Reversible Steganographic Scheme with High Embedding Capacity using Dual Cover Images
Two Dragons - A Family of Fast Word-based Stream Ciphers
Identity-based Password-Authenticated Key Exchange for Client/Server Model
lmRNG: A Lightweight Pseudorandom Number Generator for Wireless Sensor Networks
Quantitative Assessment of Cloud Security Level Agreements - A Case Study
Self-ad-MCNHA-SLOS - A Self-adaptive Minimum-Cost Network Hardening Algorithm based on Stochastic Loose Optimize Strategy
SIMD-based Implementations of Eta Pairing Over Finite Fields of Small Characteristics
ADQL: A Flexible Access Definition and Query Language to Define Access Control Models
Privacy Preserving Approaches for Global Cycle Detections for Cyclic Association Rules in Distributed Databases
Building the Security Foundation to Embrace Public Software-as-a-Service (SaaS) - Security Policies for SaaS Data Protection
Tampering with Java Card Exceptions - The Exception Proves the Rule
On Secure Communication over Wireless Sensor Networks
VLR Group Signatures - How to Achieve Both Backward Unlinkability and Efficient Revocation Checks
Homomorphic Primitives for a Privacy-friendly Smart Metering Architecture
Flexible Redactable Signature Schemes for Trees - Extended Security Model and Construction
Towards Pervasive Cryptographic Access Control Models
Cryptographic Enforcement of Access Control while Mitigating Key Sharing
Verifying Privacy by Little Interaction and No Process Equivalence
A Security Analysis of Emerging Web Standards - HTML5 and Friends, from Specification to Implementation
Analysis of Some Natural Variants of the PKP Algorithm
Improved “Partial Sums”-based Square Attack on AES
Flexible Group Key Exchange with On-demand Computation of Subgroup Keys Supporting Subgroup Key Randomization
Biometric Identification in Virtual Worlds using Biometric Fusion Techniques
Practical Applications of Homomorphic Encryption
Privacy-preserving Targeted Advertising Scheme for IPTV using the Cloud
Voice Passwords Revisited
Constructing Secure-channel Free Searchable Encryption from Anonymous IBE with Partitioned Ciphertext Structure
Securing In-vehicle Communication and Redefining the Role of Automotive Immobilizer
Security Policies in Dynamic Service Compositions
High-throughput Hardware Architectures of the JH Round-three SHA-3 Candidate - An FPGA Design and Implementation Approach
Non-repudiation of Forwarding - Traceability of Confidential Data Via Multiple Recipients
Private Outsourcing of Matrix Multiplication over Closed Semi-rings
Extension of de Weger’s Attack on RSA with Large Public Keys
On the Development of Totally Self-checking Hardware Design for the SHA-1 Hash Function
Key Management as a Service
Secure and Seamless Session Management in Mobile and Heterogeneous Environment
A Collaborative Firewall for Wireless Ad-Hoc Social Networks
Some Remarks on Keystroke Dynamics - Global Surveillance, Retrieving Information and Simple Countermeasures
Attack Modelling and Security Evaluation for Security Information and Event Management
Secure File Allocation and Caching in Large-scale Distributed Systems
DDoS Detection with Information Theory Metrics and Netflows - A Real Case
Quantifying the Benefits of File Size Information for Forensic Hash Matching
Sevigator: Network Confinement of Malware Applications and Untrusted Operating Systems
Development of a Snort IPv6 Plugin - Detection of Attacks on the Neighbor Discovery Protocol
An Improved Public-key Tracing Scheme with Sublinear Ciphertext Size
Formal Analysis of the TLS Handshake Protocol
Data Repository for Security Information and Event Management in Service Infrastructures
Distributed Threshold Certificate based Encryption Scheme with No Trusted Dealer
Defense Against TCP Flooding Attack
An Application of a Group Signature Scheme with Backward Unlinkability to Biometric Identity Management
Improving Cloud Survivability through Dependency based Virtual Machine Placement
PPiTTA - Preserving Privacy in TV Targeted Advertising
The Concept of Compatibility between Identity-based and Certificateless Encryption Schemes
Adaptive Speech Watermarking in Wavelet Domain based on Logarithm
Inverting Thanks to SAT Solving - An Application on Reduced-step MD*
Improved Detection of Probe Request Attacks - Using Neural Networks and Genetic Algorithm
iSATS: Leveraging Identity based Sender Authentication for Spam Mitigation
A Proposed Framework for Analysing Security Ceremonies
HoneyCloud: Elastic Honeypots - On-attack Provisioning of High-interaction Honeypots
A Novel Fuzzy Vault Scheme for Secret Key Exchange
Network-based Executable File Extraction and Analysis for Malware Detection
On Securing Communication from Profilers