• Reversible Steganographic Scheme with High Embedding Capacity using Dual Cover Images
  • Two Dragons - A Family of Fast Word-based Stream Ciphers
  • Identity-based Password-Authenticated Key Exchange for Client/Server Model
  • lmRNG: A Lightweight Pseudorandom Number Generator for Wireless Sensor Networks
  • Quantitative Assessment of Cloud Security Level Agreements - A Case Study
  • Self-ad-MCNHA-SLOS - A Self-adaptive Minimum-Cost Network Hardening Algorithm based on Stochastic Loose Optimize Strategy
  • SIMD-based Implementations of Eta Pairing Over Finite Fields of Small Characteristics
  • ADQL: A Flexible Access Definition and Query Language to Define Access Control Models
  • Privacy Preserving Approaches for Global Cycle Detections for Cyclic Association Rules in Distributed Databases
  • Building the Security Foundation to Embrace Public Software-as-a-Service (SaaS) - Security Policies for SaaS Data Protection
  • Tampering with Java Card Exceptions - The Exception Proves the Rule
  • On Secure Communication over Wireless Sensor Networks
  • VLR Group Signatures - How to Achieve Both Backward Unlinkability and Efficient Revocation Checks
  • Homomorphic Primitives for a Privacy-friendly Smart Metering Architecture
  • Flexible Redactable Signature Schemes for Trees - Extended Security Model and Construction
  • Towards Pervasive Cryptographic Access Control Models
  • Cryptographic Enforcement of Access Control while Mitigating Key Sharing
  • Verifying Privacy by Little Interaction and No Process Equivalence
  • A Security Analysis of Emerging Web Standards - HTML5 and Friends, from Specification to Implementation
  • Analysis of Some Natural Variants of the PKP Algorithm
  • Improved “Partial Sums”-based Square Attack on AES
  • Flexible Group Key Exchange with On-demand Computation of Subgroup Keys Supporting Subgroup Key Randomization
  • Biometric Identification in Virtual Worlds using Biometric Fusion Techniques
  • Practical Applications of Homomorphic Encryption
  • Privacy-preserving Targeted Advertising Scheme for IPTV using the Cloud
  • Voice Passwords Revisited
  • Constructing Secure-channel Free Searchable Encryption from Anonymous IBE with Partitioned Ciphertext Structure
  • Securing In-vehicle Communication and Redefining the Role of Automotive Immobilizer
  • Security Policies in Dynamic Service Compositions
  • High-throughput Hardware Architectures of the JH Round-three SHA-3 Candidate - An FPGA Design and Implementation Approach
  • Non-repudiation of Forwarding - Traceability of Confidential Data Via Multiple Recipients
  • Private Outsourcing of Matrix Multiplication over Closed Semi-rings
  • Extension of de Weger’s Attack on RSA with Large Public Keys
  • On the Development of Totally Self-checking Hardware Design for the SHA-1 Hash Function
  • Key Management as a Service
  • Secure and Seamless Session Management in Mobile and Heterogeneous Environment
  • A Collaborative Firewall for Wireless Ad-Hoc Social Networks
  • Some Remarks on Keystroke Dynamics - Global Surveillance, Retrieving Information and Simple Countermeasures
  • Attack Modelling and Security Evaluation for Security Information and Event Management
  • Secure File Allocation and Caching in Large-scale Distributed Systems
  • DDoS Detection with Information Theory Metrics and Netflows - A Real Case
  • Quantifying the Benefits of File Size Information for Forensic Hash Matching
  • Sevigator: Network Confinement of Malware Applications and Untrusted Operating Systems
  • Development of a Snort IPv6 Plugin - Detection of Attacks on the Neighbor Discovery Protocol
  • An Improved Public-key Tracing Scheme with Sublinear Ciphertext Size
  • Formal Analysis of the TLS Handshake Protocol
  • Data Repository for Security Information and Event Management in Service Infrastructures
  • Distributed Threshold Certificate based Encryption Scheme with No Trusted Dealer
  • Defense Against TCP Flooding Attack
  • An Application of a Group Signature Scheme with Backward Unlinkability to Biometric Identity Management
  • Improving Cloud Survivability through Dependency based Virtual Machine Placement
  • PPiTTA - Preserving Privacy in TV Targeted Advertising
  • The Concept of Compatibility between Identity-based and Certificateless Encryption Schemes
  • Adaptive Speech Watermarking in Wavelet Domain based on Logarithm
  • Inverting Thanks to SAT Solving - An Application on Reduced-step MD*
  • Improved Detection of Probe Request Attacks - Using Neural Networks and Genetic Algorithm
  • iSATS: Leveraging Identity based Sender Authentication for Spam Mitigation
  • A Proposed Framework for Analysing Security Ceremonies
  • HoneyCloud: Elastic Honeypots - On-attack Provisioning of High-interaction Honeypots
  • A Novel Fuzzy Vault Scheme for Secret Key Exchange
  • Network-based Executable File Extraction and Analysis for Malware Detection
  • On Securing Communication from Profilers