• MORE ROBUST PRIVATE INFORMATION RETRIEVAL SCHEME
  • ON THE SELF-SIMILARITY OF THE 1999 DARPA/LINCOLN LABORATORY EVALUATION DATA
  • USING MICROSOFT OFFICE INFOPATH TO GENERATE XACML POLICIES
  • SECURE ONLINE ENGLISH AUCTIONS
  • FINITE FIELD MULTIPLICATION IN LAGRANGE REPRESENTATION USING FAST FOURRIER TRANSFORM
  • PARALLEL MULTIPLICATION IN F2n USING CONDENSED MATRIX REPRESENTATION
  • EXTENDING XML SIGNATURE AND APPLYING IT TO WEB PAGE SIGNING
  • DESIGN AND IMPLEMENTATION OF A PRACTICAL SECURE DISTRIBUTED HEALTHCARE APPLICATION
  • IMPROVING SOFTWARE SECURITY THROUGH AN INTEGRATED APPROACH
  • COLLABORATION SECURITY FOR MODERN INFORMATION SYSTEMS
  • A DOS ATTACK AGAINST THE INTEGRITY-LESS ESP (IPSEC)
  • JASTEG2000 - Steganography for JPEG2000 Coded Images
  • AN INFINITE PHASE-SIZE BMAP/M/1 QUEUE AND ITS APPLICATION TO SECURE GROUP COMMUNICATION
  • ACHIEVING UNCONDITIONAL SECURITY IN EXISTING NETWORKS USING QUANTUM CRYPTOGRAPHY
  • TRAITOR TRACING FOR SUBSCRIPTION-BASED SYSTEMS
  • PROTECTING CIPHER BLOCK CHAINING AGAINST ADAPTIVE CHOSEN PLAINTEXT ATTACK
  • AN EXTENDED ROLE-BASED ACCESS CONTROL FOR WEB SERVICES
  • A SERVICE DISCOVERY THREAT MODEL FOR AD HOC NETWORKS
  • USING ATTACK GRAPHS IN AD HOC NETWORKS - For Intrusion Prediction Correlation and Detection
  • DIGITAL CONTRACT SIGNATURE SCHEME BASED ON MULTIPLE CRYPTOSYSTEM
  • INTRUSION DETECTION FOR WEB APPLICATIONS (SHORT VERSION)
  • ACTION-TRIGGERED PUBLIC-KEY SYSTEM FOR GSM USING RSA WITH PHONE-DEPENDENT ENCRYPTION
  • SECURE INFORMATION SYSTEMS DEVELOPMENT - Based on a Security Requirements Engineering Process
  • CHOSEN-IV STATISTICAL ATTACKS ON eSTREAM CIPHERS
  • SECURITY CONSIDERATIONS IN CURRENT VOIP PROTOCOLS
  • A NEW (t , n) MULTI-SECRET SHARING SCHEME BASED ON LINEAR ALGEBRA
  • SMOOTH BLOCKS-BASED BLIND WATERMARKING ALGORITHM IN COMPRESSED DCT DOMAIN
  • EFFICIENT ALL-OR-NOTHING ENCRYPTION USING CTR MODE
  • ACCESS CONTROL AND JOINT MANAGEMENT FOR COLLABORATIVE PEER GROUPS
  • AN ALGORITHM FOR AUTHENTICATION OF DIGITAL IMAGES
  • ON USE OF IDENTITY-BASED ENCRYPTION FOR SECURE EMAILING
  • QUANTITATIVE ANALYSIS AND ENFORCEMENT OF THE PRINCIPLE OF LEAST PRIVILEGE IN ROLE-BASED ACCESS CONTROL
  • UNDESIRABLE AND FRAUDULENT BEHAVIOUR IN ONLINE AUCTIONS
  • PROTOCOL INDEPENDENT LIGHTWEIGHT SECURE COMMUNICATION
  • COMPARATIVE STUDY BETWEEN BAYESIAN NETWORK AND POSSIBILISTIC NETWORK IN INTRUSION DETECTION
  • FORWARD-SECURE AUTHENTICATED-ENCRYPTION IN MULTI-RECEIVER SETTING
  • DIGITAL OBJECT RIGHTS MANAGEMENT - Interoperable Client-side DRM Middleware
  • EVALUATION OF THE INTRUSION DETECTION CAPABILITIES AND PERFORMANCE OF A SECURITY OPERATION CENTER
  • DESIGN OF CRYPTOGRAPHIC PROTOCOLS BY MEANS OF GENETIC ALGORITHMS TECHNIQUES
  • PROPOSALS FOR ITERATED HASH FUNCTIONS
  • FLEXIBLE LICENSE TRANSFER SYSTEM USING MOBILE TERMINAL
  • SPOOFED ARP PACKETS DETECTION IN SWITCHED LAN NETWORKS
  • PRIVATE BIDDING FOR MOBILE AGENTS
  • NETWORK SECURITY EVALUATION BASED ON SIMULATION OF MALFACTOR’S BEHAVIOR
  • WORKLOAD HIDDEN MARKOV MODEL FOR ANOMALY DETECTION
  • LAYERED ARCHITECTURE FOR SECURE E-COMMERCE APPLICATIONS
  • SECURITY ENHANCEMENT FOR A LOW COMPUTATION COST USER AUTHENTICATION SCHEME
  • SECURE ACCESS MODULES FOR IDENTITY PROTECTION OVER THE EAP-TLS - Smartcard Benefits for User Anonymity in Wireless Infrastructures
  • LEAST PRIVILEGE IN SEPARATION KERNELS
  • SECURING WEB SERVICES USING IDENTITY-BASED ENCRYPTION (IBE)
  • DIGITAL PSEUDONYM IDENTITY FOR E-COMMERCE
  • USING OMA DRM 2.0 PROTECTED CONTENT - Ogg Vorbis Protected Audio under Symbian OS
  • DEFINING VIEWPOINTS FOR SECURITY ARCHITECTURAL PATTERNS
  • ON THE DESIGN OF A LOW-RATE DOS ATTACK AGAINST ITERATIVE SERVERS
  • MODELLING E-BUSINESS SECURITY USING BUSINESS PROCESSES
  • THE “SECUREPHONE” - A Mobile Phone with Biometric Authentication and e-Signature Support for Dealing Secure Transactions on the Fly
  • COMBINATION OF A SMARTCARD E-PURSE AND E-COIN TO MAKE ELECTRONIC PAYMENTS ON THE INTERNET
  • A CHALLENGING BUT FEASIBLE BLOCKWISE-ADAPTIVE CHOSEN-PLAINTEXT ATTACK ON SSL
  • INTERNET ROUTING SECURITY: AN APPROACH TO DETECT AND TO REACT TO INCORRECT ADVERTISEMENTS
  • PROTECTING ADAPTIVE MULTIMEDIA DELIVERY AND ADAPTATION USING PROXY BASED APPROACH
  • INTER-NODE RELATIONSHIP LABELING: A FINE-GRAINED XML ACCESS CONTROL IMPLEMENTATION USING GENERIC SECURITY LABELS
  • TRUST MANAGEMENT WITHOUT REPUTATION IN P2P GAMES
  • SECURITY RISK ANALYSIS IN WEB SERVICES SYSTEMS
  • PERSON VERIFICATION BY FUSION OF PROSODIC, VOICE SPECTRAL AND FACIAL PARAMETERS