TECHNIQUES FOR VALIDATION AND CONTROLLED EXECUTION OF PROCESSES, CODES AND DATA - A Survey
TRUST DEGREE BASED ACCESS CONTROL FOR SOCIAL NETWORKS
THE THREAT-VICTIM TABLE - A Security Prioritisation Framework For Diverse WLAN Network Topographies
RISK BASED ACCESS CONTROL WITH UNCERTAIN AND TIME-DEPENDENT SENSITIVITY
WHAT CAN RFID DO FOR VANETS? - A Cryptographic Point of View
ANALYSIS OF SNOW 3G⊕ RESYNCHRONIZATION MECHANISM
AN EFFECTIVE CLUSTERING APPROACH TO WEB QUERY LOG ANONYMIZATION
IMPROVING N-GRAM LINGUISTIC STEGANOGRAPHY BASED ON TEMPLATES
CONJUGATION AS PUBLIC KEY AGREEMENT PROTOCOL IN MOBILE CRYPTOGRAPHY
“MY SMARTPHONE IS A SAFE!” - The User’s Point of View Regarding Novel Authentication Methods and Gradual Security Levels on Smartphones
VULNERABILITY OF A NON-MEMBERSHIP PROOF SCHEME
EXTENDED VISUAL CRYPTOGRAPHY SCHEME FOR COLOR IMAGES WITH NO PIXEL EXPANSION
CONFIDENTIALITY AND INTEGRITY FOR SUM AGGREGATION IN SENSOR NETWORKS
A NEW CHAOS-BASED WATERMARKING ALGORITHM
PROXIABLE DESIGNATED VERIFIER SIGNATURE
SAFE RPC - Auditing Mixnets Safely using Randomized Partial Checking
ON A CONSTRUCTION OF STREAM-CIPHER-BASED HASH FUNCTIONS
NEW PSEUDO NEAR COLLISION ATTACK ON TIGER
ANONYMOUS SUBSCRIPTION SCHEMES - A Flexible Construction for On-line Services Access
PRIVACY PROTECTION FOR USER AUTHENTICATION
ON THE IMPORTANCE OF ONE-TIME KEY PAIRS IN BUYER-SELLER WATERMARKING PROTOCOLS
THROTTLING DDoS ATTACKS USING DISCRETE LOGARITHM PROBLEM
ADAPTIVE AND COMPOSABLE NON-INTERACTIVE STRING-COMMITMENT PROTOCOLS
FORMAL VERIFICATION OF G-PAKE USING CASPER/FDR2 - Securing a Group PAKE Protocol Using Casper/FDR2
AN IDENTITY BASED RING SIGNCRYPTION SCHEME WITH PUBLIC VERIFIABILITY
HANDLING IDS’ RELIABILITY IN ALERT CORRELATION - A Bayesian Network-based Model for Handling IDS’s Reliability and Controlling Prediction/False Alarm Rate Tradeoffs
FORCING OUT A CONFESSION - Threshold Discernible Ring Signatures
UNIVERSALLY COMPOSABLE NON-COMMITTING ENCRYPTIONS IN THE PRESENCE OF ADAPTIVE ADVERSARIES
MANAGEMENT OF SECURITY POLICIES IN VIRTUAL ORGANISATIONS
ACCESS CONTROL MODELS FOR BUSINESS PROCESSES
ATTACKS ON WEB SERVICES AND MITIGATION SCHEMES
GRAPHICAL AUTHENTICATION BASED ON USER BEHAVIOUR
AUDITING THE DEFENSE AGAINST CROSS SITE SCRIPTING IN WEB APPLICATIONS
A C++ CLASS FOR ANALYSING VECTOR BOOLEAN FUNCTIONS FROM A CRYPTOGRAPHIC PERSPECTIVE
HUBFIRE - A MULTI-CLASS SVM BASED JPEG STEGANALYSIS USING HBCL STATISTICS AND FR INDEX
ENCORE: TOWARDS A HOLISTIC APPROACH TO PRIVACY
TOWARDS DATA PROTECTION COMPLIANCE
QOS AND SECURITY IN ENERGY-HARVESTING WIRELESS SENSOR NETWORKS
SHORT ECC - A Lightweight Security Approach for Wireless Sensor Networks
SERVER-ASSISTED LONG-TERM SECURE 3-PARTY KEY ESTABLISHMENT
ANONYMOUS SOCIAL STAMPS - Authenticating Anonymous Statements to Friends with Privacy
PROVIDING CONFIDENTIALITY IN CONTENT-BASED PUBLISH/SUBSCRIBE SYSTEMS
INFINITE ALPHABET PASSWORDS - A Unified Model for a Class of Authentication Systems
EFFICIENT ALGORITHMIC SAFETY ANALYSIS OF HRU SECURITY MODELS
TOWARDS RISK BASED PREVENTION OF GROOMING ATTACKS
REALIZING SECURE MULTIPARTY COMPUTATION ON INCOMPLETE NETWORKS
SECURITY IN FUTURE MOBILE SENSOR NETWORKS - Issues and Challenges
A NOVEL INTRUSION DETECTION SYSTEM FOR MANETS
AN ICT SECURITY MANAGEMENT FRAMEWORK
DON’T FOLLOW ME - Spam Detection in Twitter
PREVENTING MALICIOUS PORTLETS FROM COMMUNICATING AND INTERCEPTING IN COLLABORATION PORTALS
ULTRA HIGH SPEED SHA-256 HASHING CRYPTOGRAPHIC MODULE FOR IPSEC HARDWARE/SOFTWARE CODESIGN
SECURE BRIDGING IN LARGE SCALE DEPLOYMENT OF ETHERNET
BMQE SYSTEM - A MQ Equations System based on Ergodic Matrix
SIDE-CHANNEL ATTACK ON THE HUMANAUTH CAPTCHA
IMPLICATIONS OF MISBEHAVING ATTACKS ON PROBABILISTIC QUORUM SYSTEM FOR MANETs
AUTOMATED THREAT IDENTIFICATION FOR UML
REWRITING-BASED SECURITY ENFORCEMENT OF CONCURRENT SYSTEMS - A Formal Approach
ANONYMOUS BUT AUTHORIZED TRANSACTIONS SUPPORTING SELECTIVE TRACEABILITY
EVALUATING SURVIVABILITY AND COSTS OF THREE VIRTUAL MACHINE BASED SERVER ARCHITECTURES
AN ENCRYPTION SCHEME FOR A SECURE POLICY UPDATING
PIECEWISE CLASSIFICATION OF ATTACK PATTERNS FOR EFFICIENT NETWORK INTRUSION DETECTION
EFFICIENT ASYMMETRIC IPSEC FOR SECURE ISCSI
HTEE: AN HMAC BASED TAMPER EVIDENT ENCRYPTION
ANONYMOUS SERVICES - Enhancing End-user Privacy Exploiting Anonymous Networks
SECURITY MODELS FOR HETEROGENEOUS NETWORKING