• TECHNIQUES FOR VALIDATION AND CONTROLLED EXECUTION OF PROCESSES, CODES AND DATA - A Survey
  • TRUST DEGREE BASED ACCESS CONTROL FOR SOCIAL NETWORKS
  • THE THREAT-VICTIM TABLE - A Security Prioritisation Framework For Diverse WLAN Network Topographies
  • RISK BASED ACCESS CONTROL WITH UNCERTAIN AND TIME-DEPENDENT SENSITIVITY
  • WHAT CAN RFID DO FOR VANETS? - A Cryptographic Point of View
  • ANALYSIS OF SNOW 3G⊕ RESYNCHRONIZATION MECHANISM
  • AN EFFECTIVE CLUSTERING APPROACH TO WEB QUERY LOG ANONYMIZATION
  • IMPROVING N-GRAM LINGUISTIC STEGANOGRAPHY BASED ON TEMPLATES
  • CONJUGATION AS PUBLIC KEY AGREEMENT PROTOCOL IN MOBILE CRYPTOGRAPHY
  • “MY SMARTPHONE IS A SAFE!” - The User’s Point of View Regarding Novel Authentication Methods and Gradual Security Levels on Smartphones
  • VULNERABILITY OF A NON-MEMBERSHIP PROOF SCHEME
  • EXTENDED VISUAL CRYPTOGRAPHY SCHEME FOR COLOR IMAGES WITH NO PIXEL EXPANSION
  • CONFIDENTIALITY AND INTEGRITY FOR SUM AGGREGATION IN SENSOR NETWORKS
  • A NEW CHAOS-BASED WATERMARKING ALGORITHM
  • PROXIABLE DESIGNATED VERIFIER SIGNATURE
  • SAFE RPC - Auditing Mixnets Safely using Randomized Partial Checking
  • ON A CONSTRUCTION OF STREAM-CIPHER-BASED HASH FUNCTIONS
  • NEW PSEUDO NEAR COLLISION ATTACK ON TIGER
  • ANONYMOUS SUBSCRIPTION SCHEMES - A Flexible Construction for On-line Services Access
  • PRIVACY PROTECTION FOR USER AUTHENTICATION
  • ON THE IMPORTANCE OF ONE-TIME KEY PAIRS IN BUYER-SELLER WATERMARKING PROTOCOLS
  • THROTTLING DDoS ATTACKS USING DISCRETE LOGARITHM PROBLEM
  • ADAPTIVE AND COMPOSABLE NON-INTERACTIVE STRING-COMMITMENT PROTOCOLS
  • FORMAL VERIFICATION OF G-PAKE USING CASPER/FDR2 - Securing a Group PAKE Protocol Using Casper/FDR2
  • AN IDENTITY BASED RING SIGNCRYPTION SCHEME WITH PUBLIC VERIFIABILITY
  • HANDLING IDS’ RELIABILITY IN ALERT CORRELATION - A Bayesian Network-based Model for Handling IDS’s Reliability and Controlling Prediction/False Alarm Rate Tradeoffs
  • FORCING OUT A CONFESSION - Threshold Discernible Ring Signatures
  • UNIVERSALLY COMPOSABLE NON-COMMITTING ENCRYPTIONS IN THE PRESENCE OF ADAPTIVE ADVERSARIES
  • MANAGEMENT OF SECURITY POLICIES IN VIRTUAL ORGANISATIONS
  • ACCESS CONTROL MODELS FOR BUSINESS PROCESSES
  • ATTACKS ON WEB SERVICES AND MITIGATION SCHEMES
  • GRAPHICAL AUTHENTICATION BASED ON USER BEHAVIOUR
  • AUDITING THE DEFENSE AGAINST CROSS SITE SCRIPTING IN WEB APPLICATIONS
  • A C++ CLASS FOR ANALYSING VECTOR BOOLEAN FUNCTIONS FROM A CRYPTOGRAPHIC PERSPECTIVE
  • HUBFIRE - A MULTI-CLASS SVM BASED JPEG STEGANALYSIS USING HBCL STATISTICS AND FR INDEX
  • ENCORE: TOWARDS A HOLISTIC APPROACH TO PRIVACY
  • TOWARDS DATA PROTECTION COMPLIANCE
  • QOS AND SECURITY IN ENERGY-HARVESTING WIRELESS SENSOR NETWORKS
  • SHORT ECC - A Lightweight Security Approach for Wireless Sensor Networks
  • SERVER-ASSISTED LONG-TERM SECURE 3-PARTY KEY ESTABLISHMENT
  • ANONYMOUS SOCIAL STAMPS - Authenticating Anonymous Statements to Friends with Privacy
  • PROVIDING CONFIDENTIALITY IN CONTENT-BASED PUBLISH/SUBSCRIBE SYSTEMS
  • INFINITE ALPHABET PASSWORDS - A Unified Model for a Class of Authentication Systems
  • EFFICIENT ALGORITHMIC SAFETY ANALYSIS OF HRU SECURITY MODELS
  • TOWARDS RISK BASED PREVENTION OF GROOMING ATTACKS
  • REALIZING SECURE MULTIPARTY COMPUTATION ON INCOMPLETE NETWORKS
  • SECURITY IN FUTURE MOBILE SENSOR NETWORKS - Issues and Challenges
  • A NOVEL INTRUSION DETECTION SYSTEM FOR MANETS
  • AN ICT SECURITY MANAGEMENT FRAMEWORK
  • DON’T FOLLOW ME - Spam Detection in Twitter
  • PREVENTING MALICIOUS PORTLETS FROM COMMUNICATING AND INTERCEPTING IN COLLABORATION PORTALS
  • ULTRA HIGH SPEED SHA-256 HASHING CRYPTOGRAPHIC MODULE FOR IPSEC HARDWARE/SOFTWARE CODESIGN
  • SECURE BRIDGING IN LARGE SCALE DEPLOYMENT OF ETHERNET
  • BMQE SYSTEM - A MQ Equations System based on Ergodic Matrix
  • SIDE-CHANNEL ATTACK ON THE HUMANAUTH CAPTCHA
  • IMPLICATIONS OF MISBEHAVING ATTACKS ON PROBABILISTIC QUORUM SYSTEM FOR MANETs
  • AUTOMATED THREAT IDENTIFICATION FOR UML
  • REWRITING-BASED SECURITY ENFORCEMENT OF CONCURRENT SYSTEMS - A Formal Approach
  • ANONYMOUS BUT AUTHORIZED TRANSACTIONS SUPPORTING SELECTIVE TRACEABILITY
  • EVALUATING SURVIVABILITY AND COSTS OF THREE VIRTUAL MACHINE BASED SERVER ARCHITECTURES
  • AN ENCRYPTION SCHEME FOR A SECURE POLICY UPDATING
  • PIECEWISE CLASSIFICATION OF ATTACK PATTERNS FOR EFFICIENT NETWORK INTRUSION DETECTION
  • EFFICIENT ASYMMETRIC IPSEC FOR SECURE ISCSI
  • HTEE: AN HMAC BASED TAMPER EVIDENT ENCRYPTION
  • ANONYMOUS SERVICES - Enhancing End-user Privacy Exploiting Anonymous Networks
  • SECURITY MODELS FOR HETEROGENEOUS NETWORKING