Hedayati and
Z. Jafari Connections between interval valued
fuzzy graphs and fuzzy groups with $(S,
T)$-norms . . . . . . . . . . . . . . . 521--531
P. Freyre and
N. Diaz and
E. R. Morgado Fast algorithm for the multiplication of
a row vector by a randomly selected
matrix $A$ . . . . . . . . . . . . . . . 533--549
J. Dayantis and
J.-F. Palierne Complementary results on the search of
primes from lesser primes . . . . . . . 551--559
Ikorong Anouk Gilbert Nemron A simplification of the difficult part
of the Berge last conjecture . . . . . . 561--569
Ikorong Anouk Gilbert Nemron A simple dissertation around the Berge
problem and the Hadwiger conjecture . . 571--593
C. C. Lee and
K. Y. Huang and
S. Y. Huang On-line password guessing attack on
Lu--Cao key agreement protocol for
secure authentication . . . . . . . . . 595--598
N. Daili Some probabilistic approaches to some
asymptotic prime numbers formulae . . . 599--614
C. Koukouvinos and
E. Lappas and
D. E. Simos Encryption schemes using orthogonal
arrays . . . . . . . . . . . . . . . . . 615--628
G. W. Helmy and
M. A. Ahmed and
M. N. El-Derini Using co-operating agents for partial
results protection in mobile agent
paradigm . . . . . . . . . . . . . . . . 629--647
M. C. Chiu and
L. J. Yeh and
C. H. Yeh The development of tactile testing
machine on tact switch . . . . . . . . . 649--669
R. U. Rani A novel single source shortest path
algorithm . . . . . . . . . . . . . . . 671--680
Y. Talebi and
M. S. Esmaeilifar and
S. Azizpour A kind of intersection graph of vector
space . . . . . . . . . . . . . . . . . 681--689
Md. I. Islam and
J. K. Das and
M. R. Amin Call admission scheme of mixed traffic
for mobile cellular networks . . . . . . 691--705
M. Zannetti A combinatorial characterization of
parabolic quadrics . . . . . . . . . . . 707--715
J. C. Huang and
W. T. Pan Performing stock closing price
prediction through the use of principle
component regression in association with
general regression neural network . . . 717--728
R. Sweetly and
J. Paulraj Joseph The radio number of $(W_n \colon 2)$
graphs . . . . . . . . . . . . . . . . . 729--736
R. Stangarone and
L. Verdi Cryptosystems involving one
factorizations of graphs . . . . . . . . 737--743
D. Poulakis A public key encryption scheme based on
factoring and discrete logarithm . . . . 745--752
Anonymous Index of Volume 12 (2009) . . . . . . . 753--758
Anonymous Contents --- Volume 12 Number 6 (2009) A--A
H. B. Bahar and
M. Sokouti and
B. Sokouti A first study of improving transposition
cryptosystem . . . . . . . . . . . . . . 1--9
S. Ferri Combinatorial characterizations of $(2q
+ 1)$-caps in ${\rm PG}(r, q)$ . . . . . 11--15
K. Y. Lin and
J. C. Lin and
J. M. Chen and
T. C. Wu Defense automatic malicious tools based
on navigation behavior . . . . . . . . . 17--27
R. Padmavathy and
C. Bhagvati Ephemeral key recovery using index
calculus method . . . . . . . . . . . . 29--43
M. S. Mulaudzi and
O. Akinyemi $q$-Enumeration of alternating
permutations of odd length . . . . . . . 45--67
M. Mitton Convolution and generalized difference
sets . . . . . . . . . . . . . . . . . . 69--83
N. Kobayashi and
T. Matsushima and
S. Hirasawa An accurate density evolution analysis
for a finite-state Markov channel . . . 85--97
G. Shobhalatha and
K. Suresh Lattice properties in dioids . . . . . . 99--104
S. Hirasawa and
M. Kasahara A note on performance of generalized
tail biting trellis codes . . . . . . . 105--122
H. Hedayati $t$-Implication-based fuzzy interior
hyperideals of semihypergroups . . . . . 123--140
A. K. Mohapatra and
N. Prakash Wired equivalent privacy reinvestigated 141--151
L. Cinque and
G. Iovane and
M. Manzo and
E. Sangineto Face recognition using SIFT features and
a region-based ranking . . . . . . . . . 153--170
L. Berardi and
R. Rota A construction of a key exchange
protocol . . . . . . . . . . . . . . . . 171--174
B. D. Sharma and
N. Sookoo Eigenvalues of the difference matrices
of the Lee partition . . . . . . . . . . 175--183
A. Kouadri and
L. Chiter and
M. Zelmat A radial basis function neural network
optimized through modified DIRECT
algorithm based-model for a three
interconnected water tank . . . . . . . 185--200
Anonymous Table of Contents --- Volume 13 Number 2 A--A
Y. Feng $p$-Fuzzy quasi-hypergroups obtained
from fuzzy binary relations . . . . . . 201--208
C. Porkodi and
R. Arumuganathan and
K. Vidya Single authority electronic voting based
on elliptic curves . . . . . . . . . . . 209--217
S. J. Hwang and
C. H. Chao An efficient non-interactive deniable
authentication protocol with anonymous
sender protection . . . . . . . . . . . 219--231
S. K. Pal and
S. Kapoor and
A. Arora and
R. Chaudhary and
J. Khurana Design of strong cryptographic schemes
based on Latin Squares . . . . . . . . . 233--256
B. Saxena and
S. K. Pal Some new concepts in fuzzy arithmetic 257--270
R. Li Eigenvalues, Laplacian eigenvalues, and
Hamiltonian connectivity of graphs . . . 271--275
R. Vasuki and
A. Nagarajan On the construction of new classes of
super mean graphs . . . . . . . . . . . 277--290
C. M. Fan and
C. C. Huang A note of solutions to the morphic
involution language equations . . . . . 291--298
M. J. Lee and
M. K. Kuo and
Y. R. Chen An antimagic labeling in $K2n,2n | nC4$ 299--304
Anonymous Contents --- Volume 13 Number 03 June
2010 . . . . . . . . . . . . . . . . . . A--A
S. Swapna and
A. D. Dileep and
C. C. Sekhar and
S. Kant Block cipher identification using
support vector classification and
regression . . . . . . . . . . . . . . . 305--318
S. Nagireddy and
H. A. Murthy and
S. Kant Identification of Encryption Method for
Block Ciphers using Histogram Method . . 319--328
S. Kant and
V. Sharma and
N. Verma and
B. K. Dass Identification scheme for romanized
Indian languages from their plain and
ciphered bit stream . . . . . . . . . . 329--345
S. Kant and
R. K. Asthana and
B. L. Jangid Comparative performance of the
classifiers for cryptosystem
identification . . . . . . . . . . . . . 347--368
T. Saito and
T. Matsushima and
S. Hirasawa A note on automatic construction
algorithms for orthogonal designs of
experiments using error correcting codes 369--381
T. Suko and
T. Matsushima and
S. Hirasawa Asymptotic property of universal
lossless coding for independent
piecewise identically distributed
sources . . . . . . . . . . . . . . . . 383--391
Hui-Chin Tang and
K. H. Hsieh and
Hwapeng Chang A 4217th-order multiple recursive random
number generator with modulus $2^{31} -
69$ . . . . . . . . . . . . . . . . . . 393--398
Anonymous Book Reviews . . . . . . . . . . . . . . 399--405
Anonymous Contents --- Volume 13 (04 August 2010) A--A
S. Pal and
P. Bhowmick Cubic approximation of curve-shaped
objects in $Z_2$: a generalized approach
based on discrete curvature . . . . . . 407--427
H. Po-Hsian A weight-based data hiding method for
binary image using selective binary
numeral system . . . . . . . . . . . . . 429--444
N. Vijayarangan Hard problems in elliptic curve scalar
multiplication . . . . . . . . . . . . . 445--452
B. D. Acharya and
K. A. Germina Vertex-graceful graphs . . . . . . . . . 453--463
N. Daili About binomial densities: some
applications in number theory . . . . . 465--472
O. Ferri and
S. Ferri Graphic characterizations of the
$k$-caps and $k$-arcs in ${\rm PG}(r,
q)$ . . . . . . . . . . . . . . . . . . 473--477
Hui-Chin Tang and
Kuang-Hang Hsieh and
Hwapeng Chang A 32-bit linear congruential random
number generator with prime modulus . . 479--486
P. V. Reddy and
B. U. Rao and
T. Gowri ID-based directed proxy signature scheme
from bilinear pairings . . . . . . . . . 487--500
Anonymous Contents --- Volume 13 Number 05 October
2010 . . . . . . . . . . . . . . . . . . A--A
G. Iovane and
P. Giordano and
G. Ingenito and
M. Leone and
A. Nocerino Biometric watermarking via wavelet
approach, reverse engineering in
infosecurity and dematerialization of
public administration . . . . . . . . . 501--542
M. Kures The composition of polynomials by the
substitution principle . . . . . . . . . 543--552
B. D. Acharya Signed intersection graphs . . . . . . . 553--569
L. Poinsot Doubly perfect nonlinear Boolean
permutations . . . . . . . . . . . . . . 571--582
A. P. Kazemi Every $K1,7$ and $K1,3$-free, $3$-vertex
critical graph of even order has a
perfect matching . . . . . . . . . . . . 583--591
Hui-Chin Tang and
K. H. Hsieh and
T. L. Chao A backward heuristic algorithm for
two-term multiple recursive random
number generators . . . . . . . . . . . 593--600
B. Basavanagoud and
P. V. Patil A criterion for (non-)planarity of the
transformation graph $G(xyz)$ when $xyz
= - + +$ . . . . . . . . . . . . . . . . 601--610
Anonymous Index of Volume 13 (2010) . . . . . . . 611--616
Anonymous Contents --- Volume 13 Number 06
December 2010 . . . . . . . . . . . . . A--A
T. T. Chelvam and
T. Asir A note on total graph of $Z(n)$ . . . . 1--7
M. H. Al-Towaiq and
H. K. Al-Bzoor An efficient algorithm for the solution
of second order PDE's using Taylor
expansion polynomials . . . . . . . . . 9--31
T. G. Jaíyé\colá On three cryptographic identities in
left universal Osborn loops . . . . . . 33--50
Z. Liang Coverings and packings of complete
directed graphs by odd circuits . . . . 51--75
N. Begum and
M. Alam and
Md. I. Islam Fingerprint detection based on DWT a new
approach . . . . . . . . . . . . . . . . 77--87
S. J. Peter and
S. P. Victor An integrated approach for local outlier
detection using dynamic minimum spanning
tree . . . . . . . . . . . . . . . . . . 89--106
Anonymous Contents --- Vol. 14 # 01 February 2011 A
E. Elsheh and
A. Youssef Cryptanalysis of a public key
cryptosystem based on boolean
permutations . . . . . . . . . . . . . . 107--115
C. L. Chin and
C. C. Huang Some properties of involution codes . . 117--127
E. Syahrul and
J. Dubois and
V. Vajnovszki Combinatorial transforms: Applications
in lossless image compression . . . . . 129--147
S. J. Peter Minimum spanning tree based clustering
for outlier detection . . . . . . . . . 149--166
S. J. Peter Structural similarity clustering for
detection of outliers and hubs using
minimum spanning tree . . . . . . . . . 167--183
T. C. Kao and
H. C. Tang An exhaustive analysis of two-term
multiple recursive random number
generators with double precision
floating point restricted multipliers 185--191
R. Vasuki and
A. Nagarajan Further results on super mean graphs . . 193--206
Anonymous Contents --- Vol. 14 # 02 April 2011 . . A
G. Iovane and
L. Puccio and
G. Lamponi and
A. Amorosia Electronic access key based on
innovative Information Fusion technique
involving prime numbers and biometric
data . . . . . . . . . . . . . . . . . . 207--225
S. J. Peter Structural similarity micro clustering
algorithm for local outliers and hubs
using dynamic minimum spanning tree . . 227--247
J. John and
A. Vijayan and
S. Sujitha The forcing edge covering number of a
graph . . . . . . . . . . . . . . . . . 249--259
J. Bhaumik and
D. Roy Chowdhury Nimix: An involutary nonlinear vectorial
boolean function . . . . . . . . . . . . 261--277
M. K. A. Jebitha and
J. P. Joseph Domination in transformation graph
$G-+-$ . . . . . . . . . . . . . . . . . 279--303
Anonymous Contents --- Vol. 14 # 03 June 2011 . . A
G. A. M. Abdelhady and
F. S. Helail and
A. A. Elkouny New DES based on elliptic curves . . . . 305--315
R. Amutha Performance analysis of $64$-ary
triangular quadrature amplitude
modulation . . . . . . . . . . . . . . . 317--332
D. R. Stoddart The groups H3 and H4 of a class of
certain cyclically presented groups are
$2$-generated . . . . . . . . . . . . . 333--340
H. C. Tang and
K. H. Hsieh and
C. J. Wang A partial exhaustive search for good
two-term third-order multiple recursive
random number generators . . . . . . . . 341--348
T. Karthikeyan and
S. J. Peter and
S. Chidambaranathan Meta clusters through minimum spanning
tree based clustering for performance
analysis of students . . . . . . . . . . 349--367
S. Das and
D. Roy Chowdhury On usage of cellular automata in
strengthening stream ciphers . . . . . . 369--390
N. Vijayarangan Communication protocols based on CAAA
attributes . . . . . . . . . . . . . . . 391--404
Anonymous Contents --- Vol. 14 # 04 August 2011 A
S. J. Peter A novel dynamic minimum spanning tree
based clustering method for image mining 405--419
S. Arumugam and
L. Martin Degrees and degree sequence of $k$-edge
$d$-critical graphs . . . . . . . . . . 421--429
J. Dayantis Generalised Arnold numbers and series 431--444
F. A. Eteme and
J. A. Tsimi A modal $[.\,.]$-valent approach of the
notion of code . . . . . . . . . . . . . 445--473
S. J. Peter Detection of outliers and hubs using
minimum spanning tree based on
analytical perspective of degree numbers 475--488
S. J. Peter Nonparametric search algorithm for
outliers and hubs using minimum spanning
tree . . . . . . . . . . . . . . . . . . 489--502
Anonymous Contents --- Vol. 14 # 05 October 2011 A
B. D. Sharma and
N. Sookoo Generalized Krawtchouk polynomials and
the complete weight enumerator of the
dual code . . . . . . . . . . . . . . . 503--514
H. Antonopoulou and
N. Glinos and
Y. C. Stamatiou An identity derived from the solution of
a class of differential equations for
the evolution of a key agreement
protocol . . . . . . . . . . . . . . . . 515--520
D. Ferrero and
S. Varghese and
A. Vijayakumar Power domination in honeycomb networks 521--529
R. Li A note on the average distance of a
graph . . . . . . . . . . . . . . . . . 531--536
C. K. Chen Relation between the releasing strategy
and the domestic rentals on the U.S.
Major Film . . . . . . . . . . . . . . . 537--558
Fidéle Ayissi Etémé and
Jean Arnaud Tsimi A $m \Theta$ approach of the algebraic
theory of linear codes . . . . . . . . . 559--581
S. J. Peter and
S. Chidambaranathan An efficient divisive-agglomerative
hierarchical clustering algorithm using
minimum spanning tree . . . . . . . . . 583--595
K. Zhao and
Z. Li and
D. Chen New sufficient condition and Hamiltonian
and traceable . . . . . . . . . . . . . 597--602
Anonymous Index of Volume 14 (2011) . . . . . . . 603--606
Anonymous Contents --- Vol. 14 # 06 December 2011 A