AN EFFICIENT RECONFIGURABLE SOS MONTGOMERY MULTIPLIER IN GF (P) USIGN FPGA DSP SLICES
MULTI-COLLISIONS ATTACK IN RING HASH STRUCTURE
FPGA-TARGETED HARDWARE IMPLEMENTATIONS OF K2
KEY DISTRIBUTION BASED ON QUANTUM FOURIER TRANSFORM
A FAIR E-TENDERING PROTOCOL
A MULTIPLE BIRTHDAY ATTACK ON NTRU
ANONYMOUS MESSAGE AUTHENTICATION - Universally Composable Definition and Construction
AN EFFICIENT METHODOLOGY TO LIMIT PATH LENGTH GUARANTEEING ANONYMITY IN OVERLAY NETWORKS
AN EVENT-DRIVEN, INCLUSIONARY AND SECURE APPROACH TO KERNEL INTEGRITY
SECURING THE EMAIL SERVICES - New System for Secure Managing the Organization’s Mail Service
IMPROVED FUZZY VAULT SCHEME FOR FINGERPRINT VERIFICATION
EFFICIENT IBE-PKE PROXY RE-ENCRYPTION
THE SUBSTITUTION CIPHER CHAINING MODE
A SHORT NOTE ON SECRET SHARING USING ELLIPTIC CURVES
A GENERAL FRAMEWORK FOR GUESS-AND-DETERMINE AND TIME-MEMORY-DATA TRADE-OFF ATTACKS ON STREAM CIPHERS
GEOGRAPHIC DATA AND STEGANOGRAPHY - Using Google Earth and KML Files for High-Capacity Steganography
A FAST ENCRYPTION SCHEME FOR NETWORKS APPLICATIONS
FORWARD-SECURE PROXY SIGNATURE AND REVOCATION SCHEME FOR A PROXY SIGNER WITH MULTIPLE ORIGINAL SIGNERS
ON THE (IN)SECURITY OF TWO BUYER-SELLER WATERMARKING PROTOCOLS
AN IMPROVEMENT OF STRONG PROXY SIGNATURE AND ITS APPLICATIONS
ENSURING PRIVACY OF BIOMETRIC FACTORS IN MULTI-FACTOR AUTHENTICATION SYSTEMS
SECURE COMMUNICATION IN MOBILE AD HOC NETWORK USING EFFICIENT CERTIFICATELESS ENCRYPTION
REBEL - Reconfigurable Block Encryption Logic
DETECTION OF ILLICIT TRAFFIC USING NEURAL NETWORKS
A HEURISTIC POLYNOMIAL ALGORITHM FOR LOCAL INCONSISTENCY DIAGNOSIS IN FIREWALL RULE SETS
QUANTIFYING MISBEHAVIOUR ATTACKS AGAINST THE SELF-ORGANIZED PUBLIC KEY MANAGEMENT ON MANETS
SECURITY REQUIREMENTS IN SOFTWARE PRODUCT LINES
NOVEL AND ANOMALOUS BEHAVIOR DETECTION USING BAYESIAN NETWORK CLASSIFIERS
LOW AREA SCALABLE MONTGOMERY INVERSION OVER GF(2m)
PRACTICAL APPLICATION OF A SECURITY MANAGEMENT MATURITY MODEL FOR SMES BASED ON PREDEFINED SCHEMAS
SCFS: TOWARDS DESIGN AND IMPLEMENTATION OF A SECURE DISTRIBUTED FILESYSTEM
ALERT CORRELATION BASED ON A LOGICAL HANDLING OF ADMINISTRATOR PREFERENCES AND KNOWLEDGE
METRICS APPLICATION IN METROPOLITAN BROADBAND ACCESS NETWORK SECURITY ANALYSIS
MULTIPHASE DEPLOYMENT MODELS FOR FAST SELF HEALING IN WIRELESS SENSOR NETWORKS
PROPER KEY GENERATION FOR THE IZOSIGN ALGORITHM
AN EFFICIENT MULTIPLICATION ALGORITHM USING BINOMIAL RESIDUE REPRESENTATION
POINT MULTIPLICATION ON SUPERSINGULAR ELLIPTIC CURVES DEFINED OVER FIELDS OF CHARACTERISTIC 2 AND 3
YET ANOTHER SECURE DISTANCE-BOUNDING PROTOCOL
INTERACTIVITY FOR REACTIVE ACCESS CONTROL
PRICE TO PROVIDE RFID SECURITY AND PRIVACY?
CSTEG: TALKING IN C CODE - Steganography of C Source Code in Text
A 640 MBIT/S 32-BIT PIPELINED IMPLEMENTATION OF THE AES ALGORITHM
TOWARDS LANGUAGE-INDEPENDENT APPROACH FOR SECURITY CONCERNS WEAVING
AN E-VOTING PROTOCOL BASED ON PAIRING BLIND SIGNATURES
ENSURING THE CORRECTNESS OF CRYPTOGRAPHIC PROTOCOLS WITH RESPECT TO SECRECY
EFFICIENT LOCALIZATION SCHEMES IN SENSOR NETWORKS WITH MALICIOUS NODES
SECURITY AND AUTHENTICATION FOR NETWORKED STORAGE
NEW SCHEMES FOR ANOMALY SCORE AGGREGATION AND THRESHOLDING
KEY MANAGEMENT OF QUANTUM GENERATED KEYS IN IPSEC
HONEYD DETECTION VIA ABNORMAL BEHAVIORS GENERATED BY THE ARPD DAEMON
A NOTE ON BIOMETRICS-BASED AUTHENTICATION WITH PORTABLE DEVICE
SEC-SNMP: POLICY-BASED SECURITY MANAGEMENT FOR SENSOR NETWORKS
A NEW PROBABILISTIC REKEYING METHOD FOR SECURE DYNAMIC GROUPS
FUNCTIONALITY-BASED APPLICATION CONFINEMENT - Parameterised Hierarchical Application Restrictions
TRAITOR TRACING FOR ANONYMOUS ATTACK IN CONTENT PROTECTION
EXPERIMENTAL RESEARCH AND CAPABILITY VALUATION ON SECURITY OF SOA-SCA BASED SDO
SECURITY POLICY INSTANTIATION TO REACT TO NETWORK ATTACKS - An Ontology-based Approach using OWL and SWRL
A POLYNOMIAL BASED HASHING ALGORITHM
IDENTITY-BASED SIGNCRYPTION WITHOUT RANDOM ORACLES
APPLYING SRP ON SIP AUTHENTICATION
CRYPTONET: SECURE E–MAIL SYSTEM
NOVEL NEUROCOMPUTING-BASED SCHEME TO AUTHENTICATE WLAN USERS EMPLOYING DISTANCE PROXIMITY THRESHOLD
NEW TECHNIQUES TO ENHANCE THE CAPABILITIES OF THE SOCKS NETWORK SECURITY PROTOCOL
APPLICATION TO A SHARED TERMINAL OF A ROAMING USER PROFILE SET UP THROUGH LDAP-SMART CARD AUTHENTICATION COOPERATION
INTRUSION DETECTION AND PREVENTION SYSTEM USING SECURE MOBILE AGENTS
SAKE - Secure Authenticated Key Establishment in Sensor Networks
KERBEROS IMPLEMENTATION IN MANETS
A REVIEW OF TRUST MANAGEMENT, SECURITY AND PRIVACY POLICY LANGUAGES
AUTONOMIC TRUST MANAGEMENT FOR A PERVASIVE SYSTEM
SELECTING TRUSTWORTHY CONTENT USING TAGS
DYNAMICS OF TRUST EVOLUTION - Auto-configuration of Dispositional Trust Dynamics
TRUST MODEL FOR HIGH QUALITY RECOMMENDATION
ENHANCED SECURE INTERFACE FOR A PORTABLE E-VOTING TERMINAL
REPUTATION MANAGEMENT IN GRID-BASED VIRTUAL ORGANISATIONS
FORMALIZING END-TO-END CONTEXT-AWARE TRUST RELATIONSHIPS IN COLLABORATIVE ACTIVITIES