MORE ROBUST PRIVATE INFORMATION RETRIEVAL SCHEME
ON THE SELF-SIMILARITY OF THE 1999 DARPA/LINCOLN LABORATORY EVALUATION DATA
USING MICROSOFT OFFICE INFOPATH TO GENERATE XACML POLICIES
SECURE ONLINE ENGLISH AUCTIONS
FINITE FIELD MULTIPLICATION IN LAGRANGE REPRESENTATION USING FAST FOURRIER TRANSFORM
PARALLEL MULTIPLICATION IN F2n USING CONDENSED MATRIX REPRESENTATION
EXTENDING XML SIGNATURE AND APPLYING IT TO WEB PAGE SIGNING
DESIGN AND IMPLEMENTATION OF A PRACTICAL SECURE DISTRIBUTED HEALTHCARE APPLICATION
IMPROVING SOFTWARE SECURITY THROUGH AN INTEGRATED APPROACH
COLLABORATION SECURITY FOR MODERN INFORMATION SYSTEMS
A DOS ATTACK AGAINST THE INTEGRITY-LESS ESP (IPSEC)
JASTEG2000 - Steganography for JPEG2000 Coded Images
AN INFINITE PHASE-SIZE BMAP/M/1 QUEUE AND ITS APPLICATION TO SECURE GROUP COMMUNICATION
ACHIEVING UNCONDITIONAL SECURITY IN EXISTING NETWORKS USING QUANTUM CRYPTOGRAPHY
TRAITOR TRACING FOR SUBSCRIPTION-BASED SYSTEMS
PROTECTING CIPHER BLOCK CHAINING AGAINST ADAPTIVE CHOSEN PLAINTEXT ATTACK
AN EXTENDED ROLE-BASED ACCESS CONTROL FOR WEB SERVICES
A SERVICE DISCOVERY THREAT MODEL FOR AD HOC NETWORKS
USING ATTACK GRAPHS IN AD HOC NETWORKS - For Intrusion Prediction Correlation and Detection
DIGITAL CONTRACT SIGNATURE SCHEME BASED ON MULTIPLE CRYPTOSYSTEM
INTRUSION DETECTION FOR WEB APPLICATIONS (SHORT VERSION)
ACTION-TRIGGERED PUBLIC-KEY SYSTEM FOR GSM USING RSA WITH PHONE-DEPENDENT ENCRYPTION
SECURE INFORMATION SYSTEMS DEVELOPMENT - Based on a Security Requirements Engineering Process
CHOSEN-IV STATISTICAL ATTACKS ON eSTREAM CIPHERS
SECURITY CONSIDERATIONS IN CURRENT VOIP PROTOCOLS
A NEW (t , n) MULTI-SECRET SHARING SCHEME BASED ON LINEAR ALGEBRA
SMOOTH BLOCKS-BASED BLIND WATERMARKING ALGORITHM IN COMPRESSED DCT DOMAIN
EFFICIENT ALL-OR-NOTHING ENCRYPTION USING CTR MODE
ACCESS CONTROL AND JOINT MANAGEMENT FOR COLLABORATIVE PEER GROUPS
AN ALGORITHM FOR AUTHENTICATION OF DIGITAL IMAGES
ON USE OF IDENTITY-BASED ENCRYPTION FOR SECURE EMAILING
QUANTITATIVE ANALYSIS AND ENFORCEMENT OF THE PRINCIPLE OF LEAST PRIVILEGE IN ROLE-BASED ACCESS CONTROL
UNDESIRABLE AND FRAUDULENT BEHAVIOUR IN ONLINE AUCTIONS
PROTOCOL INDEPENDENT LIGHTWEIGHT SECURE COMMUNICATION
COMPARATIVE STUDY BETWEEN BAYESIAN NETWORK AND POSSIBILISTIC NETWORK IN INTRUSION DETECTION
FORWARD-SECURE AUTHENTICATED-ENCRYPTION IN MULTI-RECEIVER SETTING
DIGITAL OBJECT RIGHTS MANAGEMENT - Interoperable Client-side DRM Middleware
EVALUATION OF THE INTRUSION DETECTION CAPABILITIES AND PERFORMANCE OF A SECURITY OPERATION CENTER
DESIGN OF CRYPTOGRAPHIC PROTOCOLS BY MEANS OF GENETIC ALGORITHMS TECHNIQUES
PROPOSALS FOR ITERATED HASH FUNCTIONS
FLEXIBLE LICENSE TRANSFER SYSTEM USING MOBILE TERMINAL
SPOOFED ARP PACKETS DETECTION IN SWITCHED LAN NETWORKS
PRIVATE BIDDING FOR MOBILE AGENTS
NETWORK SECURITY EVALUATION BASED ON SIMULATION OF MALFACTOR’S BEHAVIOR
WORKLOAD HIDDEN MARKOV MODEL FOR ANOMALY DETECTION
LAYERED ARCHITECTURE FOR SECURE E-COMMERCE APPLICATIONS
SECURITY ENHANCEMENT FOR A LOW COMPUTATION COST USER AUTHENTICATION SCHEME
SECURE ACCESS MODULES FOR IDENTITY PROTECTION OVER THE EAP-TLS - Smartcard Benefits for User Anonymity in Wireless Infrastructures
LEAST PRIVILEGE IN SEPARATION KERNELS
SECURING WEB SERVICES USING IDENTITY-BASED ENCRYPTION (IBE)
DIGITAL PSEUDONYM IDENTITY FOR E-COMMERCE
USING OMA DRM 2.0 PROTECTED CONTENT - Ogg Vorbis Protected Audio under Symbian OS
DEFINING VIEWPOINTS FOR SECURITY ARCHITECTURAL PATTERNS
ON THE DESIGN OF A LOW-RATE DOS ATTACK AGAINST ITERATIVE SERVERS
MODELLING E-BUSINESS SECURITY USING BUSINESS PROCESSES
THE “SECUREPHONE” - A Mobile Phone with Biometric Authentication and e-Signature Support for Dealing Secure Transactions on the Fly
COMBINATION OF A SMARTCARD E-PURSE AND E-COIN TO MAKE ELECTRONIC PAYMENTS ON THE INTERNET
A CHALLENGING BUT FEASIBLE BLOCKWISE-ADAPTIVE CHOSEN-PLAINTEXT ATTACK ON SSL
INTERNET ROUTING SECURITY: AN APPROACH TO DETECT AND TO REACT TO INCORRECT ADVERTISEMENTS
PROTECTING ADAPTIVE MULTIMEDIA DELIVERY AND ADAPTATION USING PROXY BASED APPROACH
INTER-NODE RELATIONSHIP LABELING: A FINE-GRAINED XML ACCESS CONTROL IMPLEMENTATION USING GENERIC SECURITY LABELS
TRUST MANAGEMENT WITHOUT REPUTATION IN P2P GAMES
SECURITY RISK ANALYSIS IN WEB SERVICES SYSTEMS
PERSON VERIFICATION BY FUSION OF PROSODIC, VOICE SPECTRAL AND FACIAL PARAMETERS