A SMART-GENTRY BASED SOFTWARE SYSTEM FOR SECRET PROGRAM EXECUTION
ANALYSIS OF BOTNETS THROUGH LIFE-CYCLE
ON THE (NON-)REUSABILITY OF FUZZY SKETCHES AND EXTRACTORS AND SECURITY IN THE COMPUTATIONAL SETTING
STUDY OF THE PHENOMENOLOGY OF DDOS NETWORK ATTACKS IN PHASE SPACE
PRIVATE SEARCHING FOR SENSITIVE FILE SIGNATURES
ON THE SECURITY OF LOCATION DETERMINATION AND VERIFICATION METHODS FOR WIRELESS NETWORKS
DRIVER AUTHENTICATION USING BRAIN WAVES WHILE ROUTE TRACING AS A MENTAL TASK
A SMART CARD BASED GENERIC CONSTRUCTION FOR ANONYMOUS AUTHENTICATION IN MOBILE NETWORKS
A TINY RSA COPROCESSOR BASED ON OPTIMIZED SYSTOLIC MONTGOMERY ARCHITECTURE
A NEW STEGANOGRAPHIC SCHEME BASED ON FIRST ORDER REED MULLER CODES - A New Steganographic Scheme
PRIVACY-PRESERVING SMART METERING WITHOUT A TRUSTED-THIRD-PARTY
COLLECTIVE CLASSIFICATION FOR UNKNOWN MALWARE DETECTION
A NEW TREE-STRUCTURE-SPECIFIED MULTISIGNATURE SCHEME FOR A DOCUMENT CIRCULATION SYSTEM
OPBUS: RISK-AWARE FRAMEWORK FOR THE CONFORMANCE OF SECURITY-QUALITY REQUIREMENTS IN BUSINESS PROCESSES
RELATED-KEY ATTACK AGAINST TRIPLE ENCRYPTION BASED ON FIXED POINTS
A METHOD FOR FLEXIBLE REDUCTION OVER BINARY FIELDS USING A FIELD MULTIPLIER
TOWARDS OPTIMAL REVOCATION AND TRACING SCHEMES - The Power of the Ternary Tree
A SECURITY METRICS FRAMEWORK FOR THE CLOUD
SMARTPHONE SECURITY EVALUATION - The Malware Attack Case
THREE-PARTY PASSWORD-AUTHENTICATED KEY EXCHANGE WITHOUT RANDOM ORACLES
ANOMALY-BASED SPAM FILTERING
ATTACK INTERFERENCE IN NON-COLLABORATIVE SCENARIOS FOR SECURITY PROTOCOL ANALYSIS
ON THE STRENGTH OF EGGLUE AND OTHER LOGIC CAPTCHAs
PRIVACY--ENHANCING CRYPTOGRAPHY--BASED MATERIALS
A FRESH LOOK INTO THE BIOMETRIC AUTHENTICATION - Perspective from Shannon's Secrecy System and a Special Wiretap Channel
IS IP MULTIMEDIA SUBSYSTEM AFFECTED BY ‘MALFORMED MESSAGE’ ATTACKS? - An Evaluation of OpenIMS
ON THE PRIVACY THREATS OF ELECTRONIC POLL BOOKS
HIGHER LAYER AUTHENTICATION FOR BROADCAST IN CONTROLLER AREA NETWORKS
E-COMMERCE AND FAIR EXCHANGE - The Problem of Item Validation
HOW TO TRANSMIT MESSAGES VIA WSN IN A HOSTILE ENVIRONMENT
APOLLON: TOWARDS A SEMANTICALLY EXTENSIBLE POLICY FRAMEWORK
BLACK-BOX COLLISION ATTACKS ON THE COMPRESSION FUNCTION OF THE GOST HASH FUNCTION
TOWARDS AN AUTHORIZATION SYSTEM FOR CLOUD INFRASTRUCTURE PROVIDERS
BYZANTINE DECISIONS FOR INFERRING TRUST IN SENSOR NETWORKS
DISTRIBUTED THRESHOLD CRYPTOGRAPHY CERTIFICATION WITH NO TRUSTED DEALER
CHAOTIC ITERATIONS FOR STEGANOGRAPHY - Stego-security and Chaos-security
BYTE SLICING GRØSTL - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl
SYNEMA: VISUAL MONITORING OF NETWORK AND SYSTEM SECURITY SENSORS
A FRAMEWORK FOR SECURITY AND WORKLOAD GRADUAL ADAPTATION
TOWARDS AN INFORMATION CONTROL POLICY MODEL - Achieving More Transparency in Internet Filtering Approaches
NO SECURITY BY OBSCURITY – WHY TWO FACTOR AUTHENTICATION SHOULD BE BASED ON AN OPEN DESIGN
INFORMATION-LEAKAGE IN HYBRID RANDOMIZED PROTOCOLS
CCA SECURE CERTIFICATELESS ENCRYPTION SCHEMES BASED ON RSA
BOTNET DETECTION BASED ON DNS RECORDS AND ACTIVE PROBING
A FORWARD PRIVATE PROTOCOL BASED ON PRNG AND LPN FOR LOW-COST RFID
UNOBSERVABLE INTRUSION DETECTION BASED ON CALL TRACES IN PARAVIRTUALIZED SYSTEMS
PRACTICAL ANONYMOUS AUTHENTICATION - Designing Anonymous Authentication for Everyday Use
ARTIFICIAL IMMUNITY-BASED CORRELATION SYSTEM
INTERNATIONALLY STANDARDIZED EFFICIENT CRYPTOGRAPHIC HASH FUNCTION
A PUBLIC RANDOMNESS SERVICE
DATA AND ACCESS MANAGEMENT USING ACCESS TOKENS FOR DELEGATING AUTHORITY TO PERSONS AND SOFTWARE
A FOUR-CONCERN-ORIENTED SECURE IS DEVELOPMENT APPROACH
SEMANTIC ANNOTATIONS FOR SECURITY POLICY MATCHING IN WS-POLICY