A Bibliography of Publications in the Journal of Discrete...

84
A Bibliography of Publications in the Journal of Discrete Mathematical Sciences and Cryptography Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 31 October 2012 Version 0.02 Title word cross-reference # [438, 446, 452, 460, 467, 477]. (0,n) [120]. (1, m, n) 2 [74, 121]. (1 - u 2 ) [339]. (2q + 1) [380]. (n 3 ) [16]. (q + 1) 2 [143]. (S, T ) [359]. (W n : 2) [374]. 0 [130]. 2 [19, 144, 455]. 2 31 - 69 [411]. 3 [160, 173, 427]. 3 - (2m, 2m|1, 2m|2|1) [299]. 4 [86]. 64 [454]. [..] [464]. [0, 1, m, n] 1 [143]. [0, 2, 3, 4, 5] [13]. [m, n]1k [335]. A [360]. AG(2, 7) [13]. α [64]. b [132, 156]. C 5 × C 5 [40]. C λ [14]. C pk [122]. d [462]. δ [150]. E2(v - w, 4, 1) [331]. [237]. F [64]. F λ [14]. F n [273]. G(xyz ) [429]. G - +- [451]. γ [109]. γ bi [109]. GF(N F ()) [117]. G × C 2n [86]. h/v [99]. H v [95]. IF 2[u]/u 2 - 1 [333]. IFp + uIFp + u 2 IFp [339]. K [87, 132, 163, 173, 177, 186, 200, 201, 223, 230, 231, 261, 282, 419, 462]. K1, 3 [427]. K1, 7 [427]. K2n, 2n|nC 4 [403]. l [60]. m [154, 155, 172]. 1

Transcript of A Bibliography of Publications in the Journal of Discrete...

Page 1: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

A Bibliography of Publications in the Journal ofDiscrete Mathematical Sciences and

Cryptography

Nelson H. F. BeebeUniversity of Utah

Department of Mathematics, 110 LCB155 S 1400 E RM 233

Salt Lake City, UT 84112-0090USA

Tel: +1 801 581 5254FAX: +1 801 581 4148

E-mail: [email protected], [email protected],[email protected] (Internet)

WWW URL: http://www.math.utah.edu/~beebe/

31 October 2012Version 0.02

Title word cross-reference

# [438, 446, 452, 460, 467, 477].

(0, n) [120]. (1,m, n)2 [74, 121]. (1− u2) [339]. (2q + 1) [380]. (n3) [16].(q + 1)2 [143]. (S, T ) [359]. (Wn: 2) [374]. 0 [130]. 2 [19, 144, 455].231 − 69 [411]. 3 [160, 173, 427]. 3− (2m, 2m|1, 2m|2|1) [299]. 4 [86]. 64 [454].[. .] [464]. [0, 1,m, n]1 [143]. [0, 2, 3, 4, 5] [13]. [m,n]1k [335]. A [360].AG(2, 7) [13]. α [64]. b [132, 156]. C5 × C5 [40]. Cλ [14]. Cpk [122]. d [462].δ [150]. E2(v − w, 4, 1) [331]. ε [237]. F [64]. Fλ [14]. Fn [273]. G(xyz) [429].G−+− [451]. γ [109]. γbi [109]. GF(NF (√)) [117]. G× C2n [86]. h/v [99].

Hv [95]. IF2[u]/u2 − 1 [333]. IFp+ uIFp+ u2IFp [339].K [87, 132, 163, 173, 177, 186, 200, 201, 223, 230, 231, 261, 282, 419, 462].K1, 3 [427]. K1, 7 [427]. K2n, 2n|nC4 [403]. l [60]. m [154, 155, 172].

1

Page 2: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

2

m2(h) [12]. mΘ [473]. n [168, 170, 205, 223, 273]. ω [100]. p [177, 395].P(v, 4, e) [331]. P3 [113]. PG(2, 2) [257]. PG(2, 3) [142, 257, 304, 335].PG(2s+ 1, q) [67]. PG(3, q) [9, 74, 294]. PG(4, q) [143]. PG(r, q) [380, 419].PQ [95]. q [217, 218, 383]. R(1,m) [299]. PG(2, 2) [116]. PG(2, 3) [179].PG(3, q) [121]. s [60]. SFLASHv3 [133]. σF (OF /√) [117].

t [168, 175, 205, 328, 388]. tn [161]. v [100]. xyz = −+ + [429]. yL/t [344].Z(n) [432]. Z2 [414].

-algebras [173]. -algorithm [237]. -arcs [419].-ary [132, 155, 172, 175, 177, 454]. -binomial [217, 218]. -caps [380, 419].-center [186]. -chromatic [132, 156]. -codes [150]. -cosets [64].-critical [462]. -cyclic [339]. -designs [113]. -distributive [130].-edge [462]. -Enumeration [383]. -error [177, 282]. -excellent [109].-flexible [109]. -fold [60]. -free [427]. -Fuzzy [395]. -generated [455].-hypergroups [100]. -hyperideals [200, 201]. -hyperoperations [95].-ideals [87]. -Implication-based [388]. -involution [230, 231].-languages [150]. -minimally [19]. -norms [359]. -ordered [261].[?]out-of-Chang:2006:AFE,Chang:2007:RNI. -pebbling [328].-polygroups [64]. -power [170]. -regular [86, 163]. -secure [144].-sets [143, 335]. -SFP [144]. -structures [95, 99]. -th [154]. -valent [464].-vertex [344, 427].

03 [404]. 04 [413]. 05 [422]. 06 [431].

1 [198].

2 [81]. 20-sets [13]. 2010 [404, 413, 422, 431].2011 [438, 446, 452, 460, 467, 477].

3-coloring [57]. 32-bit [188, 420]. 320 [297]. 320-bit [297].

4217th [411]. 4217th-order [411].

5 [121].

A. [260]. absolutely [179]. abstract [316]. accelerate [237].access [22, 111, 158, 196, 286, 447]. accurate [385]. actions [292].acyclic [115]. Ad [289]. adaptive [313]. Addendum [121].addressing [128]. adjacency [274]. administration [423].admission [341, 371]. AEA [63]. Affine [120, 263]. agent [367].agents [367]. agglomerative [474]. agreement [239, 364, 469]. AHP [268].Algebraic [20, 195, 234, 352, 473, 479]. algebras [20, 173].Algorithm [15, 47, 72, 107, 164, 167, 186, 222, 223, 233, 237, 241, 243, 279, 282,

Page 3: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

3

302, 306, 313, 360, 369, 393, 428, 433, 448, 466, 474].algorithms [70, 71, 77, 103, 112, 127, 140, 154, 267, 358, 409]. allied [478].allocation [71, 315]. alphabet [155]. alternating [383]. alternative [221].among [3]. amplitude [454].Analysis [126, 146, 187, 217, 218, 237, 262, 268, 297, 309, 348, 385, 444, 454, 457].analytical [204, 465]. Analyze [198]. analyzing [185]. Angularly [112].annihilators [336]. anonymous [168, 235, 397]. ant [279]. antenna [204].Anti [64]. Anti- [64]. antimagic [403]. AODV [269].Application [266, 329]. Applications [106, 297, 324, 350, 418, 441, 479].applying [306].approach [47, 53, 160, 202, 204, 251, 414, 423, 436, 437, 464, 473].approaches [314, 365]. approximate [29, 33, 295]. approximation [414].April [446]. arbitrary [94]. arcs [419]. areas [58]. arising [346].arithmetic [399]. arithmetical [11]. Arnold [463]. arrangements [327].arrays [73, 124, 167, 366]. ary [132, 155, 172, 175, 177, 454]. Ascents [298].aspects [23]. assessment [338]. assessments [25]. assignment [111].associated [94, 95, 208]. association [373]. assuming [62].asymmetric [73]. Asymptotic [217, 218, 365, 410]. ATM [248].attached [96]. attack [133, 194, 215, 364]. Attacks [146, 209, 227].attribute [338]. attributes [459]. auction [235]. August [413, 460].authenticated [239, 247].Authentication [51, 57, 60, 63, 157, 192–194, 220, 364, 397]. authority [396].automata [458]. automatic [381, 409]. automation [96]. automobile [251].average [471]. aware [285]. AWGN [280].

backward [428]. Baer [101]. balanced [75, 80, 85, 154, 172, 177, 212, 283].ballot [175]. ballot-sequences [175]. Banach [307].based [27, 57, 69, 71, 72, 78, 79, 107, 110, 123, 158, 186, 192–194, 205, 209, 215, 220, 236, 254, 265, 269, 312, 314, 341, 343, 353, 376, 381, 388,390, 393, 396, 398, 414, 415, 421, 436, 439, 442, 447, 453, 457, 459, 461, 465].based-model [393]. bases [166, 208]. basis [393]. beam [322].behavior [381]. Benes [228]. Bent [184, 345]. Berge [362, 363].between [41, 117, 270, 290, 359, 472]. bilinear [421].binary [55, 282, 301, 395, 415]. binomial [217, 218, 418]. Biometric [423, 447].bipartite [169, 340]. bit [188, 297, 407, 420]. biting [180, 387]. Black [43].blict [52, 149]. Blind [51, 53, 106, 123]. blitact [52, 149].Block [19, 47, 80, 127, 180, 185, 212, 288, 405, 406]. block-stepwise [185].Blocking [1, 8, 61, 104, 252, 327]. bondage [5, 349]. Book [412].boolean [75, 118, 187, 210, 211, 273, 274, 308, 345, 426, 439, 450].Bound [45, 138]. bounds [118, 180]. box [136, 216]. boxes [255].branching [62]. broadcast [189]. Bruijn [65]. Brute [227]. buckets [125].Burkard [176]. burst [102, 138].

CAAA [459]. Calculating [242]. calculation [267]. calculus [348, 382].

Page 4: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

4

Call [341, 371]. cameras [320]. Canonical [100]. Cao [364]. caps [380, 419].case [45, 59]. cash [207]. categoric [41]. categories [88]. caterpillars [156].Cayley [229, 274]. CDMA [254, 280]. cellular [315, 322, 341, 371, 458].center [186]. centipedes [351]. centralizers [114]. certain [1, 166, 455].changes [353]. channel [315, 385].Characterization [2, 9, 16, 84, 101, 139, 170, 195, 372].Characterizations [130, 257, 294, 380, 419]. Chinese [89]. chords [340].chromatic [132, 156, 295]. cipher [110, 127, 271, 277, 405]. ciphered [407].Ciphers [406, 458]. circuits [352, 435]. circulant [140]. circular [204].class [13, 98, 143, 234, 291, 329, 335, 455, 469]. Classes [11, 270, 401].classification [126, 151, 173, 405]. Classifications [76]. classifiers [408].cliques [213]. closed [48]. closing [373].clustering [442, 443, 448, 457, 461, 474]. clusters [457]. co [219, 367].co-induction [219]. co-operating [367]. COA [122].code [63, 108, 299, 311, 464, 468]. codes [55, 80, 82, 114, 144, 150, 154, 155, 172,180, 182, 208, 214, 230, 231, 259, 333, 339, 387, 409, 440, 473]. Codeword [190].coding [51, 154, 199, 410]. collective [76]. colony [279]. coloring [57].Combinatorial [84, 101, 135, 139, 154, 270, 283, 372, 380, 441]. combined [55].Comments [194]. Common [134, 245]. Communication [459].Commutative [94, 134]. Comparative [126, 408]. Comparing [314].comparison [322]. compiler [219]. complement [92, 327].Complementary [141, 232, 293, 361].complete [132, 156, 197, 340, 350, 435, 468]. completely [54].completeness [355]. complex [154]. complexity [21, 177, 180, 282].component [373]. composite [316]. Composition [265, 424].compression [441]. computation [107, 117]. computational [126].computationally [79]. computations [72]. computer [275, 338].computerized [251]. Computing [24]. concatenated [180].concepts [399]. concurrent [107]. condition [176, 475]. conditional [35].conditions [38]. cones [9]. conference [283]. configuration [16].configurations [50]. conflict [309]. congruential [188, 420].conjecture [296, 300, 316, 362, 363]. Connected [171].Connections [41, 359]. connectivity [400]. consistent [320].consonant [128]. Construct [63]. constructed [214].constructing [72, 243, 283].construction [73, 90, 136, 140, 177, 212, 284, 391, 401, 409].Constructions [135, 350]. containing [83].Contents [378, 394, 404, 413, 422, 431, 438, 446, 452, 460, 467, 477].Control [22, 36, 78, 111, 196, 341]. controllability [108]. convergence [237].Convolution [384]. cooperative [36]. core [279]. cores [140].correcting [409]. correction [55, 138]. correctness [219].correlation [146, 284]. corruption [31]. cosets [64]. cototal [18].counting [234]. cover [115, 162]. covering [68, 82, 118, 264, 347, 350, 449].Coverings [435]. criterion [429]. critical [344, 427, 462]. crossing [10, 197].

Page 5: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

5

Cryptanalysis [439]. crypto [236]. cryptographic [111, 124, 216, 398, 434].Cryptography [121, 158, 247, 263, 286, 289, 292, 312]. cryptology [153].cryptosystem [205, 215, 379, 408, 439]. Cryptosystems [66, 103, 375].Cubic [142, 257, 294, 414]. cubics [116, 179]. cubs [83]. curvature [414].curve [153, 247, 250, 414, 416]. curve-shaped [414].curves [142, 257, 396, 453]. customer [341]. cybernetics [346].cycle [340, 357]. cyclic [333, 339]. cyclically [455].

D [160]. data [70, 77, 112, 203, 266, 341, 415, 447]. December [431, 477].decision [32, 338]. decoding [180, 190]. decomposable [54]. Defense [381].defining [163]. defuzzification [122]. Degree [174, 332, 462, 465].Degrees [462]. delay [71]. dematerialization [423]. deniable [397].densities [418]. density [102, 385]. derivable [80]. derivation [241].derivations [6]. derivative [11]. derived [124, 469]. descents [298].Design [78, 172, 212, 251, 252, 283, 299, 398]. designated [206].designs [8, 80, 113, 135, 161, 166, 185, 409]. detecting [353].Detection [55, 102, 160, 164, 183, 279, 353, 436, 437, 442, 443, 465].determinant [3]. determinants [17]. determining [62].Development [3, 309, 368]. diagnosis [32]. Diameter [105, 249].difference [384, 392]. differences [3]. differential [469]. difficult [362].Diffraction [70, 77, 112]. digital [69, 266]. Dimension [210, 211].dioids [386]. direct [7, 393]. directed [421, 435]. Dirichlet [14].Discrete [26, 59, 69, 121, 195, 220, 343, 346, 376, 414, 478]. dissertation [363].distance [46, 259, 471]. distinguishability [190]. distortion [51].Distributed [36, 410]. distribution [34, 324]. distributions [23].distributive [130]. diversity [190]. divisible [161, 207]. divisive [474].divisive-agglomerative [474]. DNA [72, 107, 289]. documents [27].domains [221]. domestic [472]. Dominating [351, 357].Domination [18, 174, 186, 232, 240, 244, 245, 326, 334, 356, 451, 470].double [444]. Doubly [182, 426]. doubly-even [182]. DRC [347].DS [254, 280]. DS-CDMA [254, 280]. DSA [303].dual [86, 182, 214, 297, 468]. DWT [436]. Dynamic [181, 315, 437, 448, 461].

each [3]. ECM [329]. economies [34]. Edge [56, 65, 225, 226, 246, 449, 462].educational [337]. EEG [126]. effective [117].Efficient [154, 155, 167, 193, 235, 352, 397, 433, 474]. Eigenvalues [392, 400].Electronic [168, 207, 396, 447]. elements [3, 242, 336].elliptic [67, 153, 247, 250, 396, 416, 453]. embeddability [191].Embedding [169, 331, 355]. Encryption [147, 203, 266, 288, 366, 376, 406].engineering [423]. English [128]. enhanced [194].Enhancement [30, 196, 220]. entries [358]. entropy [6, 62].Enumeration [383]. Enumerations [197]. enumerator [468].environments [122, 193, 280]. Ephemeral [382].equations [131, 149, 402, 469]. equitable [317]. equivalence [290].

Page 6: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

6

equivalent [389]. Errata [310]. error [55, 102, 138, 177, 180, 282, 409].Essentially [60]. establishment [330]. estimation [341]. evaluating [122].evaluation [280]. even [182, 427]. events [25]. Every [109, 427].evolution [385, 469]. evolutionary [313]. Exact [29, 132]. excellent [109].exceptions [111]. exchange [247, 391]. exhaustive [444, 456]. existence [1].expansion [217, 218, 433]. experiments [409]. Exploring [114].Exponential [180]. expression [160, 308]. Extended [181, 286, 303].extending [163]. Extension [301]. extensions [34]. Extremal [37, 75, 182].

Face [160, 314, 390]. facial [160]. factorial [23].factoring [69, 209, 302, 343, 376]. factorization [123]. factorizations [375].Fail [123, 281]. Fail-stop [123, 281]. families [134]. Fano [83]. Farey [22].Fast [146, 360]. Fault [215]. feasibility [47]. features [390]. February [438].Fermat [224]. Fibonacci [42, 267, 270, 272]. field [159, 358]. fields [214].fighter [306]. Film [472]. finding [222, 224]. Fingerprint [436].finite [45, 120, 184, 242, 358, 385]. finite-state [385]. first [299, 379].fixed [134, 307]. flexible [109, 168]. floating [444]. fold [60]. force [227].forcing [449]. formulae [365]. fortification [93]. four [311].Fourier [26, 187]. fractions [22]. frauds [51]. free [427]. friendly [233, 316].function [3, 110, 297, 393, 450]. functional [131]. functions [11, 14, 75, 118,157, 184, 187, 195, 210, 211, 217, 218, 227, 273, 274, 330, 345].Fundamentals [199]. Further [268, 305, 445]. Fusion [447]. fuzziness [4].Fuzzy [7, 25, 41, 58, 64, 122, 320, 359, 388, 395, 399].

Galois [9, 24]. general [207, 373]. Generalised [463].generalization [17, 260]. generalizations [165].Generalized [42, 50, 71, 148, 203, 328, 384, 387, 414, 468]. generated [455].generating [217, 218]. Generation [175, 250, 308]. generator [411, 420].generators [114, 188, 428, 444, 456]. genesis [17]. Genetic [140, 233, 313].geodetic [225]. Geodomination [171, 321]. geometric [160].geometry [126]. Germain [316]. Gilbert [45]. Goldbach [296, 316].golden [159]. good [456]. governed [36]. graceful [291, 300, 355, 417].Gracefulness [340].Graph [5, 18, 44, 48, 52, 68, 86, 109, 141, 149, 169, 174, 225, 226, 229, 243, 244,246, 274, 276, 290, 295, 328, 332, 334, 349, 370, 427, 429, 432, 449, 451, 471].Graphic [9, 257, 294, 419]. graphical [17]. graphoidal [28, 68, 115].Graphs [10, 12, 19, 28, 41, 46, 56, 65, 105, 115, 149, 151, 156, 163, 171, 176, 197,213, 232, 240, 249, 256, 261, 278, 300, 301, 305, 317, 321, 323, 326, 340, 342, 344,354–356, 359, 374, 375, 400, 401, 417, 425, 435, 445, 462]. gray [333]. grey [262].Grobner [166, 208]. group [161, 184, 250]. groups [242, 359, 455].GSIC [254]. guessing [364].

H3 [455]. H4 [455]. Hadamard [125, 140, 182, 191, 214]. Hadwiger [363].Hamiltonian [107, 229, 261, 400, 475]. Hammer [176]. Hanoi [241].

Page 7: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

7

Hard [416]. hardware [353]. hash [110, 157, 227, 297]. hashing [128].heuristic [428]. Hidden [318]. hiding [79, 221, 415]. hierarchical [196, 474].hierarchy [111, 189]. High [102, 155]. High-density-burst [102].high-order [155]. highly [30]. Hill [277]. Histogram [406]. historical [17].hoc [289]. honeycomb [470]. hubs [443, 448, 465, 466]. HV [293].HV-rings [293]. hyper [87, 173, 183]. hyper-Latin [183].hypergraphs [41, 85]. Hypergroupoids [66, 91].hypergroups [88, 90, 92–94, 96, 100, 104, 395]. hyperideals [200, 201, 388].hypermodules [88]. hyperoperations [95]. hyperplane [327].hyperrings [97, 98]. hyperstructures [89, 293, 479]. hypothesis [318].

ICA [254]. ID [193, 421]. ID-based [193, 421]. IDEA [110]. ideals [87].identically [410]. Identification [126, 167, 193, 405–408]. identifying [278].Identikit [265]. identities [93, 195, 434]. identity [312, 469].identity-based [312]. II [77, 321]. III [112].Image [27, 202, 313, 333, 415, 441, 461]. imaging [70, 77, 112].Implication [388]. implicative [87]. Improved [15, 69, 267, 279, 313].improvement [146]. improving [379]. improvised [277]. incidence [20].incomplete [80, 212]. independent [410].Index [78, 258, 319, 348, 377, 382, 430, 476]. Indian [407]. Indices [216].induction [219]. industry [338]. Inequivalent [125]. inferences [76].informatics [346]. Information [53, 79, 131, 221, 288, 318, 337, 447].infosecurity [423]. inner [180]. innovative [447]. insecure [239].integer [123, 223]. integers [223, 324]. Integral [275, 337]. integrals [35].integrated [341, 437]. Interaction [183]. interactive [205, 397].Interchange [354]. interconnected [393]. interior [388]. interleaved [284].intersection [370, 425]. Intersections [113]. interval [359].intractability [57]. intractable [79]. intrusion [353]. invariant [114, 172].Inverse [240]. inverses [129, 325]. inversion [70, 77]. involutary [450].involution [230, 231, 402, 440]. involutions [229]. involving [375, 447].IPv6 [153]. irreducible [16, 83, 116, 179]. isomorphic [167].isomorphism [270]. isomorphisms [117]. iterative [15, 146].

J [121]. JERIM [297]. JERIM-320 [297]. joined [323]. joint [282].judgements [49]. June [404, 452].

Kernel [108]. Key [22, 111, 133, 189, 203, 220, 236, 239, 247, 285, 292, 330, 364,376, 382, 391, 439, 447, 469]. Key-lock [22]. Keyed [81, 157].Keyed/unkeyed [81]. keying [103]. keys [128, 307, 329]. kind [370].kinds [87]. King [204]. Klein [59]. Krawtchouk [468].

labeling [137, 256, 276, 278, 317, 320, 403]. Laceability [46]. Landau [157].Landmark [265]. Landmark-based [265]. Landmarks [178]. lane [264].language [402]. languages [29, 150, 407]. Laplacian [326, 400].

Page 8: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

8

large [1, 177]. last [362]. Latin [183, 398]. Lattice [386]. lattices [222, 336].layout [228]. LDA [314]. leakage [288]. Lee [138, 392]. left [434].length [383]. less [34]. lesser [238, 361]. letter [128]. letter-oriented [128].level [60, 135, 166]. Li [196]. LICoS [265]. Lict [226]. light [166].limitation [145]. limited [112]. line [3, 149, 255, 301, 364].line-splitting [301]. linear [21, 40, 47, 114, 177, 188, 208, 242, 282, 420, 473].lines [61, 139]. Linux [127]. local [437, 448]. locating [169]. location [285].location-aware [285]. lock [22]. logarithm [376]. logarithms [69, 220, 343].logic [320]. long [47, 210, 211]. loop [204]. loops [434]. lossless [410, 441].Low [284, 288]. LSB [169]. Lu [364]. Lucas [272].

machine [368]. magic [137]. Major [472]. making [338]. malicious [381].management [189, 285, 312]. MANETs [289]. Markov [385].massively [72]. matching [29, 107, 357, 427]. Math [121].Mathematical [241, 309]. mathematics [478].matrices [17, 125, 129, 140, 182, 214, 325, 358, 392].matrix [29, 203, 268, 274, 360]. matroids [301]. maximal [176].maximally [75]. Maximum [83, 174, 197, 331]. Mean [256, 278, 401, 445].measurable [131]. measure [216]. measures [62]. mechanism [22, 196].medical [32]. Mersenne [316]. message [63, 157, 198, 318]. Meta [457].metacirculant [151]. Method [15, 122, 136, 185, 262, 348, 382, 406, 415, 461].methodology [152]. methods [126, 212]. micro [448].Minimal [1, 8, 72, 274]. minimally [19]. minimization [78].Minimum [115, 190, 437, 442, 443, 448, 457, 461, 465, 466, 474]. mining [461].mixed [124, 135, 371]. mixed-level [135]. Mixer [271].mobile [193, 289, 315, 322, 367, 371]. modal [464]. mode [128, 147].model [31, 34, 59, 71, 318, 393]. models [70, 275, 290, 337]. modified [23, 393].modulation [454]. moduli [302]. modulus [411, 420]. morphic [402].morphisms [90]. Motion [320]. Muller [299]. Multi [107, 197, 235, 241, 312].Multi-identity [312]. multi-partite [197]. multi-peg [241].multi-round [235]. multi-string [107]. multi-text [107]. multigraph [350].Multiple [307, 320, 338, 411, 428, 444, 456]. multiplication [360, 416].Multiplicative [11, 14, 97, 293, 336]. multipliers [188, 444]. multirate [254].multisequences [282]. mutants [308]. mutual [193, 239].

navigation [381]. necessary [176]. neighbourhood [48]. Nested [80, 161].network [126, 248, 322, 341, 353, 373, 393].Networks [178, 228, 239, 285, 289, 315, 371, 470]. Neural [126, 353, 373, 393].Nimix [450]. no [121]. noisy [30]. non [1, 8, 205, 304, 397, 429]. non- [429].non-existence [1]. non-interactive [205, 397]. non-symmetric [8].nonabelian [184]. nonhamiltonian [176]. nonlinear [34, 75, 255, 426, 450].nonouterplanar [19]. Nonparametric [466]. normal [64]. norms [359].Note [2, 42, 68, 85, 91, 141, 311, 334, 344, 387, 402, 409, 432, 471].notebook [338]. notes [272]. nothing [34]. notion [464].

Page 9: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

9

novel [269, 289, 369, 461]. NP [269, 355]. NP-based [269].NP-completeness [355]. null [155].Number [18, 44, 68, 83, 132, 156, 188, 222, 225, 244–246, 249, 295, 310, 328, 334,349, 356, 374, 378, 394, 404, 411, 418, 420, 422, 428, 431, 444, 449, 456].numbers [5, 10, 42, 58, 197, 267, 316, 326, 365, 447, 463, 465]. numeral [415].Numerical [11, 204].

objects [320, 414]. oblivious [205, 221]. observer [78]. observer-based [78].obtained [278, 395]. October [422, 467]. odd [59, 383, 435]. On-line [364].one [106, 110, 330, 375]. one-time [106]. one-way [110, 330]. online [286].operating [127, 367]. operation [153, 268, 301]. operations [275].operator [36]. optimal [135, 169, 243, 350]. optimality [38].optimization [219, 279]. optimized [393].order [38, 59, 96, 155, 173, 299, 311, 411, 427, 433, 456]. ordered [90, 261].orders [242]. oriented [128]. original [316].Orthogonal [39, 73, 124, 167, 287, 366, 409]. Osborn [434]. outlier [437, 442].outliers [443, 448, 465, 466].

packet [71]. packing [350]. packings [435]. padding [288]. pair [22].pairings [421]. pairs [224]. parabolic [372]. paradigm [289, 367].paradox [34]. Parallel [72, 175, 243, 283, 306, 340]. parallelism [113].parameter [12]. parameters [174, 276]. part [275, 337, 362].partial [367, 456]. partite [197]. partition [392]. partitioning [202, 223].partitions [324]. password [194, 364]. Path [105, 107, 162, 369].paths [229, 340]. patterns [234]. pay [189]. pay-TV [189]. PDE [433].Pebbling [40, 328]. peg [241]. IP [248]. pentadiagonal [325].Perfect [255, 259, 316, 357, 426, 427].Performance [127, 248, 280, 322, 338, 341, 348, 387, 408, 454, 457].Performing [373]. Periphery [213]. permanent [342].permutation [172, 234, 300].permutations [17, 43, 148, 272, 273, 383, 426, 439]. person [126].perspective [465]. piecewise [410]. plain [407]. planar [226].Planarity [323, 429]. plane [83, 120, 306, 311]. planes [2].point [51, 162, 245, 279, 307, 444]. points [83, 134]. Polya [324].polygroups [64]. polynomial [274]. Polynomials [37, 97, 152, 424, 433, 468].poset [130]. positive [87, 223]. possessing [62]. Power [132, 156, 170, 470].precedents [17]. precision [444]. prediction [373]. preferences [76].prefix [164, 170]. presented [455]. prevention [31]. price [373].primary [7]. prime [7, 214, 332, 365, 420, 447]. primes [159, 238, 316, 361].Primitive [152]. principle [373, 424]. privacy [389]. Private [244].probabilistic [365]. probability [4, 25, 55].problem [33, 47, 57, 107, 151, 186, 264, 363]. problems [37, 79, 199, 324, 416].procedure [49]. processes [337, 346]. processing [26, 27]. product [21].profile [353]. programming [40]. projections [47]. projective [2, 311, 327].

Page 10: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

10

properties [119, 141, 154, 234, 250, 386, 440]. property [62, 410].protected [209]. protection [367, 397].protocol [57, 235, 247, 269, 330, 364, 391, 397, 469]. protocols [459].Provably [209, 330]. Proxy [145, 209, 281, 421]. proxy-protected [209].pseudorandom [250]. Public [236, 292, 376, 423, 439]. public-key [236].purposes [126].

quadratic [78, 159]. quadrature [454]. quadric [9, 84]. quadrics [67, 372].quantum [352]. quartics [304]. Quasi [10, 91, 395].quasi-hypergroups [395]. quasi-Steiner [91]. Quasi-total [10].quasigroups [61]. quaternion [26].

Rabin [302]. radial [393]. radicals [20]. radii [118]. Radio [249, 374].radius [82]. rake [280]. Ramanujan [157].Random [77, 188, 275, 288, 290, 298, 346, 411, 420, 428, 444, 456].randomized [203]. Randomizing [147]. randomly [360]. rank [259].Ranking [58, 390]. rate [51, 71]. rate-based [71]. rate-distortion [51].ratio [49, 58]. Re [103]. Re-keying [103]. real [255]. real-line [255].realistic [207]. receiver [254, 280]. reciprocal [24].recognition [160, 314, 390]. reconstruction [56]. recovery [382].rectilinear [197]. recurring [21]. recursive [411, 428, 444, 456].Redei [61, 165]. Reed [299]. refinement [15]. reformulation [296].region [390]. region-based [390]. regression [373, 405].Regular [44, 86, 163]. reinvestigated [389]. related [230, 231, 358].Relation [472]. relations [395]. relative [58, 336]. releasing [472].remark [253]. rentals [472]. Renyi [260]. Representation [62, 159, 352].residue [236]. resolution [77, 309]. respect [213]. Restrained [349].restricted [444]. result [260]. results [43, 305, 361, 367, 445]. retrials [341].Retrieval [265]. reverse [423]. Reviews [412]. revocation [281].Rijndael [215]. ring [14]. rings [24, 236, 293]. Robust [205].romanized [407]. rooted [291]. roots [154]. round [235]. routes [222].routing [269, 289]. row [360]. RSA [205, 302, 329]. rule [17]. runs [210, 211].

S [136, 216, 255]. S-box [136, 216]. S-boxes [255]. Sarrus [17]. scalar [416].scale [34]. schedule [198, 283]. scheduling [71].scheme [69, 110, 111, 123, 158, 168, 193, 194, 203, 221, 234, 239, 269, 281, 285,286, 288, 343, 371, 376, 407, 421]. schemes [17, 124, 145, 209, 220, 341, 366, 398].Schrodinger [36]. Sci [121]. scope [34]. SDMA [322].search [238, 361, 456, 466]. Second [38, 433]. secret [169, 206]. section [159].Secure [60, 79, 144, 209, 285, 289, 330, 364]. secured [313]. securing [27].Security [196, 220, 269]. Segre [253]. selected [360]. selective [415].Self [182, 214, 354]. Self-dual [182, 214]. semientire [226]. semigroup [292].semihypergroups [388]. semihyperrings [200, 201]. Semiprime [336].semirings [292]. semitotal [19]. semitotal-block [19]. sender [397].

Page 11: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

11

sensor [285]. separation [53]. sequence [177, 250, 462].sequences [21, 175, 284]. sequential [355]. series [23, 217, 218, 463].session [283]. set [242, 252, 305, 355]. set-graceful [355].set-sequential [355]. set-valued [305].sets [1, 8, 13, 61, 74, 104, 120, 121, 143, 195, 230, 231, 284, 327, 335, 351, 384].SFP [144]. SHA [63, 81, 198]. SHA-1 [198]. SHA-2 [81]. Shannon [6].shaped [414]. sharing [206]. Sharpening [45]. shift [284].shortest [222, 369]. shuffling [202]. SIFT [314, 390]. signal [26, 284].signals [30]. signature [69, 106, 123, 145, 206, 209, 281, 287, 343, 421].Signed [326, 425]. similar [354]. similarity [443, 448]. simple [243, 363].simplex [80, 82]. simplification [362]. simultaneous [47]. Single [369, 396].singular [116, 179, 304]. singularity [217, 218]. size [252]. sizes [54].skew [139, 214]. skew-Hadamard [214]. solid [138]. solution [33, 433, 469].solutions [131, 402]. Some [6, 23, 34, 37, 41, 43, 73, 74, 87, 116, 121, 127, 131,135, 165, 214, 234, 257, 272, 302, 356, 358, 365, 399, 418, 440]. Sophie [316].source [53, 369]. sources [410]. space [4, 9, 327, 370].spanning [72, 243, 437, 442, 443, 448, 457, 461, 465, 466, 474]. spatial [221].special [234]. specific [185]. spectral [155]. spectral-null [155].spectrum [161, 163, 326]. speech [30]. Split [5, 334]. splitting [301].square [17, 164, 222, 229]. squares [159, 183, 398]. state [385]. static [285].statistical [297]. Steiner [91, 120, 246]. steps [47]. stepwise [185].stock [373]. stop [123, 281]. strategy [472]. stream [271, 407, 458].strength [216]. strengthening [458]. string [107, 164]. Strong [93, 163, 398].Structural [443, 448]. structure [78, 208]. structures [90, 95, 99, 158, 286].STS [158, 286]. students [457]. study [127, 204, 212, 261, 306, 379]. sub [64].sub- [64]. subgroups [41]. subhypergroups [41]. subhypermodules [7].sublinear [164]. subsets [41]. subspaces [101]. substitution [133, 169, 424].sufficient [475]. sum [7, 223]. sums [65, 159, 275, 346].super [77, 137, 401, 445]. super-resolution [77]. supersaturated [135, 185].Support [32, 54, 405]. survey [56, 347]. Suspect [265]. suspension [251].switch [368]. switchings [354]. symbol [172].symmetric [8, 73, 103, 127, 252, 307]. symmetry [62]. synthesizing [49].system [32, 127, 236, 251, 306, 353, 415]. Systematic [202]. systemics [346].systems [26, 36, 54, 60, 120, 189, 254, 275, 337].

Table [394]. tact [368]. tactile [368]. tail [180, 387]. tank [393].Taylor [433]. TCP [248]. TCP/IP [248]. technique [203, 206, 447].techniques [27]. term [428, 444, 456]. testing [152, 318, 368].tetravalent [151]. text [107]. th [154]. THBL [306].their [25, 90, 163, 250, 407]. theorem [35, 165, 253, 307, 324]. theorems [355].theoretic [53, 318]. Theoretical [118]. Theory [51, 131, 172, 418, 473].third [456]. third-order [456]. three [249, 283, 322, 393, 434].three-parallel [283]. threshold [119, 221, 236]. time [106, 145, 164, 264].timestamp [194]. timestamp-based [194]. tomographic [70, 77, 112].

Page 12: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 12

tools [381]. topics [478]. topologically [355]. torus [178].total [10, 19, 48, 232, 240, 326, 432]. total-block [19]. Tower [241].traceable [475]. tracking [320]. traffic [322, 371]. transfer [205].transferable [207]. transform [26]. transformation [263, 429, 451].transformations [134, 192]. transforms [441]. Translation [35].transportation [33]. Transposition [92, 93, 379]. trapezoid [243].tree [132, 141, 243, 437, 442, 443, 448, 457, 461, 465, 466, 474].trees [72, 175, 291, 298]. trellis [180, 387]. Triangular [256, 454]. tribes [22].tridiagonal [129]. triple [54, 120]. TV [189]. twin [316]. twisted [294].two [61, 139, 140, 159, 166, 278, 322, 428, 444, 456]. two-term [428, 444, 456].type [74, 120, 121, 161, 185, 199].

U.S. [472]. unbalanced [33]. unconditionally [285]. undetected [55].Uniform [13]. union [340]. unique [115]. units [24]. unity [154].universal [410, 434]. unkeyed [81]. upon [221]. Upper [118, 279].usage [458]. use [207, 373]. used [55]. useful [131]. User [57, 193, 233].User-friendly [233].Using [22, 40, 166, 203, 206, 217–219, 262, 279, 292, 307, 313, 320, 330, 366, 367,382, 390, 405, 406, 409, 415, 433, 437, 443, 448, 465, 466, 474].

valent [464]. valued [305, 359]. values [132]. variables [273]. Various [17].Varshamov [45]. VC [211]. VC-dimension [211]. vector [360, 370, 405].vectorial [450]. Verification [219]. verifier [206]. Veronesean [84].version [277]. Vertex [137, 317, 344, 354, 417, 427]. Vertex-graceful [417].vertex-magic [137]. via [126, 318, 423]. view [51]. vision [320].visual [124, 158, 286]. VLSI [228]. voice [341]. voice/data [341].Vol. [438, 446, 452, 460, 467, 477].Volume [258, 310, 319, 377, 378, 394, 404, 413, 422, 430, 431, 476].voting [168, 396]. Vowel [128]. Vowel-consonant [128].

Walsh [187]. water [393]. watermarking [221, 423]. wavelet [192, 423].wavelets [39]. way [110, 330]. weakly [7]. weight [138, 415, 468].weight-based [415]. Weighted [169]. Weighting [262]. Which [104, 172].Wiener [35]. windows [264]. Wired [389]. wireless [248, 341].without [62]. WLT [194]. words [170].

Yang [196]. Yeh [35].

ReferencesInnamorati:1998:NEC

[1] Stefano Innamorati. The non-existence of certain large minimal blockingsets. Journal of Discrete Mathematical Sciences and Cryptography, 1(1):

Page 13: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 13

1–26, 1998. CODEN ???? ISSN 0972-0529.

Zannetti:1998:NCP

[2] Mauro Zannetti. Note on a characterization of projective planes. Journalof Discrete Mathematical Sciences and Cryptography, 1(1):27–28, 1998.CODEN ???? ISSN 0972-0529.

Monaco:1998:DDF

[3] Giuseppe Monaco and Antonio Monaco. Development of a determinantin function of the differences among the elements of each line. Journalof Discrete Mathematical Sciences and Cryptography, 1(1):29–47, 1998.CODEN ???? ISSN 0972-0529.

Prasad:1998:FPS

[4] S. K. Prasad. On fuzziness in a probability space. Journal of DiscreteMathematical Sciences and Cryptography, 1(1):73–77, 1998. CODEN ????ISSN 0972-0529.

Kulli:1998:SBN

[5] V. R. Kulli, B. Janakiram, and Radha R. Iyer. Split bondage numbers ofa graph. Journal of Discrete Mathematical Sciences and Cryptography, 1(1):79–84, 1998. CODEN ???? ISSN 0972-0529.

Nath:1998:SDS

[6] Prem Nath, M. M. Kaur, and Ranjeet Singh. Some derivations of theShannon entropy. Journal of Discrete Mathematical Sciences and Cryp-tography, 1(1):85–100, 1998. CODEN ???? ISSN 0972-0529.

Ameri:1998:FDS

[7] R. Ameri and M. M. Zahedi. Fuzzy direct sum and fuzzy (weakly) primeand primary subhypermodules. Journal of Discrete Mathematical Sciencesand Cryptography, 1(2-3):101–116, 1998. CODEN ???? ISSN 0972-0529.

Berardi:1998:MBS

[8] Luigia Berardi and Fulvio Zuanni. On minimal blocking sets in non-symmetric designs. Journal of Discrete Mathematical Sciences and Cryp-tography, 1(2-3):117–125, 1998. CODEN ???? ISSN 0972-0529.

Ferri:1998:GCQ

[9] Osvaldo Ferri and Stefania Ferri. Graphic characterization of quadriccones in a Galois space PG(3, q). Journal of Discrete Mathematical Sci-ences and Cryptography, 1(2-3):127–131, 1998. CODEN ???? ISSN 0972-0529.

Page 14: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 14

Basavanagoud:1998:QTG

[10] B. Basavanagoud. Quasi-total graphs with crossing numbers. Journal ofDiscrete Mathematical Sciences and Cryptography, 1(2-3):133–142, 1998.CODEN ???? ISSN 0972-0529.

Palumbo:1999:CAM

[11] Biagio Palumbo. Classes of arithmetical multiplicative functions and nu-merical derivative. Journal of Discrete Mathematical Sciences and Cryp-tography, 2(1):1–20, 1999. CODEN ???? ISSN 0972-0529.

Gionfriddo:1999:PG

[12] Lucia Gionfriddo. On the parameter m2(h) for graphs. Journal of DiscreteMathematical Sciences and Cryptography, 2(1):31–34, 1999. CODEN ????ISSN 0972-0529.

Abatangelo:1999:USC

[13] L. Maria Abatangelo and Manuela Erroi. Uniform 20-sets of class[0, 2, 3, 4, 5] in AG(2, 7). Journal of Discrete Mathematical Sciences andCryptography, 2(1):35–44, 1999. CODEN ???? ISSN 0972-0529.

diGennaro:1999:MFD

[14] Fernando di Gennaro and Salvatore Furneri. On Cλ and Fλ multiplicativefunctions in Dirichlet ring. Journal of Discrete Mathematical Sciences andCryptography, 2(1):59–72, 1999. CODEN ???? ISSN 0972-0529.

Al-Towaiq:1999:IAI

[15] M. H. Al-Towaiq. An improved algorithm for the iterative refinementmethod. Journal of Discrete Mathematical Sciences and Cryptography, 2(1):73–76, 1999. CODEN ???? ISSN 0972-0529.

Teodori:1999:CIC

[16] Nicola Teodori. A characterization of irreducible configuration (n3).Journal of Discrete Mathematical Sciences and Cryptography, 2(1):77–83,1999. CODEN ???? ISSN 0972-0529.

Monaco:1999:VGP

[17] Giuseppe Monaco and Antonio Monaco. Various genesis of permutations;determinants; square matrices as graphical schemes; generalization of Sar-rus’ rule and its historical precedents. Journal of Discrete MathematicalSciences and Cryptography, 2(2-3):141–177, 1999. CODEN ???? ISSN0972-0529.

Page 15: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 15

Kulli:1999:CDN

[18] V. R. Kulli, B. Janakiram, and Radha R. Iyer. The cototal dominationnumber of a graph. Journal of Discrete Mathematical Sciences and Cryp-tography, 2(2-3):179–184, 1999. CODEN ???? ISSN 0972-0529.

Akka:1999:MNS

[19] D. G. Akka and M. S. Patil. 2-minimally nonouterplanar semitotal-blockgraphs and total-block graphs. Journal of Discrete Mathematical Sciencesand Cryptography, 2(2-3):185–196, 1999. CODEN ???? ISSN 0972-0529.

Spiegel:1999:ARI

[20] Eugene Spiegel. Algebraic radicals and incidence algebras. Journal ofDiscrete Mathematical Sciences and Cryptography, 2(2-3):197–204, 1999.CODEN ???? ISSN 0972-0529.

Morgari:2000:LCP

[21] Guglielmo Morgari, Oscar Steila, and Michele Elia. On the linear complex-ity of product sequences of linear recurring sequences. Journal of DiscreteMathematical Sciences and Cryptography, 3(1-3):1–9, 2000. CODEN ????ISSN 0972-0529. Discrete mathematics and allied topics.

Chandrashekhar:2000:KLP

[22] H. Chandrashekhar and M. Nagaraj. Key-lock pair mechanism for accesscontrol using tribes of Farey fractions. Journal of Discrete MathematicalSciences and Cryptography, 3(1-3):11–22, 2000. CODEN ???? ISSN 0972-0529. Discrete mathematics and allied topics.

Das:2000:SAM

[23] Kishore K. Das and Nibedita Bhattacharjee. Some aspects of modifiedfactorial series distributions. Journal of Discrete Mathematical Sciencesand Cryptography, 3(1-3):23–40, 2000. CODEN ???? ISSN 0972-0529.Discrete mathematics and allied topics.

Elia:2000:CRU

[24] Michele Elia, J. Carmelo Interlando, and Reginaldo Palazzo, Jr. Comput-ing the reciprocal of units in Galois rings. Journal of Discrete Mathemat-ical Sciences and Cryptography, 3(1-3):41–55, 2000. CODEN ???? ISSN0972-0529. Discrete mathematics and allied topics.

Maturo:2000:FET

[25] Antonio Maturo. Fuzzy events and their probability assessments. Journalof Discrete Mathematical Sciences and Cryptography, 3(1-3):83–94, 2000.CODEN ???? ISSN 0972-0529. Discrete mathematics and allied topics.

Page 16: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 16

Chandrashekhar:2000:DQF

[26] H. Chandrashekhar and M. Nagaraj. Discrete quaternion Fourier trans-form in signal processing systems. Journal of Discrete Mathematical Sci-ences and Cryptography, 3(1-3):95–112, 2000. CODEN ???? ISSN 0972-0529. Discrete mathematics and allied topics.

Ratan:2000:IPB

[27] Ram Ratan and P. K. Saxena. Image processing based techniques for se-curing documents. Journal of Discrete Mathematical Sciences and Cryp-tography, 3(1-3):113–129, 2000. CODEN ???? ISSN 0972-0529. Discretemathematics and allied topics.

Arumugam:2000:GG

[28] S. Arumugam and J. Suresh Suseela. On graphoidal graphs. Journal ofDiscrete Mathematical Sciences and Cryptography, 3(1-3):131–137, 2000.CODEN ???? ISSN 0972-0529. Discrete mathematics and allied topics.

Radhakrishnan:2000:EAM

[29] V. Radhakrishnan, T. C. Venkatesan, and K. Krithivasan. Exact andapproximate matching of matrix languages. Journal of Discrete Mathe-matical Sciences and Cryptography, 3(1-3):139–156, 2000. CODEN ????ISSN 0972-0529. Discrete mathematics and allied topics.

Pal:2000:EHN

[30] S. K. Pal and P. K. Saxena. Enhancement of highly noisy speech signals.Journal of Discrete Mathematical Sciences and Cryptography, 3(1-3):157–172, 2000. CODEN ???? ISSN 0972-0529. Discrete mathematics andallied topics.

Khan:2000:CPM

[31] Md. Asim Uddin Khan. The corruption prevention model. Journal ofDiscrete Mathematical Sciences and Cryptography, 3(1-3):173–178, 2000.CODEN ???? ISSN 0972-0529. Discrete mathematics and allied topics.

Mukhopadhyay:2000:DSS

[32] S. Mukhopadhyay. A decision support system for medical diagnosis. Jour-nal of Discrete Mathematical Sciences and Cryptography, 3(1-3):179–192,2000. CODEN ???? ISSN 0972-0529. Discrete mathematics and alliedtopics.

Mukhopadhyay:2000:ASU

[33] S. Mukhopadhyay and M. K. Singh. An approximate solution of an unbal-anced transportation problem. Journal of Discrete Mathematical Sciences

Page 17: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 17

and Cryptography, 3(1-3):193–202, 2000. CODEN ???? ISSN 0972-0529.Discrete mathematics and allied topics.

Ryan:2000:DMM

[34] Michael J. Ryan. The distribution model the more for less (nothing)paradox and economies of scale and scope: some nonlinear extensions.Journal of Discrete Mathematical Sciences and Cryptography, 3(1-3):203–211, 2000. CODEN ???? ISSN 0972-0529. Discrete mathematics andallied topics.

Chang:2000:TTC

[35] Kun Soo Chang, Sunkyung Kim, and Il Yoo. Translation theorem of con-ditional Yeh–Wiener integrals. Journal of Discrete Mathematical Sciencesand Cryptography, 3(1-3):213–225, 2000. CODEN ???? ISSN 0972-0529.Discrete mathematics and allied topics.

Serag:2000:DCC

[36] H. M. Serag. Distributed control for cooperative systems governed bySchrodinger operator. Journal of Discrete Mathematical Sciences andCryptography, 3(1-3):227–234, 2000. CODEN ???? ISSN 0972-0529. Dis-crete mathematics and allied topics.

Bidkham:2000:SEP

[37] M. Bidkham and K. K. Dewan. Some extremal problems of polynomials.Journal of Discrete Mathematical Sciences and Cryptography, 3(1-3):235–242, 2000. CODEN ???? ISSN 0972-0529. Discrete mathematics andallied topics.

Cambini:2000:SOO

[38] A. Cambini and L. Martein. Second order optimality conditions. Jour-nal of Discrete Mathematical Sciences and Cryptography, 3(1-3):243–252,2000. CODEN ???? ISSN 0972-0529. Discrete mathematics and alliedtopics.

Mittal:2000:OW

[39] R. C. Mittal. Orthogonal wavelets. Journal of Discrete MathematicalSciences and Cryptography, 3(1-3):253–262, 2000. CODEN ???? ISSN0972-0529. Discrete mathematics and allied topics.

Lourdusamy:2001:PUL

[40] A. Lourdusamy and S. Somasundaram. Pebbling C5×C5 using linear pro-gramming. Journal of Discrete Mathematical Sciences and Cryptography,4(1):1–15, 2001. CODEN ???? ISSN 0972-0529.

Page 18: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 18

Zahedi:2001:SCC

[41] M. M. Zahedi and M. R. Khorashadi-Zadeh. Some categoric connectionsbetween fuzzy hypergraphs, subhypergroups, graphs, subgroups and sub-sets. Journal of Discrete Mathematical Sciences and Cryptography, 4(1):17–32, 2001. CODEN ???? ISSN 0972-0529.

Eugeni:2001:NGF

[42] Franco Eugeni and Raffaele Mascella. A note on generalized Fibonaccinumbers. Journal of Discrete Mathematical Sciences and Cryptography, 4(1):33–45, 2001. CODEN ???? ISSN 0972-0529.

Foundas:2001:SRB

[43] E. Foundas. Some results of Black’s permutations. Journal of DiscreteMathematical Sciences and Cryptography, 4(1):47–55, 2001. CODEN ????ISSN 0972-0529.

Kulli:2001:RNG

[44] V. R. Kulli, B. Janakiram, and Radha. R. Iyer. Regular number of agraph. Journal of Discrete Mathematical Sciences and Cryptography, 4(1):57–64, 2001. CODEN ???? ISSN 0972-0529.

Fabris:2001:SGV

[45] Francesco Fabris. Sharpening the Gilbert–Varshamov bound in the finitecase. Journal of Discrete Mathematical Sciences and Cryptography, 4(1):65–75, 2001. CODEN ???? ISSN 0972-0529.

Murali:2001:LDG

[46] R. Murali and K. S. Harinath. Laceability and distance graphs. Journalof Discrete Mathematical Sciences and Cryptography, 4(1):77–86, 2001.CODEN ???? ISSN 0972-0529.

Ozaktas:2001:ALS

[47] Hakan Ozaktas, Mustafa C. Pınar, Mustafa Akgul, Tahsin Kurc, andCevdet Aykanat. An algorithm with long steps for the simultaneous blockprojections approach for the linear feasibility problem. Journal of Dis-crete Mathematical Sciences and Cryptography, 4(1):87–108, 2001. CO-DEN ???? ISSN 0972-0529.

Kulli:2001:TCN

[48] V. R. Kulli and Nanda S. Warad. On the total closed neighbourhood graphof a graph. Journal of Discrete Mathematical Sciences and Cryptography,4(2-3):109–114, 2001. CODEN ???? ISSN 0972-0529.

Page 19: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 19

Hsueh:2001:PSR

[49] Kuang hua Hsueh, Patrick S. Chen, Peter Chu, and John Kwan han Liu.The procedure for synthesizing ratio judgements. Journal of DiscreteMathematical Sciences and Cryptography, 4(2-3):115–120, 2001. CODEN???? ISSN 0972-0529.

Eugeni:2001:GC

[50] Franco Eugeni and Mauro Zannetti. Generalized configurations. Jour-nal of Discrete Mathematical Sciences and Cryptography, 4(2-3):121–131,2001. CODEN ???? ISSN 0972-0529.

Sgarro:2001:BCA

[51] Andrea Sgarro. Blind coding: authentication frauds from the point ofview of rate-distortion theory. Journal of Discrete Mathematical Sciencesand Cryptography, 4(2-3):133–150, 2001. CODEN ???? ISSN 0972-0529.

Kulli:2001:BGB

[52] V. R. Kulli and M. S. Biradar. The blict graph and blitact graph of agraph. Journal of Discrete Mathematical Sciences and Cryptography, 4(2-3):151–162, 2001. CODEN ???? ISSN 0972-0529.

Singh:2001:ITA

[53] Yogesh Singh and C. S. Rai. An information theoretic approach to blindsource separation. Journal of Discrete Mathematical Sciences and Cryp-tography, 4(2-3):163–175, 2001. CODEN ???? ISSN 0972-0529.

Chang:2001:SSC

[54] Yanxun Chang, Giovanni Lo Faro, and Hao Shen. Support sizes of com-pletely decomposable triple systems. Journal of Discrete MathematicalSciences and Cryptography, 4(2-3):177–188, 2001. CODEN ???? ISSN0972-0529.

Honkala:2001:PUE

[55] Iiro Honkala and Tero Laihonen. On the probability of undetected errorfor binary codes used for combined correction and detection. Journal ofDiscrete Mathematical Sciences and Cryptography, 4(2-3):189–197, 2001.CODEN ???? ISSN 0972-0529.

Maccari:2002:SER

[56] Alicia Maccari, Olga Rueda, and Vilma Viazzi. A survey on edge re-construction of graphs. Journal of Discrete Mathematical Sciences andCryptography, 5(1):1–11, 2002. CODEN ???? ISSN 0972-0529.

Page 20: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 20

Antonopoulou:2002:UAP

[57] Ira Antonopoulou. A user authentication protocol based on the in-tractability of the 3-coloring problem. Journal of Discrete Mathemati-cal Sciences and Cryptography, 5(1):17–21, 2002. CODEN ???? ISSN0972-0529.

Chu:2002:RFN

[58] Ta-Chung Chu. Ranking fuzzy numbers by a ratio of relative areas.Journal of Discrete Mathematical Sciences and Cryptography, 5(1):23–34,2002. CODEN ???? ISSN 0972-0529.

Eugeni:2002:KDM

[59] Franco Eugeni and Daniela Tondini. Klein’s discrete model: the case ofodd order. Journal of Discrete Mathematical Sciences and Cryptography,5(1):35–41, 2002. CODEN ???? ISSN 0972-0529.

Stangarone:2002:EFS

[60] Rosa Stangarone and Luisella Verdi. Essentially s-fold secure authenti-cation systems of level l. Journal of Discrete Mathematical Sciences andCryptography, 5(1):43–50, 2002. CODEN ???? ISSN 0972-0529.

Maturo:2002:RBS

[61] Antonio Maturo and Mauro Zannetti. Redei blocking sets with two Redeilines and quasigroups. Journal of Discrete Mathematical Sciences andCryptography, 5(1):51–62, 2002. CODEN ???? ISSN 0972-0529.

Nath:2002:DRM

[62] Prem Nath. On determining a representation for measures of entropypossessing branching property without assuming symmetry. Journal ofDiscrete Mathematical Sciences and Cryptography, 5(1):63–75, 2002. CO-DEN ???? ISSN 0972-0529.

Yeh:2002:CMA

[63] Yi-Shiung Yeh, Chu-Hsing Lin, and Wei-Shen Lai. Construct messageauthentication code with SHA and AEA. Journal of Discrete Mathemat-ical Sciences and Cryptography, 5(1):77–83, 2002. CODEN ???? ISSN0972-0529.

Zahedi:2002:AFN

[64] M. M. Zahedi and H. Moradi Kouchi. (Anti-) fuzzy (normal) sub-F -polygroups and fuzzy α-cosets. Journal of Discrete Mathematical Sciencesand Cryptography, 5(1):85–104, 2002. CODEN ???? ISSN 0972-0529.

Page 21: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 21

Chi:2002:ESD

[65] Cynthia Chi, Daniela Ferrero, Charles Hallford, and Rebecca Williams.On the edge sums of de Bruijn graphs. Journal of Discrete MathematicalSciences and Cryptography, 5(2):105–117, 2002. CODEN ???? ISSN0972-0529.

Gentile:2002:HC

[66] Giuseppe Gentile and Renato Migliorato. Hypergroupoids and cryptosys-tems. Journal of Discrete Mathematical Sciences and Cryptography, 5(2):119–138, 2002. CODEN ???? ISSN 0972-0529.

Ferri:2002:EQ

[67] Osvaldo Ferri, Stefania Ferri, and Antonella Giallonardo. On the ellipticquadrics of PG(2s+ 1, q). Journal of Discrete Mathematical Sciences andCryptography, 5(2):139–143, 2002. CODEN ???? ISSN 0972-0529.

Arumugam:2002:NGC

[68] S. Arumugam, Indra Rajasingh, and P. Roushini Leely Pushpam. A noteon the graphoidal covering number of a graph. Journal of Discrete Math-ematical Sciences and Cryptography, 5(2):145–150, 2002. CODEN ????ISSN 0972-0529.

Hwang:2002:IDS

[69] Min-Shiang Hwang, Chao-Chen Yang, and Shiang-Feng Tzeng. Improveddigital signature scheme based on factoring and discrete logarithms. Jour-nal of Discrete Mathematical Sciences and Cryptography, 5(2):151–155,2002. CODEN ???? ISSN 0972-0529.

Girtis:2002:DTIa

[70] Konstantinos G. Girtis and George A. Tsihrintzis. Diffraction tomographicimaging algorithms. I. Data models and inversion. Journal of DiscreteMathematical Sciences and Cryptography, 5(2):157–178, 2002. CODEN???? ISSN 0972-0529.

Chu:2002:GDA

[71] Y. P. Chu, W. C. Chiang, Y. H. Huang, and C. L. Lee. A generalized delayallocation model for rate-based packet scheduling algorithms. Journalof Discrete Mathematical Sciences and Cryptography, 5(2):179–197, 2002.CODEN ???? ISSN 0972-0529.

Chiu:2002:MPA

[72] Chin Ching Chiu and Yi-Shiung Yeh. A massively parallel algorithm basedon DNA computations for constructing minimal spanning trees. Journal

Page 22: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 22

of Discrete Mathematical Sciences and Cryptography, 5(2):199–214, 2002.CODEN ???? ISSN 0972-0529.

Aggarwal:2002:CSN

[73] M. L. Aggarwal and Veena Budhraja. On construction of some new sym-metric and asymmetric orthogonal arrays. Journal of Discrete Mathemat-ical Sciences and Cryptography, 5(3):215–225, 2002. CODEN ???? ISSN0972-0529.

Ferri:2002:STS

[74] Stefania Ferri. On some type (1,m, n)2 sets of PG(3, q). Journal of Dis-crete Mathematical Sciences and Cryptography, 5(3):227–230, 2002. CO-DEN ???? ISSN 0972-0529.

Mitton:2002:MNE

[75] Michel Mitton. On maximally nonlinear and extremal balanced Booleanfunctions. Journal of Discrete Mathematical Sciences and Cryptography,5(3):231–253, 2002. CODEN ???? ISSN 0972-0529.

Foundas:2002:CIC

[76] E. Foundas and G. Chondrocoukis. Classifications and inferences of col-lective preferences. Journal of Discrete Mathematical Sciences and Cryp-tography, 5(3):255–280, 2002. CODEN ???? ISSN 0972-0529.

Girtis:2002:DTIb

[77] Konstantinos G. Girtis and George A. Tsihrintzis. Diffraction tomographicimaging algorithms. II. Random data inversion and super-resolution. Jour-nal of Discrete Mathematical Sciences and Cryptography, 5(3):281–301,2002. CODEN ???? ISSN 0972-0529.

Chen:2003:CDB

[78] T. W. Chen and J. Y. Lin. Control design based on minimization ofquadratic index with an observer-based structure. Journal of DiscreteMathematical Sciences and Cryptography, 6(1):1–19, 2003. CODEN ????ISSN 0972-0529.

Armeni:2003:SIH

[79] S. Armeni, D. Christodulakis, I. Kostopoulos, Y. C. Stamatiou, andM. Xenos. Secure information hiding based on computationally intractableproblems. Journal of Discrete Mathematical Sciences and Cryptography,6(1):21–33, 2003. CODEN ???? ISSN 0972-0529.

Page 23: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 23

Aggarwal:2003:NBI

[80] M. L. Aggarwal and Seema Gupta. Nested balanced incomplete blockdesigns derivable from simplex codes. Journal of Discrete MathematicalSciences and Cryptography, 6(1):35–44, 2003. CODEN ???? ISSN 0972-0529.

Lin:2003:KUS

[81] Chu-Hsing Lin, Yi-Shiung Yeh, and Chen-Yu Lee. Keyed/unkeyed SHA-2.Journal of Discrete Mathematical Sciences and Cryptography, 6(1):45–58,2003. CODEN ???? ISSN 0972-0529.

Bhandari:2003:CRS

[82] M. C. Bhandari and C. Durairajan. On the covering radius of simplexcodes. Journal of Discrete Mathematical Sciences and Cryptography, 6(1):59–69, 2003. CODEN ???? ISSN 0972-0529.

Ferri:2003:ICC

[83] Stefania Ferri. On the irreducible cubs containing the maximum numberof points of a Fano plane. Journal of Discrete Mathematical Sciences andCryptography, 6(1):71–75, 2003. CODEN ???? ISSN 0972-0529.

Zannetti:2003:CCQ

[84] Mauro Zannetti. A combinatorial characterization of quadric Veronesean.Journal of Discrete Mathematical Sciences and Cryptography, 6(1):77–82,2003. CODEN ???? ISSN 0972-0529.

Marcu:2003:NBH

[85] Danut Marcu. A note on the balanced hypergraphs. Journal of DiscreteMathematical Sciences and Cryptography, 6(1):83–84, 2003. CODEN ????ISSN 0972-0529.

Kheddouci:2003:DRG

[86] Hamamache Kheddouci. A dual of 4-regular graph for G× C2n. Journalof Discrete Mathematical Sciences and Cryptography, 6(1):85–96, 2003.CODEN ???? ISSN 0972-0529.

Borzooei:2003:SKP

[87] R. A. Borzooei, P. Corsini, and M. M. Zahedi. Some kinds of positiveimplicative hyper K-ideals. Journal of Discrete Mathematical Sciencesand Cryptography, 6(1):97–108, 2003. CODEN ???? ISSN 0972-0529.

Ameri:2003:CHH

[88] R. Ameri. On categories of hypergroups and hypermodules. Journal ofDiscrete Mathematical Sciences and Cryptography, 6(2-3):121–132, 2003.

Page 24: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 24

CODEN ???? ISSN 0972-0529. Algebraic hyperstructures and applica-tions.

Corsini:2003:CH

[89] Piergiulio Corsini. On Chinese hyperstructures. Journal of Discrete Math-ematical Sciences and Cryptography, 6(2-3):133–137, 2003. CODEN ????ISSN 0972-0529. Algebraic hyperstructures and applications.

Hort:2003:CHO

[90] Daniel Hort. A construction of hypergroups from ordered structures andtheir morphisms. Journal of Discrete Mathematical Sciences and Cryp-tography, 6(2-3):139–150, 2003. CODEN ???? ISSN 0972-0529. Algebraichyperstructures and applications.

Gentile:2003:NQS

[91] Giuseppe Gentile. A note on quasi-Steiner hypergroupoids. Journal ofDiscrete Mathematical Sciences and Cryptography, 6(2-3):151–160, 2003.CODEN ???? ISSN 0972-0529. Algebraic hyperstructures and applica-tions.

Iranmanesh:2003:THC

[92] A. Iranmanesh and A. H. Babareza. Transposition hypergroups and com-plement hypergroups. Journal of Discrete Mathematical Sciences andCryptography, 6(2-3):161–168, 2003. CODEN ???? ISSN 0972-0529. Al-gebraic hyperstructures and applications.

Jantosciak:2003:SIF

[93] James Jantosciak and Christos G. Massouros. Strong identities and for-tification in transposition hypergroups. Journal of Discrete MathematicalSciences and Cryptography, 6(2-3):169–193, 2003. CODEN ???? ISSN0972-0529. Algebraic hyperstructures and applications.

Leoreanu:2003:CHA

[94] Violeta Leoreanu. Commutative hypergroups associated with arbitraryhypergroups. Journal of Discrete Mathematical Sciences and Cryptogra-phy, 6(2-3):195–198, 2003. CODEN ???? ISSN 0972-0529. Algebraichyperstructures and applications.

Madanshekaf:2003:SAH

[95] A. Madanshekaf. Hv-structures associated with PQ-hyperoperations.Journal of Discrete Mathematical Sciences and Cryptography, 6(2-3):199–205, 2003. CODEN ???? ISSN 0972-0529. Algebraic hyperstructures andapplications.

Page 25: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 25

Massouros:2003:AHO

[96] Gerasimos G. Massouros. On the attached hypergroups of the order ofan automation. Journal of Discrete Mathematical Sciences and Cryptog-raphy, 6(2-3):207–215, 2003. CODEN ???? ISSN 0972-0529. Algebraichyperstructures and applications.

Ciampi:2003:PMH

[97] Rita Procesi Ciampi and Rosaria Rota. Polynomials over multiplicativehyperrings. Journal of Discrete Mathematical Sciences and Cryptography,6(2-3):217–225, 2003. CODEN ???? ISSN 0972-0529. Algebraic hyper-structures and applications.

Barghi:2003:CH

[98] A. Rahnamai Barghi. A class of hyperrings. Journal of Discrete Mathe-matical Sciences and Cryptography, 6(2-3):227–233, 2003. CODEN ????ISSN 0972-0529. Algebraic hyperstructures and applications.

Vougiouklis:2003:S

[99] Thomas Vougiouklis. The h/v-structures. Journal of Discrete Mathemati-cal Sciences and Cryptography, 6(2-3):235–243, 2003. CODEN ???? ISSN0972-0529. Algebraic hyperstructures and applications.

Migliorato:2003:CHH

[100] Renato Migliorato. Canonical v-hypergroups and ω-hypergroups. Jour-nal of Discrete Mathematical Sciences and Cryptography, 6(2-3):245–256,2003. CODEN ???? ISSN 0972-0529. Algebraic hyperstructures andapplications.

Zannetti:2003:CCB

[101] Mauro Zannetti. A combinatorial characterization of Baer subspaces.Journal of Discrete Mathematical Sciences and Cryptography, 7(1):1–3,2003. CODEN ???? ISSN 0972-0529.

Buccimazza:2003:HDB

[102] Biagio Buccimazza, Bal Kishan Dass, and Sapna Jain. High-density-bursterror detection. Journal of Discrete Mathematical Sciences and Cryptog-raphy, 7(1):5–21, 2003. CODEN ???? ISSN 0972-0529.

Lu:2003:RKA

[103] Cheng-Fen Lu and Shiuh-Pyng Shieh. Re-keying algorithms for symmetriccryptosystems. Journal of Discrete Mathematical Sciences and Cryptog-raphy, 7(1):23–27, 2003. CODEN ???? ISSN 0972-0529.

Page 26: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 26

DiGennaro:2003:WBS

[104] Fernando Di Gennaro. Which blocking sets are hypergroups? Journalof Discrete Mathematical Sciences and Cryptography, 7(1):29–36, 2003.CODEN ???? ISSN 0972-0529.

Chung:2003:DPG

[105] Hannah Chung, Daniela Ferrero, Alan Taylor, and Jeremy Warshauer.Diameter of path graphs. Journal of Discrete Mathematical Sciences andCryptography, 7(1):49–54, 2003. CODEN ???? ISSN 0972-0529.

Chen:2003:BOT

[106] Wei-Kuei Chen and Chun-I Fan. Blind one-time signature and its appli-cations. Journal of Discrete Mathematical Sciences and Cryptography, 7(1):55–69, 2003. CODEN ???? ISSN 0972-0529.

Yeh:2003:CMS

[107] Yi-Shiung Yeh and Ta-Shan Tsui. A concurrent multi-string matchingfrom multi-text algorithm based on the algorithm of Hamiltonian pathproblem and DNA computation. Journal of Discrete Mathematical Sci-ences and Cryptography, 7(1):71–96, 2003. CODEN ???? ISSN 0972-0529.

Selvakumar:2003:KCC

[108] R. Selvakumar and P. Balasubramani. Kernel code and its controllability.Journal of Discrete Mathematical Sciences and Cryptography, 7(1):97–101,2003. CODEN ???? ISSN 0972-0529.

Yamuna:2003:EEF

[109] M. Yamuna and N. Sridharan. Every γ-excellent, γ-flexible graph is γbi-excellent. Journal of Discrete Mathematical Sciences and Cryptography,7(1):103–110, 2003. CODEN ???? ISSN 0972-0529.

Hsu:2003:NCS

[110] Ching-Hung Hsu and Ming-Chih Lai. A new cipher scheme based on one-way hash function and IDEA. Journal of Discrete Mathematical Sciencesand Cryptography, 7(1):111–120, 2003. CODEN ???? ISSN 0972-0529.

Tseng:2003:CKA

[111] Yuh-Min Tseng. A cryptographic key assignment scheme for access controlin a hierarchy with exceptions. Journal of Discrete Mathematical Sciencesand Cryptography, 7(1):121–132, 2003. CODEN ???? ISSN 0972-0529.

Page 27: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 27

Girtis:2004:DTI

[112] Konstantinos G. Girtis and George A. Tsihrintzis. Diffraction tomographicimaging algorithms. III. Angularly limited data. Journal of Discrete Math-ematical Sciences and Cryptography, 7(2):133–159, 2004. CODEN ????ISSN 0972-0529.

Amato:2004:IPD

[113] Alberto Amato. Intersections and parallelism in P3-designs. Journal ofDiscrete Mathematical Sciences and Cryptography, 7(2):161–166, 2004.CODEN ???? ISSN 0972-0529.

Dey:2004:EIL

[114] Partha P. Dey. Exploring invariant linear codes through generators andcentralizers. Journal of Discrete Mathematical Sciences and Cryptography,7(2):167–178, 2004. CODEN ???? ISSN 0972-0529.

Arumugam:2004:GUM

[115] S. Arumugam, Indra Rajasingh, and P. Roushini Leely Pushpam. Graphswith unique minimum acyclic graphoidal cover. I. Journal of DiscreteMathematical Sciences and Cryptography, 7(2):179–186, 2004. CODEN???? ISSN 0972-0529.

Ferri:2004:SSI

[116] Stefania Ferri. On some singular irreducible cubics of PG(2, 2). Journalof Discrete Mathematical Sciences and Cryptography, 7(2):203–208, 2004.CODEN ???? ISSN 0972-0529.

Interlando:2004:ECI

[117] J. Carmelo Interlando and Michele Elia. On the effective computation ofisomorphisms between σF(OF/√) and GF(NF(√)). Journal of Discrete

Mathematical Sciences and Cryptography, 7(2):209–225, 2004. CODEN???? ISSN 0972-0529.

Mitton:2004:TUB

[118] Michel Mitton. Theoretical upper bounds on the covering radii of Booleanfunctions. Journal of Discrete Mathematical Sciences and Cryptography,7(2):237–248, 2004. CODEN ???? ISSN 0972-0529.

Antonopoulou:2004:TP

[119] Hera Antonopoulou. On threshold properties. Journal of Discrete Math-ematical Sciences and Cryptography, 7(2):249–254, 2004. CODEN ????ISSN 0972-0529.

Page 28: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 28

Rajola:2004:STS

[120] Sandro Rajola and Maria Scafati Tallini. The sets of type (0, n) andthe Steiner triple systems in a finite affine plane. Journal of DiscreteMathematical Sciences and Cryptography, 7(3):261–266, 2004. CODEN???? ISSN 0972-0529.

Ferri:2004:AST

[121] Stefania Ferri. Addendum to: “On some type (1,m, n)2 sets of PG(3, q)”[J. Discrete Math. Sci. Cryptography 5 (2002), no. 3, 227–230; Cno.1986732]. Journal of Discrete Mathematical Sciences and Cryptography,7(3):267–269, 2004. CODEN ???? ISSN 0972-0529.

Chu:2004:CDM

[122] Ta-Chung Chu, Kuo-Shi Huang, and Tzu-Ming Chang. COA defuzzi-fication method for evaluating Cpk under fuzzy environments. Journalof Discrete Mathematical Sciences and Cryptography, 7(3):271–280, 2004.CODEN ???? ISSN 0972-0529.

Wu:2004:FSB

[123] Lin-Chuan Wu, Yi-Shiung Yeh, and Chun-I. Fan. Fail-stop blind signaturescheme based on the integer factorization. Journal of Discrete Mathemat-ical Sciences and Cryptography, 7(3):281–290, 2004. CODEN ???? ISSN0972-0529.

Georgiou:2004:NVC

[124] S. Georgiou and C. Koukouvinos. New visual cryptographic schemes de-rived from orthogonal and mixed orthogonal arrays. Journal of DiscreteMathematical Sciences and Cryptography, 7(3):291–306, 2004. CODEN???? ISSN 0972-0529.

Kotsireas:2004:IHM

[125] Ilias S. Kotsireas and Christos Koukouvinos. Inequivalent Hadamard ma-trices with buckets. Journal of Discrete Mathematical Sciences and Cryp-tography, 7(3):307–317, 2004. CODEN ???? ISSN 0972-0529.

Poulos:2004:CAC

[126] Marios Poulos, Maria Rangoussi, Vasilios Chrissikopoulos, Agelos Evan-gelou, and Fotis Georgiacodis. Comparative analysis of the computationalgeometry and neural network classification methods for person identifica-tion purposes via the EEG. I. Journal of Discrete Mathematical Sciencesand Cryptography, 7(3):319–347, 2004. CODEN ???? ISSN 0972-0529.

Page 29: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 29

Kofahi:2004:PSS

[127] Najib A. Kofahi, Turki Al-Somani, and Khalid Al-Zamil. Performancestudy of some symmetric block cipher algorithms under Linux operatingsystem. Journal of Discrete Mathematical Sciences and Cryptography, 7(3):359–370, 2004. CODEN ???? ISSN 0972-0529.

Wang:2005:VCA

[128] Shiuh-Jeng Wang. Vowel-consonant addressing mode on hashing for En-glish letter-oriented keys. Journal of Discrete Mathematical Sciences andCryptography, 8(1):1–25, 2005. CODEN ???? ISSN 0972-0529.

Al-Hassan:2005:ITM

[129] Qassem M. Al-Hassan. On inverses of tridiagonal matrices. Journal ofDiscrete Mathematical Sciences and Cryptography, 8(1):49–58, 2005. CO-DEN ???? ISSN 0972-0529.

Balasubramani:2005:CDP

[130] P. Balasubramani and R. Viswanathan. Characterizations of the 0-distributive poset. Journal of Discrete Mathematical Sciences and Cryp-tography, 8(1):81–98, 2005. CODEN ???? ISSN 0972-0529.

Nath:2005:MSS

[131] Prem Nath. On the measurable solutions of some functional equationsuseful in information theory. Journal of Discrete Mathematical Sciencesand Cryptography, 8(1):99–115, 2005. CODEN ???? ISSN 0972-0529.

Effantin:2005:EVC

[132] Brice Effantin and Hamamache Kheddouci. Exact values for the b-chromatic number of a power complete k-ary tree. Journal of DiscreteMathematical Sciences and Cryptography, 8(1):117–129, 2005. CODEN???? ISSN 0972-0529.

Geiselmann:2005:KSA

[133] Willi Geiselmann and Rainer Steinwandt. A key substitution attack onSFLASHv3. Journal of Discrete Mathematical Sciences and Cryptography,8(2):137–141, 2005. CODEN ???? ISSN 0972-0529.

Iembo:2005:CFP

[134] Rosanna Iembo, Massimo Squillante, and Aldo Ventre. Common fixedpoints for families of commutative transformations. Journal of DiscreteMathematical Sciences and Cryptography, 8(2):175–188, 2005. CODEN???? ISSN 0972-0529.

Page 30: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 30

Koukouvinos:2005:SCC

[135] C. Koukouvinos and P. Mantas. Some combinatorial constructions foroptimal mixed-level supersaturated designs. Journal of Discrete Math-ematical Sciences and Cryptography, 8(2):189–201, 2005. CODEN ????ISSN 0972-0529.

Ratiner:2005:MBC

[136] Michael Ratiner. The method of S-box construction. Journal of DiscreteMathematical Sciences and Cryptography, 8(2):203–215, 2005. CODEN???? ISSN 0972-0529.

Swaminathan:2005:SVM

[137] V. Swaminathan and P. Jeyanthi. On super vertex-magic labeling. Journalof Discrete Mathematical Sciences and Cryptography, 8(2):217–224, 2005.CODEN ???? ISSN 0972-0529.

Berardi:2005:BSB

[138] Luigia Berardi, Bal Kishan Dass, and Sapna Jain. Bound for solid burst er-ror correction with Lee weight. Journal of Discrete Mathematical Sciencesand Cryptography, 8(2):225–235, 2005. CODEN ???? ISSN 0972-0529.

Lucci:2005:CCT

[139] Maurizio Lucci. A combinatorial characterization of two skew lines. Jour-nal of Discrete Mathematical Sciences and Cryptography, 8(2):237–239,2005. CODEN ???? ISSN 0972-0529.

Kotsireas:2005:GAC

[140] Ilias S. Kotsireas and Christos Koukouvinos. Genetic algorithms for theconstruction of Hadamard matrices with two circulant cores. Journalof Discrete Mathematical Sciences and Cryptography, 8(2):241–250, 2005.CODEN ???? ISSN 0972-0529.

Yiming:2005:NPC

[141] Abulimiti Yiming and Masami Yasuda. A note on properties for a com-plementary graph and its tree graph. Journal of Discrete MathematicalSciences and Cryptography, 8(2):251–259, 2005. CODEN ???? ISSN0972-0529.

Ferri:2005:CC

[142] Stefania Ferri. The cubic curves of PG(2, 3). Journal of Discrete Math-ematical Sciences and Cryptography, 8(2):261–266, 2005. CODEN ????ISSN 0972-0529.

Page 31: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 31

Lucci:2005:SC

[143] Maurizio Lucci. On (q+ 1)2-sets of class [0, 1,m, n]1 in PG(4, q). Journalof Discrete Mathematical Sciences and Cryptography, 8(2):267–270, 2005.CODEN ???? ISSN 0972-0529.

To:2005:SCS

[144] Vu Dong To, Reihaneh Safavi-Naini, and Yejing Wang. 2-secure codesfrom 2-SFP codes. Journal of Discrete Mathematical Sciences and Cryp-tography, 8(2):287–304, 2005. CODEN ???? ISSN 0972-0529.

Chang:2005:PSS

[145] Ming-Hsin Chang and Yi-Shiung Yeh. Proxy signature schemes with timelimitation. Journal of Discrete Mathematical Sciences and Cryptography,8(3):305–314, 2005. CODEN ???? ISSN 0972-0529.

Mitton:2005:AII

[146] Michel Mitton. An analysis and an improvement of iterative fast correla-tion attacks. Journal of Discrete Mathematical Sciences and Cryptogra-phy, 8(3):315–342, 2005. CODEN ???? ISSN 0972-0529.

Yeh:2005:REM

[147] Yi-Shiung Yeh, I-Te Chen, and Chan-Chi Wang. Randomizing encryptionmode. Journal of Discrete Mathematical Sciences and Cryptography, 8(3):355–364, 2005. CODEN ???? ISSN 0972-0529.

Salavati:2005:GP

[148] N. Shajareh-Pour Salavati. On the generalized permutations. Journalof Discrete Mathematical Sciences and Cryptography, 8(3):365–372, 2005.CODEN ???? ISSN 0972-0529.

Basavanagoud:2005:GEL

[149] B. Basavanagoud and Veena N. Mathad. Graph equations for line graphs,blitact graphs and blict graphs. Journal of Discrete Mathematical Sciencesand Cryptography, 8(3):373–379, 2005. CODEN ???? ISSN 0972-0529.

Fan:2005:CL

[150] Chen-Ming Fan and H. J. Shyr. δ-codes and δ-languages. Journal of Dis-crete Mathematical Sciences and Cryptography, 8(3):381–394, 2005. CO-DEN ???? ISSN 0972-0529.

Page 32: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 32

Tan:2005:CPT

[151] Ngo Dac Tan. On the classification problem for tetravalent metacirculantgraphs. Journal of Discrete Mathematical Sciences and Cryptography, 8(3):403–412, 2005. CODEN ???? ISSN 0972-0529.

Vijayarangan:2005:PPT

[152] N. Vijayarangan and R. Vijayasarathy. Primitive polynomials testingmethodology. Journal of Discrete Mathematical Sciences and Cryptog-raphy, 8(3):427–435, 2005. CODEN ???? ISSN 0972-0529.

Lo:2005:OEC

[153] Chih-Yao Lo. The operation of the elliptic curve cryptology in IPv6.Journal of Discrete Mathematical Sciences and Cryptography, 8(3):437–446, 2005. CODEN ???? ISSN 0972-0529.

Mascella:2005:CPB

[154] Raffaele Mascella and Luca G. Tallini. Combinatorial properties of bal-anced codes over the complex m-th roots of unity and efficient codingalgorithms. Journal of Discrete Mathematical Sciences and Cryptography,8(3):447–458, 2005. CODEN ???? ISSN 0972-0529.

Mascella:2005:EHO

[155] Raffaele Mascella and Luca G. Tallini. On efficient high-order spectral-nullcodes over the m-ary alphabet. Journal of Discrete Mathematical Sciencesand Cryptography, 8(3):459–481, 2005. CODEN ???? ISSN 0972-0529.

Effantin:2005:CNP

[156] Brice Effantin. The b-chromatic number of power graphs of completecaterpillars. Journal of Discrete Mathematical Sciences and Cryptography,8(3):483–502, 2005. CODEN ???? ISSN 0972-0529.

Suganya:2006:LRK

[157] A. Suganya and N. Vijayarangan. Landau–Ramanujan keyed hash func-tions for message authentication. Journal of Discrete Mathematical Sci-ences and Cryptography, 9(1):1–8, 2006. CODEN ???? ISSN 0972-0529.

Chakrabarti:2006:NVC

[158] Sucheta Chakrabarti and R. K. Khanna. A new visual cryptographyscheme for STS based access structures. Journal of Discrete Mathemat-ical Sciences and Cryptography, 9(1):9–23, 2006. CODEN ???? ISSN0972-0529.

Page 33: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 33

Elia:2006:RPS

[159] Michele Elia. Representation of primes as the sums of two squares in thegolden section quadratic field. Journal of Discrete Mathematical Sciencesand Cryptography, 9(1):25–37, 2006. CODEN ???? ISSN 0972-0529.

Gaeta:2006:GAF

[160] Matteo Gaeta, Gerardo Iovane, and Enver Sangineto. A 3D geometricapproach to face detection and facial expression recognition. Journal ofDiscrete Mathematical Sciences and Cryptography, 9(1):39–53, 2006. CO-DEN ???? ISSN 0972-0529.

Wang:2006:SNG

[161] Jinhua Wang. The spectrum of nested group divisible designs of type tn.Journal of Discrete Mathematical Sciences and Cryptography, 9(1):55–65,2006. CODEN ???? ISSN 0972-0529.

Sundaram:2006:PPC

[162] S. Soma Sundaram, A. Nagarajan, and M. Anantha Krishnan. Path pointcover. Journal of Discrete Mathematical Sciences and Cryptography, 9(1):67–71, 2006. CODEN ???? ISSN 0972-0529.

Mojdeh:2006:ERG

[163] Doost Ali Mojdeh. On the extending of k-regular graphs and their strongdefining spectrum. Journal of Discrete Mathematical Sciences and Cryp-tography, 9(1):73–86, 2006. CODEN ???? ISSN 0972-0529.

Chang:2006:STS

[164] Yung-Tsang Chang, Jung-Hua Hsu, and S. S. Yu. A sublinear time stringprefix square detection algorithm. Journal of Discrete Mathematical Sci-ences and Cryptography, 9(1):87–95, 2006. CODEN ???? ISSN 0972-0529.

Alderson:2006:SGR

[165] T. Alderson. Some generalizations of Redei’s theorem. Journal of DiscreteMathematical Sciences and Cryptography, 9(1):97–106, 2006. CODEN???? ISSN 0972-0529.

Evangelaras:2006:NLC

[166] H. Evangelaras and C. Koukouvinos. New light on certain two level de-signs using Grobner bases. Journal of Discrete Mathematical Sciences andCryptography, 9(1):107–124, 2006. CODEN ???? ISSN 0972-0529.

Page 34: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 34

Evangelaras:2006:EAI

[167] H. Evangelaras, C. Koukouvinos, and E. Lappas. An efficient algorithmfor the identification of isomorphic orthogonal arrays. Journal of DiscreteMathematical Sciences and Cryptography, 9(1):125–132, 2006. CODEN???? ISSN 0972-0529.

Chang:2006:AFE

[168] Chin-Chen Chang and Jung-San Lee. An anonymous and flexible t-out-of-n electronic voting scheme. Journal of Discrete Mathematical Sciencesand Cryptography, 9(1):133–151, 2006. CODEN ???? ISSN 0972-0529.

Yang:2006:WBG

[169] Cheng-Hsing Yang and Shiuh-Jeng Wang. Weighted bipartite graph forlocating optimal LSB substitution for secret embedding. Journal of Dis-crete Mathematical Sciences and Cryptography, 9(1):153–164, 2006. CO-DEN ???? ISSN 0972-0529.

Zhao:2006:CPP

[170] Yu-Kuang Zhao. A characterization of prefix n-power words. Journalof Discrete Mathematical Sciences and Cryptography, 9(1):165–176, 2006.CODEN ???? ISSN 0972-0529.

Mojdeh:2006:CGG

[171] Doost Ali Mojdeh and Nader Jafari Rad. Connected geodomination ingraphs. Journal of Discrete Mathematical Sciences and Cryptography, 9(1):177–186, 2006. CODEN ???? ISSN 0972-0529.

Mascella:2006:TDA

[172] Raffaele Mascella and Luca G. Tallini. Theory and design of m-ary bal-anced codes which are invariant under symbol permutation. Journal ofDiscrete Mathematical Sciences and Cryptography, 9(1):187–200, 2006.CODEN ???? ISSN 0972-0529.

Zahedi:2006:CHA

[173] M. M. Zahedi and L. Torkzadeh. A classification of hyper K-algebras oforder 3. Journal of Discrete Mathematical Sciences and Cryptography, 9(2):201–213, 2006. CODEN ???? ISSN 0972-0529.

Karunagaram:2006:DPM

[174] Bala Shanthi Karunagaram and J. Paulraj Joseph. On domination param-eters and maximum degree of a graph. Journal of Discrete MathematicalSciences and Cryptography, 9(2):215–223, 2006. CODEN ???? ISSN0972-0529.

Page 35: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 35

Ahrabian:2006:PGA

[175] H. Ahrabian and A. Nowzari-Dalini. Parallel generation of t-ary treeswith ballot-sequences. Journal of Discrete Mathematical Sciences andCryptography, 9(2):225–234, 2006. CODEN ???? ISSN 0972-0529.

Tan:2006:NCM

[176] Ngo Dac Tan and Chawalit Iamjaroen. A necessary condition for maximalnonhamiltonian Burkard–Hammer graphs. Journal of Discrete Mathemat-ical Sciences and Cryptography, 9(2):235–252, 2006. CODEN ???? ISSN0972-0529.

Sethumadhavan:2006:CAB

[177] M. Sethumadhavan, C. Yogha Lakxmie, and C. Vijayagovindan. A con-struction of p-ary balanced sequence with large k-error linear complexity.Journal of Discrete Mathematical Sciences and Cryptography, 9(2):253–261, 2006. CODEN ???? ISSN 0972-0529.

Manuel:2006:LTN

[178] Paul Manuel, Bharati Rajan, Indra Rajasingh, and M. Chris Monica.Landmarks in torus networks. Journal of Discrete Mathematical Sciencesand Cryptography, 9(2):263–271, 2006. CODEN ???? ISSN 0972-0529.

Ferri:2006:SAI

[179] Stefania Ferri. The singular absolutely irreducible cubics of PG(2, 3).Journal of Discrete Mathematical Sciences and Cryptography, 9(2):291–305, 2006. CODEN ???? ISSN 0972-0529.

Hirasawa:2006:EEB

[180] Shigeichi Hirasawa and Masao Kasahara. Exponential error bounds anddecoding complexity for block concatenated codes with tail biting trellisinner codes. Journal of Discrete Mathematical Sciences and Cryptography,9(2):307–320, 2006. CODEN ???? ISSN 0972-0529.

Yeh:2006:DE

[181] Yi-Shiung Yeh, I-Te Chen, Ting-Yu Huang, and Chan-Chi Wang. Dy-namic extended DES. Journal of Discrete Mathematical Sciences andCryptography, 9(2):321–330, 2006. CODEN ???? ISSN 0972-0529.

Georgiou:2006:EDE

[182] S. Georgiou, C. Koukouvinos, and E. Lappas. Extremal doubly-even self-dual codes from Hadamard matrices. Journal of Discrete MathematicalSciences and Cryptography, 9(2):331–339, 2006. CODEN ???? ISSN0972-0529.

Page 36: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 36

Evangelaras:2006:IDL

[183] H. Evangelaras and C. Koukouvinos. Interaction detection in Latin andhyper-Latin squares. Journal of Discrete Mathematical Sciences and Cryp-tography, 9(2):341–348, 2006. CODEN ???? ISSN 0972-0529.

Poinsot:2006:BFF

[184] Laurent Poinsot. Bent functions on a finite nonabelian group. Journalof Discrete Mathematical Sciences and Cryptography, 9(2):349–364, 2006.CODEN ???? ISSN 0972-0529.

Koukouvinos:2006:BSM

[185] C. Koukouvinos, P. Mantas, and S. Stylianou. A block-stepwise method foranalyzing a specific type of supersaturated designs. Journal of DiscreteMathematical Sciences and Cryptography, 9(2):383–402, 2006. CODEN???? ISSN 0972-0529.

Kinsley:2006:DBA

[186] A. Anto Kinsley and S. Somasundaram. Domination based algorithm tok-center problem. Journal of Discrete Mathematical Sciences and Cryp-tography, 9(3):403–416, 2006. CODEN ???? ISSN 0972-0529.

Mitton:2006:WFA

[187] Michel Mitton. On the Walsh–Fourier analysis of Boolean functions. Jour-nal of Discrete Mathematical Sciences and Cryptography, 9(3):429–439,2006. CODEN ???? ISSN 0972-0529.

Kung:2006:BML

[188] Ching-Jing Kung. 32-bit multipliers for linear congruential random num-ber generators. Journal of Discrete Mathematical Sciences and Cryptog-raphy, 9(3):441–448, 2006. CODEN ???? ISSN 0972-0529.

Wang:2006:KMP

[189] Shiuh-Jeng Wang and Pei-Shun Hu. Key management for pay-TV broad-cast systems in hierarchy. Journal of Discrete Mathematical Sciences andCryptography, 9(3):449–476, 2006. CODEN ???? ISSN 0972-0529.

Sgarro:2006:CDM

[190] Andrea Sgarro and Luca Bortolussi. Codeword distinguishability in min-imum diversity decoding. Journal of Discrete Mathematical Sciences andCryptography, 9(3):487–502, 2006. CODEN ???? ISSN 0972-0529.

Page 37: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 37

Evangelaras:2006:HE

[191] H. Evangelaras, C. Koukouvinos, and K. Mylona. On Hadamard embed-dability. Journal of Discrete Mathematical Sciences and Cryptography, 9(3):503–512, 2006. CODEN ???? ISSN 0972-0529.

Rao:2006:ABW

[192] Koduganti Venkata Rao and P. S. Avadhani. Authentication based onwavelet transformations. Journal of Discrete Mathematical Sciences andCryptography, 9(3):513–521, 2006. CODEN ???? ISSN 0972-0529.

Chang:2006:EIB

[193] Chin-Chen Chang and Jen-Ho Yang. An efficient ID-based user identifi-cation scheme for mutual authentication in mobile environments. Journalof Discrete Mathematical Sciences and Cryptography, 9(3):537–548, 2006.CODEN ???? ISSN 0972-0529.

Chang:2006:CWA

[194] Ya-Fen Chang, Chin-Chen Chang, and Chia-Lin Kao. Comments on WLTattack on an enhanced timestamp-based password authentication scheme.Journal of Discrete Mathematical Sciences and Cryptography, 9(3):549–555, 2006. CODEN ???? ISSN 0972-0529.

Butkote:2006:CSD

[195] R. Butkote and K. Denecke. Characterization of sets of discrete functionsby algebraic identities. Journal of Discrete Mathematical Sciences andCryptography, 9(3):557–572, 2006. CODEN ???? ISSN 0972-0529.

Chang:2006:SEY

[196] Chin-Chen Chang and Jung-San Lee. Security enhancement of Yang–Lihierarchical access control mechanism. Journal of Discrete MathematicalSciences and Cryptography, 9(3):573–582, 2006. CODEN ???? ISSN0972-0529.

Gan:2006:EMR

[197] C. S. Gan and V. C. Koo. Enumerations of the maximum rectilinearcrossing numbers of complete and complete multi-partite graphs. Journalof Discrete Mathematical Sciences and Cryptography, 9(3):583–590, 2006.CODEN ???? ISSN 0972-0529.

Yeh:2007:ASM

[198] Yi-Shiung Yeh, Ting-Yu Huang, I-Te Chen, and Shih-Chin Chou. Ana-lyze SHA-1 in message schedule. Journal of Discrete Mathematical Sci-ences and Cryptography, 10(1):1–7, February 2007. CODEN ???? ISSN

Page 38: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 38

0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=01.

Quistorff:2007:FCT

[199] Jorn Quistorff. Fundamentals of coding type problems. Journal of DiscreteMathematical Sciences and Cryptography, 10(1):9–39, February 2007. CO-DEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=01.

Ameri:2007:HS

[200] R. Ameri and H. Hedayati. On k-hyperideals of semihyperrings. Journalof Discrete Mathematical Sciences and Cryptography, 10(1):41–54, 2007.CODEN ???? ISSN 0972-0529.

Ameri:2007:KHS

[201] R. Ameri and H. Hedayati. On k-hyperideals of semihyperrings. Jour-nal of Discrete Mathematical Sciences and Cryptography, 10(1):41–54, February 2007. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=01.

Alsultanny:2007:SAI

[202] Yas Alsultanny. Systematic approach for image partitioning and shuf-fling. Journal of Discrete Mathematical Sciences and Cryptography, 10(1):55–71, February 2007. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=01.

Krishna:2007:GSD

[203] A. V. N. Krishna, S. N. N. Pandit, and A. Vinaya Babu. Ageneralized scheme for data encryption technique using a random-ized matrix key. Journal of Discrete Mathematical Sciences andCryptography, 10(1):73–81, February 2007. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=01.

Barrera-Figueroa:2007:NAK

[204] V. Barrera-Figueroa, J. Sosa-Pedroza, and J. Lopez-Bonilla. Numer-ical approach to King’s analytical study for circular loop antenna.Journal of Discrete Mathematical Sciences and Cryptography, 10(1):83–92, February 2007. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=01.

Page 39: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 39

Chang:2007:RNI

[205] Ya-Fen F. Chang, Chin-Chen C. Chang, and Yi-Fang F. Cheng. Robustnon-interactive t-out-of-n oblivious transfer based on the RSA cryptosys-tem. Journal of Discrete Mathematical Sciences and Cryptography, 10(1):93–109, February 2007. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=01.

Al-Ibrahim:2007:DVS

[206] Mohamed Hussain Al-Ibrahim. A designated verifier signature using se-cret sharing technique. Journal of Discrete Mathematical Sciences andCryptography, 10(1):111–123, February 2007. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=01.

Jahan:2007:RDT

[207] Israt Jahan and Mohammad Zahidur Rahman. A realistic divisible trans-ferable electronic cash for general use. Journal of Discrete MathematicalSciences and Cryptography, 10(1):125–150, February 2007. CODEN ????ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=01.

Borges-Quintana:2007:GBS

[208] M. Borges-Quintana, M. A. Borges-Trenard, and E. Martınez-Moro. Ona Grobner bases structure associated to linear codes. Journal of DiscreteMathematical Sciences and Cryptography, 10(2):151–191, April 2007. CO-DEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=02.

Wu:2007:APS

[209] Chia-Chi C. Wu and Chin-Chen C. Chang. Attacks on provably secureproxy-protected signature schemes based on factoring. Journal of DiscreteMathematical Sciences and Cryptography, 10(2):193–204, April 2007. CO-DEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=02.

Ratsaby:2007:DBF

[210] J. Ratsaby. Dimension and Boolean functions with long runs. Jour-nal of Discrete Mathematical Sciences and Cryptography, 10(2):205–225, April 2007. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=02.

Page 40: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 40

Ratsaby:2007:VDB

[211] Joel Ratsaby. On the VC-dimension and Boolean functions with longruns. Journal of Discrete Mathematical Sciences and Cryptography, 10(2):205–225, 2007. CODEN ???? ISSN 0972-0529.

Jen:2007:SMC

[212] Hsiao-Lih L. Jen, Tai-Chang C. Hsia, and M. Babul Hasan. A study ofmethods for construction of balanced incomplete block design. Jour-nal of Discrete Mathematical Sciences and Cryptography, 10(2):227–243, April 2007. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=02.

Santhakumaran:2007:PRC

[213] A. P. Santhakumaran. Periphery with respect to cliques in graphs.Journal of Discrete Mathematical Sciences and Cryptography, 10(2):245–254, April 2007. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=02.

Georgiou:2007:SDC

[214] S. Georgiou, C. Koukouvinos, and E. Lappas. Self-dual codes over someprime fields constructed from skew-Hadamard matrices. Journal of Dis-crete Mathematical Sciences and Cryptography, 10(2):255–266, April 2007.CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=02.

Mukhopadhyay:2007:FBA

[215] Debdeep Mukhopadhyay and Dipanwita RoyChowdhury. Fault based at-tack of the Rijndael cryptosystem. Journal of Discrete Mathematical Sci-ences and Cryptography, 10(2):267–290, April 2007. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=02.

Kumari:2007:IMC

[216] Meena Kumari. Indices to measure the cryptographic strength of S-box. Journal of Discrete Mathematical Sciences and Cryptography, 10(2):291–312, April 2007. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=02.

Page 41: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 41

Antonopoulou:2007:AEB

[217] Sotiria Antonopoulou, Yannis C. Stamatiou, and Malvina Vamvakari. Anasymptotic expansion for the q-binomial series using singularity analysisfor generating functions. Journal of Discrete Mathematical Sciences andCryptography, 10(3):313–328, 2007. CODEN ???? ISSN 0972-0529.

Antonopoulou:2007:AEQ

[218] S. Antonopoulou, Y. C. Stamatiou, and M. Vamvakari. An asymp-totic expansion for the q-binomial series using singularity analysisfor generating functions. Journal of Discrete Mathematical Sciencesand Cryptography, 10(3):313–328, June 2007. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=03.

Thiyagarajan:2007:VCC

[219] M. Thiyagarajan and N. Sairam. Verification of the correctness of compileroptimization using co-induction. Journal of Discrete Mathematical Sci-ences and Cryptography, 10(3):329–349, June 2007. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=03.

Lee:2007:SEK

[220] Jung-San S. Lee and Chin-Chen C. Chang. Security enhancement of keyauthentication schemes based on discrete logarithms. Journal of DiscreteMathematical Sciences and Cryptography, 10(3):351–358, June 2007. CO-DEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=03.

Wang:2007:IHO

[221] S. J. Wang. Information hiding at oblivious watermarking scheme uponalternative threshold in spatial domains. Journal of Discrete MathematicalSciences and Cryptography, 10(3):359–384, June 2007. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=03.

Longani:2007:AFN

[222] V. Longani. An algorithm for finding the number of shortest routeson square lattices. Journal of Discrete Mathematical Sciences andCryptography, 10(3):385–393, June 2007. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=03.

Page 42: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 42

Longani:2007:API

[223] Vites Longani. An algorithm for partitioning an integer n as a sumof k positive integers. Journal of Discrete Mathematical Sciencesand Cryptography, 10(3):395–399, June 2007. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=03.

Jormakka:2007:FFP

[224] Jorma Jormakka. On finding Fermat’s pairs. Journal of Discrete Math-ematical Sciences and Cryptography, 10(3):401–413, June 2007. CO-DEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=03.

Santhakumaran:2007:EGN

[225] A. P. Santhakumaran and J. John. Edge geodetic number of a graph.Journal of Discrete Mathematical Sciences and Cryptography, 10(3):415–432, June 2007. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=03.

Maralabhavi:2007:LES

[226] Y. B. Maralabhavi and Venkanagouda M. Goudar. Lict edge semien-tire graph of a planar graph. Journal of Discrete Mathematical Sci-ences and Cryptography, 10(3):433–438, June 2007. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=03.

Laccetti:2007:BFA

[227] G. Laccetti and G. Schmid. Brute force attacks on hash functions.Journal of Discrete Mathematical Sciences and Cryptography, 10(3):439–460, June 2007. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=03.

Manuel:2007:VLB

[228] Paul Manuel, Kalim Qureshi, Albert William, and Albert Muthumalai.VLSI layout of Benes networks. Journal of Discrete Mathematical Sciencesand Cryptography, 10(4):461–472, August 2007. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=04.

Page 43: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 43

Baril:2007:HPI

[229] Jean-Lue L. Baril. Hamiltonian paths for involutions in the squareof a Cayley graph. Journal of Discrete Mathematical Sciences andCryptography, 10(4):473–484, August 2007. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=04.

Kari:2007:ICR

[230] Lila Kari and Kalpana Mahalingam. k-involution codes and related sets.Journal of Discrete Mathematical Sciences and Cryptography, 10(4):485–503, 2007. CODEN ???? ISSN 0972-0529.

Kari:2007:KIC

[231] L. Kari and K. Mahalingam. k-involution codes and related sets. Jour-nal of Discrete Mathematical Sciences and Cryptography, 10(4):485–503, August 2007. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=04.

Chaluvaraju:2007:CTD

[232] B. Chaluvaraju and N. D. Soner. Complementary total domination ingraphs. Journal of Discrete Mathematical Sciences and Cryptography, 10(4):505–516, August 2007. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=04.

Shanthini:2007:UFG

[233] A. P. Shanthini, A. Antonysamy, and T. Tamil Chelvam. User-friendly genetic algorithm. Journal of Discrete Mathematical Sciencesand Cryptography, 10(4):517–536, August 2007. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=04.

Ibrahim:2007:CSS

[234] Aminu A. Ibrahim. A counting scheme and some algebraic properties ofa class of special permutation patterns. Journal of Discrete MathematicalSciences and Cryptography, 10(4):537–546, August 2007. CODEN ????ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=04.

Lee:2007:EMR

[235] C. C. Lee, M. S. Hwang, and C. W. Lin. An efficient multi-roundanonymous auction protocol. Journal of Discrete Mathematical Sciences

Page 44: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 44

and Cryptography, 10(4):547–557, August 2007. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=04.

Deacon:2007:PKT

[236] Stephanie Deacon, Eduardo Duenez, and Jose Iovino. A public-key thresh-old crypto system based on residue rings. Journal of Discrete Mathemati-cal Sciences and Cryptography, 10(4):559–571, August 2007. CODEN ????ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=04.

Lin:2007:AAA

[237] Robert H.-J. Lin, Chih-Pin Yen, Peter S. Deng, K.-C. Fan, JenniferShu-Jen Lin, and Peter Chu. Analysis of the ε-algorithm to acceler-ate the convergence. Journal of Discrete Mathematical Sciences andCryptography, 10(4):573–580, August 2007. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=04.

Dayantis:2007:SPL

[238] Jean Dayantis and Jean-Francois F. Palierne. A search for primesfrom lesser primes. Journal of Discrete Mathematical Sciences andCryptography, 10(4):581–602, August 2007. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=04.

Chang:2007:MAK

[239] Chin-Chen C. Chang, Chia-Yin Y. Lee, and Yu-Wei W. Su. A mu-tual authenticated key agreement scheme over insecure networks. Jour-nal of Discrete Mathematical Sciences and Cryptography, 10(5):603–612, October 2007. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=05.

Kulli:2007:ITD

[240] V. R. Kulli and R. R. Iyer. Inverse total domination in graphs. Jour-nal of Discrete Mathematical Sciences and Cryptography, 10(5):613–620, October 2007. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=05.

Ikpotokin:2007:MDM

[241] F. O. Ikpotokin and S. C. Chiemeke. Mathematical derivation of themulti-peg Tower of Hanoi algorithm. Journal of Discrete Mathematical

Page 45: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 45

Sciences and Cryptography, 10(5):621–636, October 2007. CODEN ????ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=05.

Darafsheh:2007:CSO

[242] M. R. Darafsheh and Y. Farjami. Calculating the set of orders of elementsin the finite linear groups. Journal of Discrete Mathematical Sciencesand Cryptography, 10(5):637–653, October 2007. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=05.

Chen:2007:SOP

[243] Hon-Chan C. Chen. A simple optimal parallel algorithm for constructinga spanning tree of a trapezoid graph. Journal of Discrete MathematicalSciences and Cryptography, 10(5):655–660, October 2007. CODEN ????ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=05.

Prasad:2007:PDN

[244] B. Jaya Prasad, T. Tamizh Chelvam, and S. Robinson Chellathurai. Pri-vate domination number of a graph. Journal of Discrete MathematicalSciences and Cryptography, 10(5):661–666, October 2007. CODEN ????ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=05.

Chelvam:2007:CPD

[245] T. Tamizh Chelvam and B. Jaya Prasad. Common point domination num-ber. Journal of Discrete Mathematical Sciences and Cryptography, 10(5):667–676, October 2007. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=05.

Santhakumaran:2007:ESN

[246] A. P. Santhakumaran and J. John. The edge Steiner number of agraph. Journal of Discrete Mathematical Sciences and Cryptography, 10(5):677–696, October 2007. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=05.

Reddy:2007:AKE

[247] P. Vasudeva Reddy and M. Padmavathamma. An authenticated key ex-change protocol in elliptic curve cryptography. Journal of Discrete Math-ematical Sciences and Cryptography, 10(5):697–705, October 2007. CO-

Page 46: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 46

DEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=05.

Ogwu:2007:PTI

[248] F. J. Ogwu, M. Talib, and G. A. Aderounmu. The performance of TCP/IPover wireless ATM network. Journal of Discrete Mathematical Sciencesand Cryptography, 10(5):707–720, October 2007. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=05.

Sweetly:2007:RNG

[249] R. Sweetly and J. Paulraj Joseph. Radio number of graphs of diam-eter three. Journal of Discrete Mathematical Sciences and Cryptogra-phy, 10(5):721–730, October 2007. CODEN ???? ISSN 0972-0529.URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=05.

Sathyanarayana:2007:GPS

[250] S. V. Sathyanarayana, M. Aswatha Kumar, and K. N. Hari Bhat.Generation of pseudorandom sequence over elliptic curve group andtheir properties. Journal of Discrete Mathematical Sciences and Cryp-tography, 10(6):731–747, December 2007. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=06.

Hsu:2007:CAD

[251] K. S. Hsu, R. C. Soong, K. C. Chen, and T. S. Lan. A computerized ap-proach to the design of automobile suspension system. Journal of DiscreteMathematical Sciences and Cryptography, 10(6):749–761, December 2007.CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=06.

Berardi:2007:SBS

[252] Luigia Berardi and Manuela Romani. On the size of a blocking setin a symmetric design. Journal of Discrete Mathematical Sciences andCryptography, 10(6):763–774, December 2007. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=06.

Ferri:2007:RST

[253] Osvaldo Ferri and Stefania Ferri. A remark on the Segre theorem.Journal of Discrete Mathematical Sciences and Cryptography, 10(6):775–778, December 2007. CODEN ???? ISSN 0972-0529. URL http:

Page 47: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 47

//www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=06.

Saxena:2007:IBG

[254] Jyoti Saxena, C. S. Rai, and P. K. Bansal. ICA based GSIC receiver formultirate DS-CDMA systems. Journal of Discrete Mathematical Sciencesand Cryptography, 10(6):779–792, December 2007. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=06.

Poinsot:2007:PNB

[255] Laurent Poinsot. Perfect nonlinear S-boxes on the real-line. Jour-nal of Discrete Mathematical Sciences and Cryptography, 10(6):793–813, December 2007. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=06.

Seenivasan:2007:TML

[256] M. Seenivasan, A. Lourdusamy, and M. Ravi Ramasubramanian. Trian-gular mean labeling of graphs. Journal of Discrete Mathematical Sciencesand Cryptography, 10(6):815–822, December 2007. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=06.

Ferri:2007:SGC

[257] Stefania Ferri. On some graphic characterizations of cubic curves inPG(2, 2) and in PG(2, 3). Journal of Discrete Mathematical Sciencesand Cryptography, 10(6):823–843, December 2007. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=06.

Anonymous:2007:IV

[258] Anonymous. Index of volume 10. Journal of Discrete Mathematical Sci-ences and Cryptography, 10(6):845–850, December 2007. CODEN ????ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=10&issue_id=06.

Babu:2008:PCR

[259] N. S. Babu. On perfect codes in rank distance. Journal of DiscreteMathematical Sciences and Cryptography, 11(1):1–11, February 2008. CO-DEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=01.

Page 48: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 48

Marcu:2008:GRR

[260] D. Marcu. A generalization of a result of A. Renyi. Journal of DiscreteMathematical Sciences and Cryptography, 11(1):13–17, February 2008.CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=01.

Marcu:2008:SKO

[261] D. Marcu. A study on the k-ordered Hamiltonian graphs. Jour-nal of Discrete Mathematical Sciences and Cryptography, 11(1):19–31, February 2008. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=01.

Huang:2008:WAU

[262] Y. F. Huang and K. L. Wen. Weighting analysis by using grey method.Journal of Discrete Mathematical Sciences and Cryptography, 11(1):33–58, February 2008. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=01.

Om:2008:ATC

[263] H. Om and R. Patwa. Affine transformation in cryptography. Jour-nal of Discrete Mathematical Sciences and Cryptography, 11(1):59–65, February 2008. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=01.

Ghiani:2008:LCP

[264] G. Ghiani, E. Manni, and C. Triki. The lane covering problemwith time windows. Journal of Discrete Mathematical Sciences andCryptography, 11(1):67–81, February 2008. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=01.

Iovane:2008:LLB

[265] G. Iovane and E. Sangineto. LICoS: Landmark-based Identikit Composi-tion and Suspect Retrieval. Journal of Discrete Mathematical Sciencesand Cryptography, 11(1):83–98, February 2008. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=01.

Page 49: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 49

Hou:2008:DAD

[266] C. I. Hou, C. Y. Lo, and J. H. Leu. A digital application ofdata encryption. Journal of Discrete Mathematical Sciences andCryptography, 11(1):99–111, February 2008. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=01.

Foundas:2008:IAC

[267] E. Foundas, Ch. Lytras, and C. Patsakis. Improved algorithms for thecalculation of Fibonacci numbers. Journal of Discrete Mathematical Sci-ences and Cryptography, 11(1):113–120, February 2008. CODEN ????ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=01.

Lin:2008:FAM

[268] R. H. J. Lin, G. Jung, J. S. J. Lin, and P. Chu. Further analysis onmatrix operation of AHP. Journal of Discrete Mathematical Sciencesand Cryptography, 11(2):121–130, April 2008. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=02.

Hong-Song:2008:NNB

[269] C. Hong-Song, Z. Jianyu, and H. W. J. Lee. A novel NP-based securityscheme for AODV routing protocol. Journal of Discrete Mathematical Sci-ences and Cryptography, 11(2):131–145, April 2008. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=02.

Juarna:2008:CIB

[270] A. Juarna and V. Vajnovszki. Combinatorial isomorphism betweenFibonacci classes. Journal of Discrete Mathematical Sciences andCryptography, 11(2):147–158, April 2008. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=02.

Kanso:2008:MNS

[271] A. A. Kanso. Mixer — a new stream cipher. Journal of Discrete Math-ematical Sciences and Cryptography, 11(2):159–179, April 2008. CO-DEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=02.

Page 50: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 50

Foundas:2008:LPS

[272] E. Foundas, C. Patsakis, and G. Chondrocoukis. Lucas permutations andsome notes on Fibonacci permutations. Journal of Discrete Mathemati-cal Sciences and Cryptography, 11(2):181–190, April 2008. CODEN ????ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=02.

Mitton:2008:BFV

[273] M. Mitton. Boolean functions of n variables and permutations on Fn.Journal of Discrete Mathematical Sciences and Cryptography, 11(2):191–200, April 2008. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=02.

Mitton:2008:MPC

[274] M. Mitton. Minimal polynomial of Cayley graph adjacency matrixfor Boolean functions. Journal of Discrete Mathematical Sciencesand Cryptography, 11(2):201–207, April 2008. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=02.

Artikis:2008:RSI

[275] P. T. Artikis and C. T. Artikis. Random sums of integral part modelsin computer systems operations. Journal of Discrete Mathematical Sci-ences and Cryptography, 11(2):209–217, April 2008. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=02.

Sundaram:2008:GLP

[276] M. Sundaram, R. Ponraj, and S. Somasundaram. On graph la-beling parameters. Journal of Discrete Mathematical Sciences andCryptography, 11(2):219–229, April 2008. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=02.

Viswanath:2008:IVH

[277] M. K. Viswanath and A. R. Deepti. An improvised version of Hill’s ci-pher. Journal of Discrete Mathematical Sciences and Cryptography, 11(2):231–237, April 2008. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=02.

Page 51: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 51

Ponraj:2008:MLG

[278] R. Ponraj and S. Somasundaram. Mean labeling of graphs obtainedby identifying two graphs. Journal of Discrete Mathematical Sciencesand Cryptography, 11(2):239–252, April 2008. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=02.

Huang:2008:UCP

[279] T. L. Huang, C. W. Liu, C. C. Chao, K. T. Lee, T. Y. Hwang,and C. M. Chung. Upper core point detection using improved antcolony optimization algorithm. Journal of Discrete Mathematical Sci-ences and Cryptography, 11(3):253–265, June 2008. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=03.

Islam:2008:PER

[280] M. I. Islam, M. Zulhasnine, and M. R. Amin. Performance evaluation ofrake receiver of DS-CDMA under AWGN environments. Journal of Dis-crete Mathematical Sciences and Cryptography, 11(3):267–279, June 2008.CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=03.

Kim:2008:PFS

[281] Y. S. Kim and J. H. Chang. A proxy fail-stop signature schemewith proxy revocation. Journal of Discrete Mathematical Sciencesand Cryptography, 11(3):281–295, June 2008. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=03.

Sethumadhavan:2008:AKE

[282] M. Sethumadhavan, M. Sindhu, C. Srinivasan, and C. Kavitha. Analgorithm for k-error joint linear complexity of binary multisequences.Journal of Discrete Mathematical Sciences and Cryptography, 11(3):297–304, June 2008. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=03.

Ibrahim:2008:CDC

[283] H. Ibrahim, R. Ramli, and M. H. Hassan. Combinatorial design fora conference: constructing a balanced three-parallel session schedule.Journal of Discrete Mathematical Sciences and Cryptography, 11(3):

Page 52: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 52

305–317, June 2008. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=03.

Kumar:2008:SSI

[284] Y. Kumar and N. R. Pillai. On shift sequences for interleaved constructionof signal sets with low correlation. Journal of Discrete Mathematical Sci-ences and Cryptography, 11(3):319–331, June 2008. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=03.

Das:2008:USL

[285] A. K. Das. An unconditionally secure location-aware key managementscheme for static sensor networks. Journal of Discrete Mathematical Sci-ences and Cryptography, 11(3):333–355, June 2008. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=03.

Chakrabarti:2008:NOE

[286] S. Chakrabarti and S. K. Pal. A new online extended visual cryptographyscheme for STS access structures. Journal of Discrete Mathematical Sci-ences and Cryptography, 11(3):357–374, June 2008. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=03.

Yeh:2008:OS

[287] Y. S. Yeh, M. C. Kao, and W. S. Lai. The orthogonal signature.Journal of Discrete Mathematical Sciences and Cryptography, 11(4):375–384, August 2008. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=04.

Wang:2008:LIL

[288] C. C. Wang, M. C. Kao, and Y. S. Yeh. Low information leakage randompadding scheme for block encryption. Journal of Discrete MathematicalSciences and Cryptography, 11(4):385–391, August 2008. CODEN ????ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=04.

Verma:2008:DCN

[289] A. K. Verma, M. Dave, and R. C. Joshi. DNA cryptography: a novelparadigm for secure routing in Mobile Ad hoc Networks (MANETs).Journal of Discrete Mathematical Sciences and Cryptography, 11(4):

Page 53: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 53

393–404, August 2008. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=04.

Glinos:2008:EBR

[290] N. Glinos and Y. C. Stamatiou. On the equivalence between ran-dom graph models. Journal of Discrete Mathematical Sciences andCryptography, 11(4):405–419, August 2008. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=04.

Jesintha:2008:NCG

[291] J. J. Jesintha and G. Sethuraman. A new class of graceful rootedtrees. Journal of Discrete Mathematical Sciences and Cryptography, 11(4):421–435, August 2008. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=04.

Atani:2008:PKC

[292] R. E. Atani, S. E. Atani, and S. Mirzakuchaki. Public key cryptographyusing semigroup actions and semirings. Journal of Discrete MathematicalSciences and Cryptography, 11(4):437–445, August 2008. CODEN ????ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=04.

Procesi:2008:MHR

[293] R. Procesi and R. Rota. Multiplicative HV-rings and complemen-tary hyperstructures. Journal of Discrete Mathematical Sciences andCryptography, 11(4):447–456, August 2008. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=04.

Ferri:2008:GCT

[294] S. Ferri. Graphic characterizations of twisted cubic in PG(3, q). Jour-nal of Discrete Mathematical Sciences and Cryptography, 11(4):457–460, August 2008. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=04.

Marcu:2008:ACN

[295] D. Marcu. An approximate chromatic number of a graph. Jour-nal of Discrete Mathematical Sciences and Cryptography, 11(4):461–464, August 2008. CODEN ???? ISSN 0972-0529. URL http:

Page 54: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 54

//www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=04.

Ikorong:2008:RGC

[296] G. Ikorong. A reformulation of the Goldbach conjecture. Jour-nal of Discrete Mathematical Sciences and Cryptography, 11(4):465–469, August 2008. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=04.

Mathew:2008:JBH

[297] S. Mathew and K. P. Jacob. JERIM-320: a 320-bit hash function with dualapplications — a statistical analysis. Journal of Discrete MathematicalSciences and Cryptography, 11(4):471–482, August 2008. CODEN ????ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=04.

Clark:2008:ADR

[298] L. Clark. Ascents and descents in random trees. Journal of DiscreteMathematical Sciences and Cryptography, 11(4):483–492, August 2008.CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=04.

Basu:2008:DFO

[299] M. Basu, Md. M. Rahaman, and S. Bagchi. 3− (2m, 2m|1, 2m|2|1) designfor first order Reed–Muller code R(1,m). Journal of Discrete Mathemati-cal Sciences and Cryptography, 11(4):493–500, August 2008. CODEN ????ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=04.

Han:2008:GPG

[300] N. Han and Z. Liang. On the graceful permutation graphs conjec-ture. Journal of Discrete Mathematical Sciences and Cryptography, 11(5):501–526, October 2008. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=05.

Azanchiler:2008:ELS

[301] H. Azanchiler. Extension of line-splitting operation from graphs tobinary matroids. Journal of Discrete Mathematical Sciences andCryptography, 11(5):527–536, October 2008. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=05.

Page 55: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 55

Khadir:2008:AFS

[302] O. Khadir. Algorithm for factoring some RSA and Rabin moduli. Jour-nal of Discrete Mathematical Sciences and Cryptography, 11(5):537–543, October 2008. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=05.

Lee:2008:ED

[303] C. Y. Lee and W. S. Lai. Extended DSA. Journal of Discrete MathematicalSciences and Cryptography, 11(5):545–550, October 2008. CODEN ????ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=05.

Ferri:2008:NSQ

[304] S. Ferri. On the non singular quartics of PG(2, 3). Journal of DiscreteMathematical Sciences and Cryptography, 11(5):551–558, October 2008.CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=05.

Germina:2008:FRS

[305] K. A. Germina, K. Abhishek, and K. L. Princy. Further resultson set-valued graphs. Journal of Discrete Mathematical Sciences andCryptography, 11(5):559–566, October 2008. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=05.

Huang:2008:SAP

[306] P. H. Huang. A study of applying parallel THBL algorithm to afighter plane system. Journal of Discrete Mathematical Sciences andCryptography, 11(5):567–577, October 2008. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=05.

Dhenakaran:2008:MSK

[307] S. S. Dhenakaran, E. R. Naganathan, and C. Ganesamoorthy. Multiplesymmetric keys using Banach fixed point theorem. Journal of DiscreteMathematical Sciences and Cryptography, 11(5):579–587, October 2008.CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=05.

Chandra:2008:GMB

[308] P. Chandra, R. K. Singh, and Y. Singh. Generation of mutants forBoolean expression. Journal of Discrete Mathematical Sciences and

Page 56: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 56

Cryptography, 11(5):589–607, October 2008. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=05.

Chang:2008:MDA

[309] H. T. Chang. Mathematical development and analysis to conflict resolu-tion. Journal of Discrete Mathematical Sciences and Cryptography, 11(5):609–618, October 2008. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=05.

Anonymous:2008:EVN

[310] Anonymous. Errata: Volume 11 number 5. Journal of Discrete Mathemat-ical Sciences and Cryptography, 11(5):619, October 2008. CODEN ????ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=05.

Dey:2008:NCP

[311] P. P. Dey and M. Asifuzzaman. A note on the code of projectiveplane of order four. Journal of Discrete Mathematical Sciences andCryptography, 11(6):621–637, December 2008. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=06.

Guo:2008:MIM

[312] F. Guo, Y. Mu, and Z. Chen. Multi-identity management for identity-based cryptography. Journal of Discrete Mathematical Sciences andCryptography, 11(6):639–672, December 2008. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=06.

Sharma:2008:IEA

[313] M. Sharma, M. K. Kowar, and M. Sharma. An improved evolutionaryalgorithm for secured image using adaptive genetic algorithm. Jour-nal of Discrete Mathematical Sciences and Cryptography, 11(6):673–683, December 2008. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=06.

Cinque:2008:CSL

[314] L. Cinque, G. Iovane, and E. Sangineto. Comparing SIFT and LDA basedface recognition approaches. Journal of Discrete Mathematical Sciencesand Cryptography, 11(6):685–704, December 2008. CODEN ???? ISSN

Page 57: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 57

0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=06.

Mou:2008:DCA

[315] S. Mou, Md. I. Islam, and M. R. Amin. Dynamic channel allocationin mobile cellular networks. Journal of Discrete Mathematical Sciencesand Cryptography, 11(6):705–714, December 2008. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=06.

Nemron:2008:OAT

[316] Ikorong Anouk Gilbert Nemron. An original abstract over the twinprimes, the Goldbach conjecture, the friendly numbers, the perfectnumbers, the Mersenne composite numbers, and the Sophie Ger-main primes. Journal of Discrete Mathematical Sciences and Cryp-tography, 11(6):715–726, December 2008. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=06.

Seenivasan:2008:VEL

[317] M. Seenivasan and A. Lourdusamy. Vertex equitable labeling of graphs.Journal of Discrete Mathematical Sciences and Cryptography, 11(6):727–735, December 2008. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=06.

Navaei:2008:HMH

[318] L. Navaei and R. Dayanian. Hidden message via hypothesis testing andinformation — theoretic model. Journal of Discrete Mathematical Sci-ences and Cryptography, 11(6):737–746, December 2008. CODEN ????ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=06.

Anonymous:2008:IV

[319] Anonymous. Index of volume 11 (2008). Journal of Discrete MathematicalSciences and Cryptography, 11(6):747–752, December 2008. CODEN ????ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=11&issue_id=06.

Iovane:2009:MTU

[320] G. Iovane, G. Ingenito, and M. Leone. Motion tracking usingfuzzy logic and consistent labeling for multiple objects in multi-ple cameras vision. Journal of Discrete Mathematical Sciences and

Page 58: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 58

Cryptography, 12(1):1–42, February 2009. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=01.

Kazemi:2009:GGI

[321] A. P. Kazemi. Geodomination in graphs II. Journal of Discrete Mathemat-ical Sciences and Cryptography, 12(1):43–50, February 2009. CODEN ????ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=01.

Islam:2009:PCT

[322] Md. I. Islam and J. K. Das. Performance comparison of two and threebeam SDMA traffic in mobile cellular network. Journal of Discrete Math-ematical Sciences and Cryptography, 12(1):51–61, February 2009. CO-DEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=01.

Sitthiwiratham:2009:PJG

[323] T. Sitthiwiratham and C. Promsakon. Planarity of joined graphs.Journal of Discrete Mathematical Sciences and Cryptography, 12(1):63–69, February 2009. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=01.

Longani:2009:APT

[324] V. Longani. Applications of Polya’s theorem to distribution problemsand partitions of integers. Journal of Discrete Mathematical Sciencesand Cryptography, 12(1):71–77, February 2009. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=01.

Al-Hassan:2009:IPM

[325] Q. Al-Hassan. On inverses of pentadiagonal matrices. Journal of DiscreteMathematical Sciences and Cryptography, 12(1):79–91, February 2009.CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=01.

Ghameshlou:2009:STD

[326] A. N. Ghameshlou and S. M. Sheikholeslami. Signed (total) dominationnumbers and Laplacian spectrum of graphs. Journal of Discrete Math-ematical Sciences and Cryptography, 12(1):93–99, February 2009. CO-DEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=01.

Page 59: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 59

Settepanella:2009:BSC

[327] S. Settepanella. Blocking sets in the complement of hyperplane arrange-ments in projective space. Journal of Discrete Mathematical Sciencesand Cryptography, 12(1):101–107, February 2009. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=01.

Lourdusamy:2009:GPN

[328] A. Lourdusamy and C. Muthulakshmi. Generalized t-pebbling num-ber of a graph. Journal of Discrete Mathematical Sciences andCryptography, 12(1):109–120, February 2009. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=01.

Nitaj:2009:AEC

[329] A. Nitaj. Application of ECM to a class of RSA keys. Journal of DiscreteMathematical Sciences and Cryptography, 12(2):121–137, April 2009. CO-DEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=02.

Saha:2009:PSK

[330] M. Saha and D. Roychowdhury. Provably secure key establishment pro-tocol using one-way functions. Journal of Discrete Mathematical Sci-ences and Cryptography, 12(2):139–158, April 2009. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=02.

Lizzio:2009:MEE

[331] A. Lizzio and M. A. Munda. Maximum embedding of a E2(v −w, 4, 1) into a P(v, 4, e). Journal of Discrete Mathematical Sciencesand Cryptography, 12(2):159–166, April 2009. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=02.

Sattanathan:2009:DPG

[332] M. Sattanathan and R. Kala. Degree prime graph. Journal of DiscreteMathematical Sciences and Cryptography, 12(2):167–173, April 2009. CO-DEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=02.

Cengellenmis:2009:GIC

[333] Y. Cengellenmis. The gray image of the cyclic codes over IF2[u]/u2 − 1.Journal of Discrete Mathematical Sciences and Cryptography, 12(2):

Page 60: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 60

175–178, April 2009. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=02.

Chelvam:2009:NSD

[334] T. T. Chelvam and S. R. Chellathurai. A note on split domina-tion number of a graph. Journal of Discrete Mathematical Sciencesand Cryptography, 12(2):179–186, April 2009. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=02.

Ferri:2009:CMN

[335] S. Ferri. On class [m,n]1k-sets in PG(2, 3). Journal of Discrete Mathemat-ical Sciences and Cryptography, 12(2):187–191, April 2009. CODEN ????ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=02.

Pawar:2009:SER

[336] Y. S. Pawar and P. V. Patil. Semiprime elements and relative annihi-lators in multiplicative lattices. Journal of Discrete Mathematical Sci-ences and Cryptography, 12(2):193–204, April 2009. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=02.

Artikis:2009:IPM

[337] C. T. Artikis and P. T. Artikis. Integral part models in information sys-tems and educational processes. Journal of Discrete Mathematical Sci-ences and Cryptography, 12(2):205–215, April 2009. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=02.

Wu:2009:MAD

[338] C. C. Wu, Y. L. Wu, and P. C. Yang. Multiple attribute decisionmaking assessment on the notebook computer industry performance.Journal of Discrete Mathematical Sciences and Cryptography, 12(2):217–237, April 2009. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=02.

Cengellenmis:2009:UCC

[339] Y. Cengellenmis. On (1 − u2)-cyclic and cyclic codes over IFp + uIFp +u2IFp. Journal of Discrete Mathematical Sciences and Cryptography, 12

Page 61: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 61

(2):239–243, April 2009. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=02.

Elumalai:2009:GUC

[340] A. Elumalai and G. Sethuraman. Gracefulness of union of cycle with par-allel chords and complete bipartite graphs or paths. Journal of DiscreteMathematical Sciences and Cryptography, 12(2):245–252, April 2009. CO-DEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=02.

Rozario:2009:PEC

[341] L. J. Rozario and Md. I. Islam. Performance estimation of call admis-sion control schemes based voice/data integrated wireless cellular net-work with customer retrials. Journal of Discrete Mathematical Sciencesand Cryptography, 12(3):253–294, June 2009. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=03.

Basavanagoud:2009:PG

[342] B. Basavanagoud and K. G. Mirajkar. On permanent graphs. Jour-nal of Discrete Mathematical Sciences and Cryptography, 12(3):295–311, June 2009. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=03.

Ismail:2009:NSS

[343] E. S. Ismail, N. M. F. Tahat, and R. R. Ahmad. A new signature schemebased on factoring and discrete logarithms. Journal of Discrete Mathemat-ical Sciences and Cryptography, 12(3):313–318, June 2009. CODEN ????ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=03.

Rad:2009:NVC

[344] N. J. Rad. A note on yL/t-vertex critical graphs. Journal of DiscreteMathematical Sciences and Cryptography, 12(3):319–322, June 2009. CO-DEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=03.

Mitton:2009:BBF

[345] M. Mitton. On Boolean bent functions. Journal of Discrete MathematicalSciences and Cryptography, 12(3):323–333, June 2009. CODEN ???? ISSN

Page 62: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 62

0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=03.

Artikis:2009:DRS

[346] C. T. Artikis and P. T. Artikis. Discrete random sums in processes ofsystemics arising in cybernetics and informatics. Journal of DiscreteMathematical Sciences and Cryptography, 12(3):335–345, June 2009. CO-DEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=03.

Liang:2009:DCS

[347] Z. Liang and S. Yang. On DRC covering — a survey. Journal of DiscreteMathematical Sciences and Cryptography, 12(3):347–351, June 2009. CO-DEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=03.

Padmavathy:2009:PAI

[348] R. Padmavathy and C. Bhagvati. Performance analysis of indexcalculus method. Journal of Discrete Mathematical Sciences andCryptography, 12(3):353–371, June 2009. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=03.

Kala:2009:RBN

[349] R. Kala and T. R. N. Vasantha. Restrained bondage number of agraph. Journal of Discrete Mathematical Sciences and Cryptography, 12(3):373–380, June 2009. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=03.

Liang:2009:COP

[350] Z. Liang and J. Wang. Constructions of optimal packing and coveringof the complete multigraph with applications. Journal of Discrete Math-ematical Sciences and Cryptography, 12(4):381–410, August 2009. CO-DEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=04.

Alikhani:2009:DSC

[351] S. Alikhani and Y. H. Peng. Dominating sets of centipedes. Jour-nal of Discrete Mathematical Sciences and Cryptography, 12(4):411–428, August 2009. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=04.

Page 63: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 63

Hutsell:2009:EAR

[352] S. R. Hutsell and G. W. Greenwood. Efficient algebraic representa-tion of quantum circuits. Journal of Discrete Mathematical Sciencesand Cryptography, 12(4):429–449, August 2009. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=04.

Om:2009:NNB

[353] H. Om and T. K. Sarkar. Neural network based intrusion detection systemfor detecting changes in hardware profile. Journal of Discrete Mathemati-cal Sciences and Cryptography, 12(4):451–466, August 2009. CODEN ????ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=04.

Vilfred:2009:ISS

[354] V. Vilfred and C. Jayasekaran. Interchange similar self vertex switch-ings in graphs. Journal of Discrete Mathematical Sciences and Cryptog-raphy, 12(4):467–480, August 2009. CODEN ???? ISSN 0972-0529.URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=04.

Acharya:2009:ENC

[355] B. D. Acharya, K. A. Germina, K. L. Princy, and S. B. Rao. Embed-ding and NP-completeness theorems for set-graceful, topologically set-graceful and set-sequential graphs. Journal of Discrete Mathematical Sci-ences and Cryptography, 12(4):481–487, August 2009. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=04.

Kazemi:2009:DNS

[356] A. P. Kazemi. On the domination number of some graphs. Jour-nal of Discrete Mathematical Sciences and Cryptography, 12(4):489–493, August 2009. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=04.

Lekshmi:2009:PMD

[357] R. S. Lekshmi and R. Anitha. Perfect matching dominating cycle —a new dominating cycle. Journal of Discrete Mathematical Sciencesand Cryptography, 12(4):495–508, August 2009. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=04.

Page 64: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 64

Freyre:2009:SAR

[358] P. Freyre, N. Diaz, and E. R. Morgado. Some algorithms related to matri-ces with entries in a finite field. Journal of Discrete Mathematical Sciencesand Cryptography, 12(5):509–519, October 2009. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=05.

Hedayati:2009:CBI

[359] H. Hedayati and Z. Jafari. Connections between interval valued fuzzygraphs and fuzzy groups with (S, T )-norms. Journal of Discrete Math-ematical Sciences and Cryptography, 12(5):521–531, October 2009. CO-DEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=05.

Freyre:2009:FAM

[360] P. Freyre, N. Diaz, and E. R. Morgado. Fast algorithm for the multiplica-tion of a row vector by a randomly selected matrix A. Journal of DiscreteMathematical Sciences and Cryptography, 12(5):533–549, October 2009.CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=05.

Dayantis:2009:CRS

[361] J. Dayantis and J.-F. Palierne. Complementary results on the search ofprimes from lesser primes. Journal of Discrete Mathematical Sciencesand Cryptography, 12(5):551–559, October 2009. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=05.

Nemron:2009:SDP

[362] Ikorong Anouk Gilbert Nemron. A simplification of the difficult partof the Berge last conjecture. Journal of Discrete Mathematical Sciencesand Cryptography, 12(5):561–569, October 2009. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=05.

Nemron:2009:SDA

[363] Ikorong Anouk Gilbert Nemron. A simple dissertation around the Bergeproblem and the Hadwiger conjecture. Journal of Discrete MathematicalSciences and Cryptography, 12(5):571–593, October 2009. CODEN ????ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=05.

Page 65: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 65

Lee:2009:LPG

[364] C. C. Lee, K. Y. Huang, and S. Y. Huang. On-line password guess-ing attack on Lu–Cao key agreement protocol for secure authentica-tion. Journal of Discrete Mathematical Sciences and Cryptography, 12(5):595–598, October 2009. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=05.

Daili:2009:SPA

[365] N. Daili. Some probabilistic approaches to some asymptotic primenumbers formulae. Journal of Discrete Mathematical Sciences andCryptography, 12(5):599–614, October 2009. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=05.

Koukouvinos:2009:ESU

[366] C. Koukouvinos, E. Lappas, and D. E. Simos. Encryption schemesusing orthogonal arrays. Journal of Discrete Mathematical Sciencesand Cryptography, 12(5):615–628, October 2009. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=05.

Helmy:2009:UCO

[367] G. W. Helmy, M. A. Ahmed, and M. N. El-Derini. Using co-operatingagents for partial results protection in mobile agent paradigm. Jour-nal of Discrete Mathematical Sciences and Cryptography, 12(6):629–647, December 2009. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=06.

Chiu:2009:DTT

[368] M. C. Chiu, L. J. Yeh, and C. H. Yeh. The development of tactile test-ing machine on tact switch. Journal of Discrete Mathematical Sciencesand Cryptography, 12(6):649–669, December 2009. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=06.

Rani:2009:NSS

[369] R. U. Rani. A novel single source shortest path algorithm. Jour-nal of Discrete Mathematical Sciences and Cryptography, 12(6):671–680, December 2009. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=06.

Page 66: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 66

Talebi:2009:KIG

[370] Y. Talebi, M. S. Esmaeilifar, and S. Azizpour. A kind of intersectiongraph of vector space. Journal of Discrete Mathematical Sciences andCryptography, 12(6):681–689, December 2009. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=06.

Islam:2009:CAS

[371] Md. I. Islam, J. K. Das, and M. R. Amin. Call admission scheme of mixedtraffic for mobile cellular networks. Journal of Discrete MathematicalSciences and Cryptography, 12(6):691–705, December 2009. CODEN ????ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=06.

Zannetti:2009:CCP

[372] M. Zannetti. A combinatorial characterization of parabolic quadrics.Journal of Discrete Mathematical Sciences and Cryptography, 12(6):707–715, December 2009. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=06.

Huang:2009:PSC

[373] J. C. Huang and W. T. Pan. Performing stock closing price predictionthrough the use of principle component regression in association with gen-eral regression neural network. Journal of Discrete Mathematical Sciencesand Cryptography, 12(6):717–728, December 2009. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=06.

Sweetly:2009:RNW

[374] R. Sweetly and J. Paulraj Joseph. The radio number of (Wn: 2) graphs.Journal of Discrete Mathematical Sciences and Cryptography, 12(6):729–736, December 2009. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=06.

Stangarone:2009:CIO

[375] R. Stangarone and L. Verdi. Cryptosystems involving one factor-izations of graphs. Journal of Discrete Mathematical Sciences andCryptography, 12(6):737–743, December 2009. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=06.

Page 67: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 67

Poulakis:2009:PKE

[376] D. Poulakis. A public key encryption scheme based on factoring anddiscrete logarithm. Journal of Discrete Mathematical Sciences andCryptography, 12(6):745–752, December 2009. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=06.

Anonymous:2009:IV

[377] Anonymous. Index of volume 12 (2009). Journal of Discrete MathematicalSciences and Cryptography, 12(6):753–758, December 2009. CODEN ????ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=06.

Anonymous:2009:CVN

[378] Anonymous. Contents — volume 12 number 6 (2009). Journal of Dis-crete Mathematical Sciences and Cryptography, 12(6):A, December 2009.CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=12&issue_id=06.

Bahar:2010:FSI

[379] H. B. Bahar, M. Sokouti, and B. Sokouti. A first study of improv-ing transposition cryptosystem. Journal of Discrete Mathematical Sci-ences and Cryptography, 13(1):1–9, February 2010. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=01.

Ferri:2010:CCC

[380] S. Ferri. Combinatorial characterizations of (2q + 1)-caps in PG(r, q).Journal of Discrete Mathematical Sciences and Cryptography, 13(1):11–15, February 2010. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=01.

Lin:2010:DAM

[381] K. Y. Lin, J. C. Lin, J. M. Chen, and T. C. Wu. Defense automatic mali-cious tools based on navigation behavior. Journal of Discrete Mathemati-cal Sciences and Cryptography, 13(1):17–27, February 2010. CODEN ????ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=01.

Padmavathy:2010:EKR

[382] R. Padmavathy and C. Bhagvati. Ephemeral key recovery using in-dex calculus method. Journal of Discrete Mathematical Sciences and

Page 68: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 68

Cryptography, 13(1):29–43, February 2010. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=01.

Mulaudzi:2010:EAP

[383] M. S. Mulaudzi and O. Akinyemi. q-enumeration of alternating per-mutations of odd length. Journal of Discrete Mathematical Sciencesand Cryptography, 13(1):45–67, February 2010. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=01.

Mitton:2010:CGD

[384] M. Mitton. Convolution and generalized difference sets. Jour-nal of Discrete Mathematical Sciences and Cryptography, 13(1):69–83, February 2010. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=01.

Kobayashi:2010:ADE

[385] N. Kobayashi, T. Matsushima, and S. Hirasawa. An accurate densityevolution analysis for a finite-state Markov channel. Journal of DiscreteMathematical Sciences and Cryptography, 13(1):85–97, February 2010.CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=01.

Shobhalatha:2010:LPD

[386] G. Shobhalatha and K. Suresh. Lattice properties in dioids. Jour-nal of Discrete Mathematical Sciences and Cryptography, 13(1):99–104, February 2010. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=01.

Hirasawa:2010:NPG

[387] S. Hirasawa and M. Kasahara. A note on performance of general-ized tail biting trellis codes. Journal of Discrete Mathematical Sciencesand Cryptography, 13(2):105–122, April 2010. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=02.

Hedayati:2010:IBF

[388] H. Hedayati. t-implication-based fuzzy interior hyperideals of semihyper-groups. Journal of Discrete Mathematical Sciences and Cryptography, 13

Page 69: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 69

(2):123–140, April 2010. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=02.

Mohapatra:2010:WEP

[389] A. K. Mohapatra and N. Prakash. Wired equivalent privacy reinvesti-gated. Journal of Discrete Mathematical Sciences and Cryptography, 13(2):141–151, April 2010. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=02.

Cinque:2010:FRU

[390] L. Cinque, G. Iovane, M. Manzo, and E. Sangineto. Face recognition usingSIFT features and a region-based ranking. Journal of Discrete Mathemat-ical Sciences and Cryptography, 13(2):153–170, April 2010. CODEN ????ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=02.

Berardi:2010:CKE

[391] L. Berardi and R. Rota. A construction of a key exchange proto-col. Journal of Discrete Mathematical Sciences and Cryptography, 13(2):171–174, April 2010. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=02.

Sharma:2010:EDM

[392] B. D. Sharma and N. Sookoo. Eigenvalues of the difference matri-ces of the Lee partition. Journal of Discrete Mathematical Sciencesand Cryptography, 13(2):175–183, April 2010. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=02.

Kouadri:2010:RBF

[393] A. Kouadri, L. Chiter, and M. Zelmat. A radial basis function neural net-work optimized through modified DIRECT algorithm based-model for athree interconnected water tank. Journal of Discrete Mathematical Sci-ences and Cryptography, 13(2):185–200, April 2010. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=02.

Anonymous:2010:TCV

[394] Anonymous. Table of contents — volume 13 number 2. Journal of Dis-crete Mathematical Sciences and Cryptography, 13(2):A, April 2010. CO-

Page 70: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 70

DEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=02.

Feng:2010:FQH

[395] Y. Feng. p-fuzzy quasi-hypergroups obtained from fuzzy binary rela-tions. Journal of Discrete Mathematical Sciences and Cryptography, 13(3):201–208, June 2010. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=03.

Porkodi:2010:SAE

[396] C. Porkodi, R. Arumuganathan, and K. Vidya. Single authority electronicvoting based on elliptic curves. Journal of Discrete Mathematical Sci-ences and Cryptography, 13(3):209–217, June 2010. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=03.

Hwang:2010:ENI

[397] S. J. Hwang and C. H. Chao. An efficient non-interactive deniable authen-tication protocol with anonymous sender protection. Journal of DiscreteMathematical Sciences and Cryptography, 13(3):219–231, June 2010. CO-DEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=03.

Pal:2010:DSC

[398] S. K. Pal, S. Kapoor, A. Arora, R. Chaudhary, and J. Khurana. Design ofstrong cryptographic schemes based on Latin Squares. Journal of DiscreteMathematical Sciences and Cryptography, 13(3):233–256, June 2010. CO-DEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=03.

Saxena:2010:SNC

[399] B. Saxena and S. K. Pal. Some new concepts in fuzzy arithmetic.Journal of Discrete Mathematical Sciences and Cryptography, 13(3):257–270, June 2010. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=03.

Li:2010:ELE

[400] R. Li. Eigenvalues, Laplacian eigenvalues, and Hamiltonian con-nectivity of graphs. Journal of Discrete Mathematical Sciences andCryptography, 13(3):271–275, June 2010. CODEN ???? ISSN

Page 71: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 71

0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=03.

Vasuki:2010:CNC

[401] R. Vasuki and A. Nagarajan. On the construction of new classesof super mean graphs. Journal of Discrete Mathematical Sciencesand Cryptography, 13(3):277–290, June 2010. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=03.

Fan:2010:NSM

[402] C. M. Fan and C. C. Huang. A note of solutions to the morphic invo-lution language equations. Journal of Discrete Mathematical Sciencesand Cryptography, 13(3):291–298, June 2010. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=03.

Lee:2010:ALK

[403] M. J. Lee, M. K. Kuo, and Y. R. Chen. An antimagic label-ing in K2n, 2n|nC4. Journal of Discrete Mathematical Sciences andCryptography, 13(3):299–304, June 2010. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=03.

Anonymous:2010:CVN

[404] Anonymous. Contents — volume 13 number 03 June 2010. Journal ofDiscrete Mathematical Sciences and Cryptography, 13(3):A, June 2010.CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=03.

Swapna:2010:BCI

[405] S. Swapna, A. D. Dileep, C. C. Sekhar, and S. Kant. Block cipheridentification using support vector classification and regression. Jour-nal of Discrete Mathematical Sciences and Cryptography, 13(4):305–318, August 2010. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=04.

Nagireddy:2010:IEM

[406] S. Nagireddy, H. A. Murthy, and S. Kant. Identification of encryptionmethod for block ciphers using histogram method. Journal of DiscreteMathematical Sciences and Cryptography, 13(4):319–328, August 2010.CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=04.

Page 72: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 72

Kant:2010:ISR

[407] S. Kant, V. Sharma, N. Verma, and B. K. Dass. Identification scheme forromanized Indian languages from their plain and ciphered bit stream.Journal of Discrete Mathematical Sciences and Cryptography, 13(4):329–345, August 2010. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=04.

Kant:2010:CPC

[408] S. Kant, R. K. Asthana, and B. L. Jangid. Comparative performance of theclassifiers for cryptosystem identification. Journal of Discrete Mathemati-cal Sciences and Cryptography, 13(4):347–368, August 2010. CODEN ????ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=04.

Saito:2010:NAC

[409] T. Saito, T. Matsushima, and S. Hirasawa. A note on automatic con-struction algorithms for orthogonal designs of experiments using er-ror correcting codes. Journal of Discrete Mathematical Sciences andCryptography, 13(4):369–381, August 2010. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=04.

Suko:2010:APU

[410] T. Suko, T. Matsushima, and S. Hirasawa. Asymptotic propertyof universal lossless coding for independent piecewise identically dis-tributed sources. Journal of Discrete Mathematical Sciences andCryptography, 13(4):383–391, August 2010. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=04.

Tang:2010:OMR

[411] Hui-Chin Tang, K. H. Hsieh, and Hwapeng Chang. A 4217th-ordermultiple recursive random number generator with modulus 231 − 69.Journal of Discrete Mathematical Sciences and Cryptography, 13(4):393–398, August 2010. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=04.

Anonymous:2010:BR

[412] Anonymous. Book reviews. Journal of Discrete Mathematical Sciencesand Cryptography, 13(4):399–405, August 2010. CODEN ???? ISSN

Page 73: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 73

0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=04.

Anonymous:2010:CVA

[413] Anonymous. Contents — volume 13 (04 August 2010). Journal of DiscreteMathematical Sciences and Cryptography, 13(4):A, August 2010. CO-DEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=04.

Pal:2010:CAC

[414] S. Pal and P. Bhowmick. Cubic approximation of curve-shaped ob-jects in Z2: a generalized approach based on discrete curvature. Jour-nal of Discrete Mathematical Sciences and Cryptography, 13(5):407–427, October 2010. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=05.

Po-Hsian:2010:WBD

[415] H. Po-Hsian. A weight-based data hiding method for binary image us-ing selective binary numeral system. Journal of Discrete MathematicalSciences and Cryptography, 13(5):429–444, October 2010. CODEN ????ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=05.

Vijayarangan:2010:HPE

[416] N. Vijayarangan. Hard problems in elliptic curve scalar multiplica-tion. Journal of Discrete Mathematical Sciences and Cryptography, 13(5):445–452, October 2010. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=05.

Acharya:2010:VGG

[417] B. D. Acharya and K. A. Germina. Vertex-graceful graphs. Jour-nal of Discrete Mathematical Sciences and Cryptography, 13(5):453–463, October 2010. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=05.

Daili:2010:ABD

[418] N. Daili. About binomial densities: some applications in number the-ory. Journal of Discrete Mathematical Sciences and Cryptography, 13(5):465–472, October 2010. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=05.

Page 74: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 74

Ferri:2010:GCK

[419] O. Ferri and S. Ferri. Graphic characterizations of the k-caps andk-arcs in PG(r, q). Journal of Discrete Mathematical Sciences andCryptography, 13(5):473–477, October 2010. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=05.

Tang:2010:BLC

[420] Hui-Chin Tang, Kuang-Hang Hsieh, and Hwapeng Chang. A 32-bit lin-ear congruential random number generator with prime modulus. Jour-nal of Discrete Mathematical Sciences and Cryptography, 13(5):479–486, October 2010. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=05.

Reddy:2010:IBD

[421] P. V. Reddy, B. U. Rao, and T. Gowri. ID-based directed proxy signaturescheme from bilinear pairings. Journal of Discrete Mathematical Sciencesand Cryptography, 13(5):487–500, October 2010. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=05.

Anonymous:2010:CVO

[422] Anonymous. Contents — volume 13 number 05 October 2010. Journal ofDiscrete Mathematical Sciences and Cryptography, 13(5):A, October 2010.CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=05.

Iovane:2010:BWW

[423] G. Iovane, P. Giordano, G. Ingenito, M. Leone, and A. Nocerino. Bio-metric watermarking via wavelet approach, reverse engineering in infose-curity and dematerialization of public administration. Journal of DiscreteMathematical Sciences and Cryptography, 13(6):501–542, December 2010.CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=06.

Kures:2010:CPS

[424] M. Kures. The composition of polynomials by the substitution princi-ple. Journal of Discrete Mathematical Sciences and Cryptography, 13(6):543–552, December 2010. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=06.

Page 75: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 75

Acharya:2010:SIG

[425] B. D. Acharya. Signed intersection graphs. Journal of Discrete Mathe-matical Sciences and Cryptography, 13(6):553–569, December 2010. CO-DEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=06.

Poinsot:2010:DPN

[426] L. Poinsot. Doubly perfect nonlinear Boolean permutations. Jour-nal of Discrete Mathematical Sciences and Cryptography, 13(6):571–582, December 2010. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=06.

Kazemi:2010:EKK

[427] A. P. Kazemi. Every K1, 7 and K1, 3-free, 3-vertex critical graph of evenorder has a perfect matching. Journal of Discrete Mathematical Sciencesand Cryptography, 13(6):583–591, December 2010. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=06.

Tang:2010:BHA

[428] Hui-Chin Tang, K. H. Hsieh, and T. L. Chao. A backward heuristicalgorithm for two-term multiple recursive random number generators.Journal of Discrete Mathematical Sciences and Cryptography, 13(6):593–600, December 2010. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=06.

Basavanagoud:2010:CNP

[429] B. Basavanagoud and P. V. Patil. A criterion for (non-)planarity of thetransformation graph G(xyz) when xyz = − + +. Journal of DiscreteMathematical Sciences and Cryptography, 13(6):601–610, December 2010.CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=06.

Anonymous:2010:IV

[430] Anonymous. Index of volume 13 (2010). Journal of Discrete MathematicalSciences and Cryptography, 13(6):611–616, December 2010. CODEN ????ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=06.

Page 76: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 76

Anonymous:2010:CVD

[431] Anonymous. Contents — volume 13 number 06 December 2010.Journal of Discrete Mathematical Sciences and Cryptography, 13(6):A, December 2010. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=13&issue_id=06.

Chelvam:2011:NTG

[432] T. T. Chelvam and T. Asir. A note on total graph of Z(n). Journal of Dis-crete Mathematical Sciences and Cryptography, 14(1):1–7, February 2011.CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=01.

Al-Towaiq:2011:EAS

[433] M. H. Al-Towaiq and H. K. Al-Bzoor. An efficient algorithm for thesolution of second order PDE’s using Taylor expansion polynomials.Journal of Discrete Mathematical Sciences and Cryptography, 14(1):9–31, February 2011. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=01.

Jaiyeola:2011:TCI

[434] T. G. Jaıyeola. On three cryptographic identities in left univer-sal Osborn loops. Journal of Discrete Mathematical Sciences andCryptography, 14(1):33–50, February 2011. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=01.

Liang:2011:CPC

[435] Z. Liang. Coverings and packings of complete directed graphs by odd cir-cuits. Journal of Discrete Mathematical Sciences and Cryptography, 14(1):51–75, February 2011. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=01.

Begum:2011:FDB

[436] N. Begum, M. Alam, and Md. I. Islam. Fingerprint detection basedon DWT a new approach. Journal of Discrete Mathematical Sciencesand Cryptography, 14(1):77–87, February 2011. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=01.

Page 77: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 77

Peter:2011:IAL

[437] S. J. Peter and S. P. Victor. An integrated approach for local outlierdetection using dynamic minimum spanning tree. Journal of DiscreteMathematical Sciences and Cryptography, 14(1):89–106, February 2011.CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=01.

Anonymous:2011:CVF

[438] Anonymous. Contents — Vol. 14 # 01 February 2011. Journal of Dis-crete Mathematical Sciences and Cryptography, 14(1):A, February 2011.CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=01.

Elsheh:2011:CPK

[439] E. Elsheh and A. Youssef. Cryptanalysis of a public key cryptosystembased on boolean permutations. Journal of Discrete Mathematical Sci-ences and Cryptography, 14(2):107–115, April 2011. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=02.

Chin:2011:SPI

[440] C. L. Chin and C. C. Huang. Some properties of involution codes.Journal of Discrete Mathematical Sciences and Cryptography, 14(2):117–127, April 2011. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=02.

Syahrul:2011:CTA

[441] E. Syahrul, J. Dubois, and V. Vajnovszki. Combinatorial transforms: Ap-plications in lossless image compression. Journal of Discrete Mathemati-cal Sciences and Cryptography, 14(2):129–147, April 2011. CODEN ????ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=02.

Peter:2011:MST

[442] S. J. Peter. Minimum spanning tree based clustering for outlier detec-tion. Journal of Discrete Mathematical Sciences and Cryptography, 14(2):149–166, April 2011. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=02.

Page 78: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 78

Peter:2011:SSC

[443] S. J. Peter. Structural similarity clustering for detection of outliers andhubs using minimum spanning tree. Journal of Discrete Mathematical Sci-ences and Cryptography, 14(2):167–183, April 2011. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=02.

Kao:2011:EAT

[444] T. C. Kao and H. C. Tang. An exhaustive analysis of two-term mul-tiple recursive random number generators with double precision float-ing point restricted multipliers. Journal of Discrete Mathematical Sci-ences and Cryptography, 14(2):185–191, April 2011. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=02.

Vasuki:2011:FRS

[445] R. Vasuki and A. Nagarajan. Further results on super mean graphs.Journal of Discrete Mathematical Sciences and Cryptography, 14(2):193–206, April 2011. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=02.

Anonymous:2011:CVAa

[446] Anonymous. Contents — Vol. 14 # 02 April 2011. Journal of Dis-crete Mathematical Sciences and Cryptography, 14(2):A, April 2011. CO-DEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=02.

Iovane:2011:EAK

[447] G. Iovane, L. Puccio, G. Lamponi, and A. Amorosia. Electronic accesskey based on innovative Information Fusion technique involving primenumbers and biometric data. Journal of Discrete Mathematical Sci-ences and Cryptography, 14(3):207–225, June 2011. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=03.

Peter:2011:SSM

[448] S. J. Peter. Structural similarity micro clustering algorithm for local out-liers and hubs using dynamic minimum spanning tree. Journal of DiscreteMathematical Sciences and Cryptography, 14(3):227–247, June 2011. CO-DEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=03.

Page 79: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 79

John:2011:FEC

[449] J. John, A. Vijayan, and S. Sujitha. The forcing edge coveringnumber of a graph. Journal of Discrete Mathematical Sciences andCryptography, 14(3):249–259, June 2011. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=03.

Bhaumik:2011:NIN

[450] J. Bhaumik and D. Roy Chowdhury. Nimix: An involutary nonlin-ear vectorial boolean function. Journal of Discrete Mathematical Sci-ences and Cryptography, 14(3):261–277, June 2011. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=03.

Jebitha:2011:DTG

[451] M. K. A. Jebitha and J. P. Joseph. Domination in transforma-tion graph G − +−. Journal of Discrete Mathematical Sciences andCryptography, 14(3):279–303, June 2011. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=03.

Anonymous:2011:CVJ

[452] Anonymous. Contents — Vol. 14 # 03 June 2011. Journal of Dis-crete Mathematical Sciences and Cryptography, 14(3):A, June 2011. CO-DEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=03.

Abdelhady:2011:NBE

[453] G. A. M. Abdelhady, F. S. Helail, and A. A. Elkouny. New DESbased on elliptic curves. Journal of Discrete Mathematical Sciencesand Cryptography, 14(4):305–315, August 2011. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=04.

Amutha:2011:PAA

[454] R. Amutha. Performance analysis of 64-ary triangular quadrature am-plitude modulation. Journal of Discrete Mathematical Sciences andCryptography, 14(4):317–332, August 2011. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=04.

Page 80: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 80

Stoddart:2011:GHH

[455] D. R. Stoddart. The groups H3 and H4 of a class of certain cyclicallypresented groups are 2-generated. Journal of Discrete Mathematical Sci-ences and Cryptography, 14(4):333–340, August 2011. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=04.

Tang:2011:PES

[456] H. C. Tang, K. H. Hsieh, and C. J. Wang. A partial exhaus-tive search for good two-term third-order multiple recursive randomnumber generators. Journal of Discrete Mathematical Sciences andCryptography, 14(4):341–348, August 2011. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=04.

Karthikeyan:2011:MCT

[457] T. Karthikeyan, S. J. Peter, and S. Chidambaranathan. Meta clus-ters through minimum spanning tree based clustering for performanceanalysis of students. Journal of Discrete Mathematical Sciences andCryptography, 14(4):349–367, August 2011. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=04.

Das:2011:UCA

[458] S. Das and D. Roy Chowdhury. On usage of cellular automata instrengthening stream ciphers. Journal of Discrete Mathematical Sciencesand Cryptography, 14(4):369–390, August 2011. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=04.

Vijayarangan:2011:CPB

[459] N. Vijayarangan. Communication protocols based on CAAA attributes.Journal of Discrete Mathematical Sciences and Cryptography, 14(4):391–404, August 2011. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=04.

Anonymous:2011:CVAb

[460] Anonymous. Contents — Vol. 14 # 04 August 2011. Journal of DiscreteMathematical Sciences and Cryptography, 14(4):A, August 2011. CO-DEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=04.

Page 81: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 81

Peter:2011:NDM

[461] S. J. Peter. A novel dynamic minimum spanning tree based clusteringmethod for image mining. Journal of Discrete Mathematical Sciencesand Cryptography, 14(5):405–419, October 2011. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=05.

Arumugam:2011:DDS

[462] S. Arumugam and L. Martin. Degrees and degree sequence of k-edge d-critical graphs. Journal of Discrete Mathematical Sciences andCryptography, 14(5):421–429, October 2011. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=05.

Dayantis:2011:GAN

[463] J. Dayantis. Generalised Arnold numbers and series. Journal of DiscreteMathematical Sciences and Cryptography, 14(5):431–444, October 2011.CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=05.

Eteme:2011:MVA

[464] F. A. Eteme and J. A. Tsimi. A modal [. .]-valent approach ofthe notion of code. Journal of Discrete Mathematical Sciences andCryptography, 14(5):445–473, October 2011. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=05.

Peter:2011:DOH

[465] S. J. Peter. Detection of outliers and hubs using minimum spanning treebased on analytical perspective of degree numbers. Journal of DiscreteMathematical Sciences and Cryptography, 14(5):475–488, October 2011.CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=05.

Peter:2011:NSA

[466] S. J. Peter. Nonparametric search algorithm for outliers and hubs us-ing minimum spanning tree. Journal of Discrete Mathematical Sciencesand Cryptography, 14(5):489–502, October 2011. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=05.

Page 82: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 82

Anonymous:2011:CVO

[467] Anonymous. Contents — Vol. 14 # 05 October 2011. Journal of Dis-crete Mathematical Sciences and Cryptography, 14(5):A, October 2011.CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=05.

Sharma:2011:GKP

[468] B. D. Sharma and N. Sookoo. Generalized Krawtchouk polynomials andthe complete weight enumerator of the dual code. Journal of DiscreteMathematical Sciences and Cryptography, 14(6):503–514, December 2011.CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=06.

Antonopoulou:2011:IDS

[469] H. Antonopoulou, N. Glinos, and Y. C. Stamatiou. An identity derivedfrom the solution of a class of differential equations for the evolution ofa key agreement protocol. Journal of Discrete Mathematical Sciencesand Cryptography, 14(6):515–520, December 2011. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=06.

Ferrero:2011:PDH

[470] D. Ferrero, S. Varghese, and A. Vijayakumar. Power domination inhoneycomb networks. Journal of Discrete Mathematical Sciences andCryptography, 14(6):521–529, December 2011. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=06.

Li:2011:NAD

[471] R. Li. A note on the average distance of a graph. Journal of DiscreteMathematical Sciences and Cryptography, 14(6):531–536, December 2011.CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=06.

Chen:2011:RBR

[472] C. K. Chen. Relation between the releasing strategy and the domesticrentals on the U.S. Major Film. Journal of Discrete Mathematical Sciencesand Cryptography, 14(6):537–558, December 2011. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=06.

Page 83: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 83

Eteme:2011:MAA

[473] Fidele Ayissi Eteme and Jean Arnaud Tsimi. A mΘ approach of the al-gebraic theory of linear codes. Journal of Discrete Mathematical Sciencesand Cryptography, 14(6):559–581, December 2011. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=06.

Peter:2011:EDA

[474] S. J. Peter and S. Chidambaranathan. An efficient divisive-agglomerativehierarchical clustering algorithm using minimum spanning tree. Jour-nal of Discrete Mathematical Sciences and Cryptography, 14(6):583–595, December 2011. CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=06.

Zhao:2011:NSC

[475] K. Zhao, Z. Li, and D. Chen. New sufficient condition and Hamil-tonian and traceable. Journal of Discrete Mathematical Sciences andCryptography, 14(6):597–602, December 2011. CODEN ???? ISSN0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=06.

Anonymous:2011:IV

[476] Anonymous. Index of Volume 14 (2011). Journal of Discrete MathematicalSciences and Cryptography, 14(6):603–606, December 2011. CODEN ????ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=06.

Anonymous:2011:CVD

[477] Anonymous. Contents — Vol. 14 # 06 December 2011. Journal of Dis-crete Mathematical Sciences and Cryptography, 14(6):A, December 2011.CODEN ???? ISSN 0972-0529. URL http://www.connectjournals.com/achivestoc.php?bookmark=CJ-003072&volume=14&issue_id=06.

Dass:2000:DMA

[478] B. K. Dass, editor. Discrete mathematics and allied topics. AcademicForum, Delhi, India, 2000. ISSN 0972-0529. i–iv and 1–262 pp. J. DiscreteMath. Sci. Cryptography 3 (2000), no. 1–3.

Corsini:2003:AHA

[479] P. Corsini, B. K. Dass, M. Gionfriddo, and R. Migliorato, editors. Al-gebraic hyperstructures and applications. Taru Publications, New Delhi,

Page 84: A Bibliography of Publications in the Journal of Discrete ...ftp.math.utah.edu/pub//tex/bib/jdiscrmathscicrypto.pdf · A Bibliography of Publications in the Journal of Discrete Mathematical

REFERENCES 84

India, 2003. ISSN 0972-0529. i–vi and 121–256 pp. J. Discrete Math. Sci.Cryptogr. 6 (2003), no. 2-3.