• A SMART-GENTRY BASED SOFTWARE SYSTEM FOR SECRET PROGRAM EXECUTION
  • ANALYSIS OF BOTNETS THROUGH LIFE-CYCLE
  • ON THE (NON-)REUSABILITY OF FUZZY SKETCHES AND EXTRACTORS AND SECURITY IN THE COMPUTATIONAL SETTING
  • STUDY OF THE PHENOMENOLOGY OF DDOS NETWORK ATTACKS IN PHASE SPACE
  • PRIVATE SEARCHING FOR SENSITIVE FILE SIGNATURES
  • ON THE SECURITY OF LOCATION DETERMINATION AND VERIFICATION METHODS FOR WIRELESS NETWORKS
  • DRIVER AUTHENTICATION USING BRAIN WAVES WHILE ROUTE TRACING AS A MENTAL TASK
  • A SMART CARD BASED GENERIC CONSTRUCTION FOR ANONYMOUS AUTHENTICATION IN MOBILE NETWORKS
  • A TINY RSA COPROCESSOR BASED ON OPTIMIZED SYSTOLIC MONTGOMERY ARCHITECTURE
  • A NEW STEGANOGRAPHIC SCHEME BASED ON FIRST ORDER REED MULLER CODES - A New Steganographic Scheme
  • PRIVACY-PRESERVING SMART METERING WITHOUT A TRUSTED-THIRD-PARTY
  • COLLECTIVE CLASSIFICATION FOR UNKNOWN MALWARE DETECTION
  • A NEW TREE-STRUCTURE-SPECIFIED MULTISIGNATURE SCHEME FOR A DOCUMENT CIRCULATION SYSTEM
  • OPBUS: RISK-AWARE FRAMEWORK FOR THE CONFORMANCE OF SECURITY-QUALITY REQUIREMENTS IN BUSINESS PROCESSES
  • RELATED-KEY ATTACK AGAINST TRIPLE ENCRYPTION BASED ON FIXED POINTS
  • A METHOD FOR FLEXIBLE REDUCTION OVER BINARY FIELDS USING A FIELD MULTIPLIER
  • TOWARDS OPTIMAL REVOCATION AND TRACING SCHEMES - The Power of the Ternary Tree
  • A SECURITY METRICS FRAMEWORK FOR THE CLOUD
  • SMARTPHONE SECURITY EVALUATION - The Malware Attack Case
  • THREE-PARTY PASSWORD-AUTHENTICATED KEY EXCHANGE WITHOUT RANDOM ORACLES
  • ANOMALY-BASED SPAM FILTERING
  • ATTACK INTERFERENCE IN NON-COLLABORATIVE SCENARIOS FOR SECURITY PROTOCOL ANALYSIS
  • ON THE STRENGTH OF EGGLUE AND OTHER LOGIC CAPTCHAs
  • PRIVACY--ENHANCING CRYPTOGRAPHY--BASED MATERIALS
  • A FRESH LOOK INTO THE BIOMETRIC AUTHENTICATION - Perspective from Shannon's Secrecy System and a Special Wiretap Channel
  • IS IP MULTIMEDIA SUBSYSTEM AFFECTED BY ‘MALFORMED MESSAGE’ ATTACKS? - An Evaluation of OpenIMS
  • ON THE PRIVACY THREATS OF ELECTRONIC POLL BOOKS
  • HIGHER LAYER AUTHENTICATION FOR BROADCAST IN CONTROLLER AREA NETWORKS
  • E-COMMERCE AND FAIR EXCHANGE - The Problem of Item Validation
  • HOW TO TRANSMIT MESSAGES VIA WSN IN A HOSTILE ENVIRONMENT
  • APOLLON: TOWARDS A SEMANTICALLY EXTENSIBLE POLICY FRAMEWORK
  • BLACK-BOX COLLISION ATTACKS ON THE COMPRESSION FUNCTION OF THE GOST HASH FUNCTION
  • TOWARDS AN AUTHORIZATION SYSTEM FOR CLOUD INFRASTRUCTURE PROVIDERS
  • BYZANTINE DECISIONS FOR INFERRING TRUST IN SENSOR NETWORKS
  • DISTRIBUTED THRESHOLD CRYPTOGRAPHY CERTIFICATION WITH NO TRUSTED DEALER
  • CHAOTIC ITERATIONS FOR STEGANOGRAPHY - Stego-security and Chaos-security
  • BYTE SLICING GRØSTL - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl
  • SYNEMA: VISUAL MONITORING OF NETWORK AND SYSTEM SECURITY SENSORS
  • A FRAMEWORK FOR SECURITY AND WORKLOAD GRADUAL ADAPTATION
  • TOWARDS AN INFORMATION CONTROL POLICY MODEL - Achieving More Transparency in Internet Filtering Approaches
  • NO SECURITY BY OBSCURITY – WHY TWO FACTOR AUTHENTICATION SHOULD BE BASED ON AN OPEN DESIGN
  • INFORMATION-LEAKAGE IN HYBRID RANDOMIZED PROTOCOLS
  • CCA SECURE CERTIFICATELESS ENCRYPTION SCHEMES BASED ON RSA
  • BOTNET DETECTION BASED ON DNS RECORDS AND ACTIVE PROBING
  • A FORWARD PRIVATE PROTOCOL BASED ON PRNG AND LPN FOR LOW-COST RFID
  • UNOBSERVABLE INTRUSION DETECTION BASED ON CALL TRACES IN PARAVIRTUALIZED SYSTEMS
  • PRACTICAL ANONYMOUS AUTHENTICATION - Designing Anonymous Authentication for Everyday Use
  • ARTIFICIAL IMMUNITY-BASED CORRELATION SYSTEM
  • INTERNATIONALLY STANDARDIZED EFFICIENT CRYPTOGRAPHIC HASH FUNCTION
  • A PUBLIC RANDOMNESS SERVICE
  • DATA AND ACCESS MANAGEMENT USING ACCESS TOKENS FOR DELEGATING AUTHORITY TO PERSONS AND SOFTWARE
  • A FOUR-CONCERN-ORIENTED SECURE IS DEVELOPMENT APPROACH
  • SEMANTIC ANNOTATIONS FOR SECURITY POLICY MATCHING IN WS-POLICY