• RELIABLE PROCESS FOR SECURITY POLICY DEPLOYMENT
  • FORMAL ANALYSIS METHODS OF NETWORK SECURITY DESIGN
  • SECURING OPENSSL AGAINST MICRO-ARCHITECTURAL ATTACKS
  • A 3G IMS-BASED TESTBED FOR SECURE REAL-TIME AUDIO SESSIONS
  • CLOCK CONTROL SEQUENCE RECONSTRUCTION IN THE GENERALIZED SHRINKING GENERATOR
  • A QUERY UNIT FOR THE IPSEC DATABASES
  • REMOTE ALGORITHMIC COMPLEXITY ATTACKS AGAINST RANDOMIZED HASH TABLES
  • SECURE COMPUTATION OF COMMON DATA AMONG MALICIOUS PARTNERS
  • EXTENSIBLE ACCESS CONTROL MODEL FOR XML DOCUMENT COLLECTIONS
  • ADDITIVE PROOFS OF KNOWLEDGE - A New Notion for Non-Interactive Proofs
  • IMPLEMENTATION AND ANALYSIS OF A HANDWRITTEN SIGNATURE VERIFICATION TECHNIQUE
  • UTILIZING EXTENSION CHARACTER ‘KASHIDA’ WITH POINTED LETTERS FOR ARABIC TEXT DIGITAL WATERMARKING
  • A COMBINATORICS PROLIFERATION MODEL TO DETERMINE THE TIMING FOR BLOCKING SCANNING MALWARE
  • SECURING HEALTHGRID ENVIRONMENTS
  • INDEPENDENT VOTER VERIFIABILITY FOR REMOTE ELECTRONIC VOTING
  • MAIS: MOBILE AGENT INTEGRITY SYSTEM - A Security System to IDS based on Autonomous Agents
  • AN EFFECTIVE AND SECURE WATERMARKING PROTOCOL FOR DIGITAL RIGHTS PROTECTION OVER THE SECOND-HAND MARKET
  • PRIVACY PRESERVING k-MEANS CLUSTERING IN MULTI-PARTY ENVIRONMENT
  • COMBINED DATA MINING APPROACH FOR INTRUSION DETECTION
  • DYNAMIC CONTEXT-AWARE ACCESS CONTROL - Use of Resource Hierarchies to Define Fine-grained, Adaptable Authorization Policies
  • IDENTITY BASED PUBLIC KEY EXCHANGE (IDPKE) FOR WIRELESS AD HOC NETWORKS
  • DEVELOPING A MODEL AND A TOOL TO MANAGE THE INFORMATION SECURITY IN SMALL AND MEDIUM ENTERPRISES
  • EFFICIENT LARGE-SCALE DISTRIBUTED KEY GENERATION AGAINST BURST INTERRUPTION
  • K2: A STREAM CIPHER ALGORITHM USING DYNAMIC FEEDBACK CONTROL
  • TOWARDS USER AUTHENTICATION FLEXIBILITY
  • PRACTICAL VERIFICATION OF UNTRUSTED TERMINALS USING REMOTE ATTESTATION
  • THE POLYNOMIAL MULTICOMPOSITION PROBLEM IN (Z/nZ)
  • DETECTING ANOMALOUS TRAFFIC USING STATISTICAL PROCESSING AND SELF-ORGANIZING MAPS
  • WISE GUARD - MAC Address Spoofing Detection System for Wireless LANs
  • PRACTICAL SECURE BIOMETRICS USING SET INTERSECTION AS A SIMILARITY MEASURE
  • IMPLEMENTATION AND EVALUATION OF NEW ILLEGAL COPY PROTECTION - Protection Against Making a Illegal Copy of a Copy
  • AN IMPROVED MODEL FOR SECURE CRYPTOGRAPHIC INTEGRITY VERIFICATION OF LOCAL CODE
  • A MORE EFFICIENT CONVERTIBLE NOMINATIVE SIGNATURE
  • TOWARDS A MULTI-MODEL VIEWS SECURITY FRAMEWORK
  • AN ANONYMOUS WATERMARKING SCHEME FOR CONTENT DISTRIBUTION PROTECTION USING TRUSTED COMPUTING
  • ON THE IMPROVEMENT OF REMOTE AUTHENTICATION SCHEME WITH SMART CARDS
  • USING STEGANOGRAPHY TO IMPROVE HASH FUNCTIONS’ COLLISION RESISTANCE
  • ROLE AND TASK BASED AUTHORIZATION MANAGEMENT FOR PROCESS-VIEW
  • IMPROVING SECURITY IN CHAOTIC SPREAD SPECTRUM COMMUNICATION SYSTEMS WITH A NOVEL ‘BIT POWER PARAMETER SPECTRUM’ MEASURE
  • MODIFIED TEMPORAL KEY INTEGRITY PROTOCOL FOR EFFICIENT WIRELESS NETWORK SECURITY
  • ON THE KEY-COMPROMISE IMPERSONATION VULNERABILITY OF ONE-PASS KEY ESTABLISHMENT PROTOCOLS
  • UTILIZING SOCIAL NETWORKING PLATFORMS TO SUPPORT PUBLIC KEY INFRASTRUCTURES
  • ANONYMOUS PREPAID CONTENT VIEWING SYSTEM WITH MOBILE TERMINAL
  • SUBQUADRATIC BINARY FIELD MULTIPLIER IN DOUBLE POLYNOMIAL SYSTEM
  • E-BUSINESS SECURITY DESIGN USING PROCESS SECURITY REQUIREMENTS SEPTET
  • A HIGH-LEVEL ASPECT-ORIENTED BASED LANGUAGE FOR SOFTWARE SECURITY HARDENING
  • A CLOSER LOOK AT BROADCAST ENCRYPTION AND TRAITOR TRACING FOR CONTENT PROTECTION
  • INVESTIGATION OF COOPERATIVE DEFENSE AGAINST DDOS
  • MOBILE SECRET KEY DISTRIBUTION WITH NETWORK CODING
  • AN EFFICIENT INTRUSION DETECTION SYSTEM FOR NETWORKS WITH CENTRALIZED ROUTING
  • SECURE SERVICE PUBLISHING WITH UNTRUSTED REGISTRIES - Securing Service Discovery
  • PRIVATE COMPUTING WITH BEEHIVE ORGANIZED AGENTS
  • INTEGRATED RIGHT MANAGEMENT FOR HOME CONTENT - A SIM based Right Management Solution for Home Networks
  • ON THE EFFECT OF SCORE EQUALIZATION IN SVM MULTIMODAL BIOMETRIC SYSTEMS
  • A PROVABLY SECURE MULTI-RECEIVER IDENTITY-BASED SIGNCRYPTION USING BILINEAR MAPS
  • MOBILE AGENT SECURITY WITH EFFICIENT OBLIVIOUS TRANSFER
  • PRACTICAL AND UNIVERSAL INTERPRETATION FUNCTIONS FOR SECRECY
  • A SECURE JAILING SYSTEM FOR CONFINING UNTRUSTED APPLICATIONS
  • SECURE LICENSE MANAGEMENT - Management of Digital Object Licenses in a DRM Environment