RELIABLE PROCESS FOR SECURITY POLICY DEPLOYMENT
FORMAL ANALYSIS METHODS OF NETWORK SECURITY DESIGN
SECURING OPENSSL AGAINST MICRO-ARCHITECTURAL ATTACKS
A 3G IMS-BASED TESTBED FOR SECURE REAL-TIME AUDIO SESSIONS
CLOCK CONTROL SEQUENCE RECONSTRUCTION IN THE GENERALIZED SHRINKING GENERATOR
A QUERY UNIT FOR THE IPSEC DATABASES
REMOTE ALGORITHMIC COMPLEXITY ATTACKS AGAINST RANDOMIZED HASH TABLES
SECURE COMPUTATION OF COMMON DATA AMONG MALICIOUS PARTNERS
EXTENSIBLE ACCESS CONTROL MODEL FOR XML DOCUMENT COLLECTIONS
ADDITIVE PROOFS OF KNOWLEDGE - A New Notion for Non-Interactive Proofs
IMPLEMENTATION AND ANALYSIS OF A HANDWRITTEN SIGNATURE VERIFICATION TECHNIQUE
UTILIZING EXTENSION CHARACTER ‘KASHIDA’ WITH POINTED LETTERS FOR ARABIC TEXT DIGITAL WATERMARKING
A COMBINATORICS PROLIFERATION MODEL TO DETERMINE THE TIMING FOR BLOCKING SCANNING MALWARE
SECURING HEALTHGRID ENVIRONMENTS
INDEPENDENT VOTER VERIFIABILITY FOR REMOTE ELECTRONIC VOTING
MAIS: MOBILE AGENT INTEGRITY SYSTEM - A Security System to IDS based on Autonomous Agents
AN EFFECTIVE AND SECURE WATERMARKING PROTOCOL FOR DIGITAL RIGHTS PROTECTION OVER THE SECOND-HAND MARKET
PRIVACY PRESERVING k-MEANS CLUSTERING IN MULTI-PARTY ENVIRONMENT
COMBINED DATA MINING APPROACH FOR INTRUSION DETECTION
DYNAMIC CONTEXT-AWARE ACCESS CONTROL - Use of Resource Hierarchies to Define Fine-grained, Adaptable Authorization Policies
IDENTITY BASED PUBLIC KEY EXCHANGE (IDPKE) FOR WIRELESS AD HOC NETWORKS
DEVELOPING A MODEL AND A TOOL TO MANAGE THE INFORMATION SECURITY IN SMALL AND MEDIUM ENTERPRISES
EFFICIENT LARGE-SCALE DISTRIBUTED KEY GENERATION AGAINST BURST INTERRUPTION
K2: A STREAM CIPHER ALGORITHM USING DYNAMIC FEEDBACK CONTROL
TOWARDS USER AUTHENTICATION FLEXIBILITY
PRACTICAL VERIFICATION OF UNTRUSTED TERMINALS USING REMOTE ATTESTATION
THE POLYNOMIAL MULTICOMPOSITION PROBLEM IN (Z/nZ)
DETECTING ANOMALOUS TRAFFIC USING STATISTICAL PROCESSING AND SELF-ORGANIZING MAPS
WISE GUARD - MAC Address Spoofing Detection System for Wireless LANs
PRACTICAL SECURE BIOMETRICS USING SET INTERSECTION AS A SIMILARITY MEASURE
IMPLEMENTATION AND EVALUATION OF NEW ILLEGAL COPY PROTECTION - Protection Against Making a Illegal Copy of a Copy
AN IMPROVED MODEL FOR SECURE CRYPTOGRAPHIC INTEGRITY VERIFICATION OF LOCAL CODE
A MORE EFFICIENT CONVERTIBLE NOMINATIVE SIGNATURE
TOWARDS A MULTI-MODEL VIEWS SECURITY FRAMEWORK
AN ANONYMOUS WATERMARKING SCHEME FOR CONTENT DISTRIBUTION PROTECTION USING TRUSTED COMPUTING
ON THE IMPROVEMENT OF REMOTE AUTHENTICATION SCHEME WITH SMART CARDS
USING STEGANOGRAPHY TO IMPROVE HASH FUNCTIONS’ COLLISION RESISTANCE
ROLE AND TASK BASED AUTHORIZATION MANAGEMENT FOR PROCESS-VIEW
IMPROVING SECURITY IN CHAOTIC SPREAD SPECTRUM COMMUNICATION SYSTEMS WITH A NOVEL ‘BIT POWER PARAMETER SPECTRUM’ MEASURE
MODIFIED TEMPORAL KEY INTEGRITY PROTOCOL FOR EFFICIENT WIRELESS NETWORK SECURITY
ON THE KEY-COMPROMISE IMPERSONATION VULNERABILITY OF ONE-PASS KEY ESTABLISHMENT PROTOCOLS
UTILIZING SOCIAL NETWORKING PLATFORMS TO SUPPORT PUBLIC KEY INFRASTRUCTURES
ANONYMOUS PREPAID CONTENT VIEWING SYSTEM WITH MOBILE TERMINAL
SUBQUADRATIC BINARY FIELD MULTIPLIER IN DOUBLE POLYNOMIAL SYSTEM
E-BUSINESS SECURITY DESIGN USING PROCESS SECURITY REQUIREMENTS SEPTET
A HIGH-LEVEL ASPECT-ORIENTED BASED LANGUAGE FOR SOFTWARE SECURITY HARDENING
A CLOSER LOOK AT BROADCAST ENCRYPTION AND TRAITOR TRACING FOR CONTENT PROTECTION
INVESTIGATION OF COOPERATIVE DEFENSE AGAINST DDOS
MOBILE SECRET KEY DISTRIBUTION WITH NETWORK CODING
AN EFFICIENT INTRUSION DETECTION SYSTEM FOR NETWORKS WITH CENTRALIZED ROUTING
SECURE SERVICE PUBLISHING WITH UNTRUSTED REGISTRIES - Securing Service Discovery
PRIVATE COMPUTING WITH BEEHIVE ORGANIZED AGENTS
INTEGRATED RIGHT MANAGEMENT FOR HOME CONTENT - A SIM based Right Management Solution for Home Networks
ON THE EFFECT OF SCORE EQUALIZATION IN SVM MULTIMODAL BIOMETRIC SYSTEMS
A PROVABLY SECURE MULTI-RECEIVER IDENTITY-BASED SIGNCRYPTION USING BILINEAR MAPS
MOBILE AGENT SECURITY WITH EFFICIENT OBLIVIOUS TRANSFER
PRACTICAL AND UNIVERSAL INTERPRETATION FUNCTIONS FOR SECRECY
A SECURE JAILING SYSTEM FOR CONFINING UNTRUSTED APPLICATIONS
SECURE LICENSE MANAGEMENT - Management of Digital Object Licenses in a DRM Environment