• PREVENTING WORMHOLE ATTACK IN WIRELESS AD HOC NETWORKS USING COST-BASED SCHEMES
  • AN OFFLINE PEER-TO-PEER BROADCASTING SCHEME WITH ANONYMITY
  • QUANTUM SECURE DIRECT COMMUNICATION USING ENTANGLEMENT AND SUPER DENSE CODING
  • ON THE SECURITY OF TWO RING SIGNCRYPTION SCHEMES
  • PRACTICAL TRACEABLE ANONYMOUS IDENTIFICATION
  • AN ANOMALY-BASED WEB APPLICATION FIREWALL
  • ITERATED TRANSFORMATIONS AND QUANTITATIVE METRICS FOR SOFTWARE PROTECTION
  • AN APPROACH FOR DESIGNING OF ENTERPRISE IT LANDSCAPES TO PERFORM QUANTITAVE INFORMATION SECURITY RISK ASSESSMENT
  • MONITORING NODE SELECTION ALGORITHM FOR INTRUSION DETECTION IN CONGESTED SENSOR NETWORK
  • CERTIFIED PSEUDONYMS COLLIGATED WITH MASTER SECRET KEY
  • INTERACTIVE SECRET SHARE MANAGEMENT
  • AN ALTERNATIVE APPROACH FOR FORMULA MODELLING IN SECURITY METRICS
  • VISUAL PROGRAMMING LANGUAGE FOR SECURITY REQUIREMENTS IN BUSINESS PROCESSES AS MODEL-DRIVEN SOFTWARE DEVELOPMENT
  • AN EFFICIENT GROUP KEY AGREEMENT PROTOCOL FOR HETEROGENEOUS ENVIRONMENT
  • EVALUATION OF QUALITY AND SECURITY OF A VOIP NETWORK BASED ON ASTERISK AND OpenVPN
  • BEHAVIOR-BASED CLUSTERING FOR DISCRIMINATION BETWEEN FLASH CROWDS AND DDoS ATTACKS
  • NETWORK STACK OPTIMIZATION FOR IMPROVED IPSEC PERFORMANCE ON LINUX
  • ON THE NEED TO DIVIDE THE SIGNATURE CREATION ENVIRONMENT
  • FAST RE-ESTABILISHMENT OF IKEV2 SECURITY ASSOCIATIONS FOR RECOVERY OF IPSEC GATEWAYS IN MOBILE NETWORK
  • PHISHPIN: AN INTEGRATED, IDENTITY-BASED ANTI-PHISHING APPROACH
  • INFORMATION-THEORETICALLY SECURE STRONG VERIFIABLE SECRET SHARING
  • FINGER VEIN VERIFICATION TECHNOLOGY FOR MOBILE APPARATUS
  • COLLABORATIVE SECURITY ASSESSMENTS IN EMBEDDED SYSTEMS DEVELOPMENT - The ESSAF Framework for Structured Qualitative Analysis
  • IDENTIFYING SECURITY ELEMENTS FOR COOPERATIVE INFORMATION SYSTEMS
  • A SECURITY DESIGN PATTERN TAXONOMY BASED ON ATTACK PATTERNS - Findings of a Systematic Literature Review
  • MANAGING SECURITY OF GRID ARCHITECTURE WITH A GRID SECURITY OPERATION CENTER
  • MULTIPARTY COMPARISON - An Improved Multiparty Protocol for Comparison of Secret-shared Values
  • TOOL SUPPORT FOR ACHIEVING QUALITATIVE SECURITY ASSESSMENTS OF CRITICAL INFRASTRUCTURES - The ESSAF Framework for Structured Qualitative Analysis
  • ON THE SECURITY OF ADDING CONFIRMERS INTO DESIGNATED CONFIRMER SIGNATURES
  • EFFICIENT TRAITOR TRACING FOR CONTENT PROTECTION
  • AD-HOC ON DEMAND AUTHENTICATION CHAIN PROTOCOL - An Authentication Protocol for Ad-hoc Networks
  • RFID AUTHENTICATION PROTOCOLS BASED ON ELLIPTIC CURVES - A Top-Down Evaluation Survey
  • THE DARK SIDE OF SECURITY BY OBSCURITY - and Cloning MiFare Classic Rail and Building Passes, Anywhere, Anytime
  • ISEE: AN INFORMATION SECURITY ENGINEERING ENVIRONMENT
  • SIMULATION OF AN IDENTITY-BASED CRYPTOGRAPHY SCHEME FOR AD HOC NETWORKS
  • NMIX: AN IDEAL CANDIDATE FOR KEY MIXING
  • A NEW ANALYSIS OF RC4 - A Data Mining Approach (J48)
  • ONE-TOUCH FINANCIAL TRANSACTION AUTHENTICATION
  • UNIVERSAL AUTHENTICATION FRAMEWORK - Requirements and Phase Design
  • ADDING EXPERT KNOWLEDGE TO TAN-BASED INTRUSION DETECTION SYSTEMS
  • IMPLEMENTING TRUE RANDOM NUMBER GENERATORS IN FPGAS BY CHIP FILLING
  • A CHAOS BASED ENCRYPTION METHOD USING DYNAMICAL SYSTEMS WITH STRANGE ATTRACTORS
  • THE CHAMELEON CIPHER-192 (CC-192) - A Polymorphic Cipher
  • SAFE REVERSE AUCTIONS PROTOCOL - Adding Treatment Against Collusive Shill Bidding and Sniping Attacks
  • THROTTLING DDoS ATTACKS
  • A SECOND PREIMAGE ATTACK ON THE MERKLE-DAMGARD SCHEME WITH A PERMUTATION FOR HASH FUNCTIONS
  • SECURITY PATTERNS, TOWARDS A FURTHER LEVEL
  • FREE SECURITY SUITE 2 - Easy, Intuitive and Complete Free Security Suite with Web Browser Integration
  • SERVICE AND TIMEFRAME DEPENDENT UNLINKABLE ONE-TIME PSEUDONYMS
  • A TRAFFIC COHERENCE ANALYSIS MODEL FOR DDOS ATTACK DETECTION
  • EFFICIENT ALGORITHMS AND ABSTRACT DATA TYPES FOR LOCAL INCONSISTENCY ISOLATION IN FIREWALL ACLS
  • RESISTING IMPERSONATION ATTACKS IN CHAINING-BASED PUBLIC-KEY MANAGEMENT ON MANETS - The Virtual Public-Key Management
  • ASSESSMENT OF MOBILE SECURITY PLATFORMS
  • RESYNCHRONIZATION ATTACK ON STREAM CIPHERS FILTERED BY MAIORANA-MCFARLAND FUNCTIONS
  • A NEW IMAGE ENCRYPTION ALGORITHM USING CELLULAR AUTOMATA
  • ATTACK GRAPH GENERATION WITH INFUSED FUZZY CLUSTERING