• AN EFFICIENT RECONFIGURABLE SOS MONTGOMERY MULTIPLIER IN GF (P) USIGN FPGA DSP SLICES
  • MULTI-COLLISIONS ATTACK IN RING HASH STRUCTURE
  • FPGA-TARGETED HARDWARE IMPLEMENTATIONS OF K2
  • KEY DISTRIBUTION BASED ON QUANTUM FOURIER TRANSFORM
  • A FAIR E-TENDERING PROTOCOL
  • A MULTIPLE BIRTHDAY ATTACK ON NTRU
  • ANONYMOUS MESSAGE AUTHENTICATION - Universally Composable Definition and Construction
  • AN EFFICIENT METHODOLOGY TO LIMIT PATH LENGTH GUARANTEEING ANONYMITY IN OVERLAY NETWORKS
  • AN EVENT-DRIVEN, INCLUSIONARY AND SECURE APPROACH TO KERNEL INTEGRITY
  • SECURING THE EMAIL SERVICES - New System for Secure Managing the Organization’s Mail Service
  • IMPROVED FUZZY VAULT SCHEME FOR FINGERPRINT VERIFICATION
  • EFFICIENT IBE-PKE PROXY RE-ENCRYPTION
  • THE SUBSTITUTION CIPHER CHAINING MODE
  • A SHORT NOTE ON SECRET SHARING USING ELLIPTIC CURVES
  • A GENERAL FRAMEWORK FOR GUESS-AND-DETERMINE AND TIME-MEMORY-DATA TRADE-OFF ATTACKS ON STREAM CIPHERS
  • GEOGRAPHIC DATA AND STEGANOGRAPHY - Using Google Earth and KML Files for High-Capacity Steganography
  • A FAST ENCRYPTION SCHEME FOR NETWORKS APPLICATIONS
  • FORWARD-SECURE PROXY SIGNATURE AND REVOCATION SCHEME FOR A PROXY SIGNER WITH MULTIPLE ORIGINAL SIGNERS
  • ON THE (IN)SECURITY OF TWO BUYER-SELLER WATERMARKING PROTOCOLS
  • AN IMPROVEMENT OF STRONG PROXY SIGNATURE AND ITS APPLICATIONS
  • ENSURING PRIVACY OF BIOMETRIC FACTORS IN MULTI-FACTOR AUTHENTICATION SYSTEMS
  • SECURE COMMUNICATION IN MOBILE AD HOC NETWORK USING EFFICIENT CERTIFICATELESS ENCRYPTION
  • REBEL - Reconfigurable Block Encryption Logic
  • DETECTION OF ILLICIT TRAFFIC USING NEURAL NETWORKS
  • A HEURISTIC POLYNOMIAL ALGORITHM FOR LOCAL INCONSISTENCY DIAGNOSIS IN FIREWALL RULE SETS
  • QUANTIFYING MISBEHAVIOUR ATTACKS AGAINST THE SELF-ORGANIZED PUBLIC KEY MANAGEMENT ON MANETS
  • SECURITY REQUIREMENTS IN SOFTWARE PRODUCT LINES
  • NOVEL AND ANOMALOUS BEHAVIOR DETECTION USING BAYESIAN NETWORK CLASSIFIERS
  • LOW AREA SCALABLE MONTGOMERY INVERSION OVER GF(2m)
  • PRACTICAL APPLICATION OF A SECURITY MANAGEMENT MATURITY MODEL FOR SMES BASED ON PREDEFINED SCHEMAS
  • SCFS: TOWARDS DESIGN AND IMPLEMENTATION OF A SECURE DISTRIBUTED FILESYSTEM
  • ALERT CORRELATION BASED ON A LOGICAL HANDLING OF ADMINISTRATOR PREFERENCES AND KNOWLEDGE
  • METRICS APPLICATION IN METROPOLITAN BROADBAND ACCESS NETWORK SECURITY ANALYSIS
  • MULTIPHASE DEPLOYMENT MODELS FOR FAST SELF HEALING IN WIRELESS SENSOR NETWORKS
  • PROPER KEY GENERATION FOR THE IZOSIGN ALGORITHM
  • AN EFFICIENT MULTIPLICATION ALGORITHM USING BINOMIAL RESIDUE REPRESENTATION
  • POINT MULTIPLICATION ON SUPERSINGULAR ELLIPTIC CURVES DEFINED OVER FIELDS OF CHARACTERISTIC 2 AND 3
  • YET ANOTHER SECURE DISTANCE-BOUNDING PROTOCOL
  • INTERACTIVITY FOR REACTIVE ACCESS CONTROL
  • PRICE TO PROVIDE RFID SECURITY AND PRIVACY?
  • CSTEG: TALKING IN C CODE - Steganography of C Source Code in Text
  • A 640 MBIT/S 32-BIT PIPELINED IMPLEMENTATION OF THE AES ALGORITHM
  • TOWARDS LANGUAGE-INDEPENDENT APPROACH FOR SECURITY CONCERNS WEAVING
  • AN E-VOTING PROTOCOL BASED ON PAIRING BLIND SIGNATURES
  • ENSURING THE CORRECTNESS OF CRYPTOGRAPHIC PROTOCOLS WITH RESPECT TO SECRECY
  • EFFICIENT LOCALIZATION SCHEMES IN SENSOR NETWORKS WITH MALICIOUS NODES
  • SECURITY AND AUTHENTICATION FOR NETWORKED STORAGE
  • NEW SCHEMES FOR ANOMALY SCORE AGGREGATION AND THRESHOLDING
  • KEY MANAGEMENT OF QUANTUM GENERATED KEYS IN IPSEC
  • HONEYD DETECTION VIA ABNORMAL BEHAVIORS GENERATED BY THE ARPD DAEMON
  • A NOTE ON BIOMETRICS-BASED AUTHENTICATION WITH PORTABLE DEVICE
  • SEC-SNMP: POLICY-BASED SECURITY MANAGEMENT FOR SENSOR NETWORKS
  • A NEW PROBABILISTIC REKEYING METHOD FOR SECURE DYNAMIC GROUPS
  • FUNCTIONALITY-BASED APPLICATION CONFINEMENT - Parameterised Hierarchical Application Restrictions
  • TRAITOR TRACING FOR ANONYMOUS ATTACK IN CONTENT PROTECTION
  • EXPERIMENTAL RESEARCH AND CAPABILITY VALUATION ON SECURITY OF SOA-SCA BASED SDO
  • SECURITY POLICY INSTANTIATION TO REACT TO NETWORK ATTACKS - An Ontology-based Approach using OWL and SWRL
  • A POLYNOMIAL BASED HASHING ALGORITHM
  • IDENTITY-BASED SIGNCRYPTION WITHOUT RANDOM ORACLES
  • APPLYING SRP ON SIP AUTHENTICATION
  • CRYPTONET: SECURE E–MAIL SYSTEM
  • NOVEL NEUROCOMPUTING-BASED SCHEME TO AUTHENTICATE WLAN USERS EMPLOYING DISTANCE PROXIMITY THRESHOLD
  • NEW TECHNIQUES TO ENHANCE THE CAPABILITIES OF THE SOCKS NETWORK SECURITY PROTOCOL
  • APPLICATION TO A SHARED TERMINAL OF A ROAMING USER PROFILE SET UP THROUGH LDAP-SMART CARD AUTHENTICATION COOPERATION
  • INTRUSION DETECTION AND PREVENTION SYSTEM USING SECURE MOBILE AGENTS
  • SAKE - Secure Authenticated Key Establishment in Sensor Networks
  • KERBEROS IMPLEMENTATION IN MANETS
  • A REVIEW OF TRUST MANAGEMENT, SECURITY AND PRIVACY POLICY LANGUAGES
  • AUTONOMIC TRUST MANAGEMENT FOR A PERVASIVE SYSTEM
  • SELECTING TRUSTWORTHY CONTENT USING TAGS
  • DYNAMICS OF TRUST EVOLUTION - Auto-configuration of Dispositional Trust Dynamics
  • TRUST MODEL FOR HIGH QUALITY RECOMMENDATION
  • ENHANCED SECURE INTERFACE FOR A PORTABLE E-VOTING TERMINAL
  • REPUTATION MANAGEMENT IN GRID-BASED VIRTUAL ORGANISATIONS
  • FORMALIZING END-TO-END CONTEXT-AWARE TRUST RELATIONSHIPS IN COLLABORATIVE ACTIVITIES