PREVENTING WORMHOLE ATTACK IN WIRELESS AD HOC NETWORKS USING COST-BASED SCHEMES
AN OFFLINE PEER-TO-PEER BROADCASTING SCHEME WITH ANONYMITY
QUANTUM SECURE DIRECT COMMUNICATION USING ENTANGLEMENT AND SUPER DENSE CODING
ON THE SECURITY OF TWO RING SIGNCRYPTION SCHEMES
PRACTICAL TRACEABLE ANONYMOUS IDENTIFICATION
AN ANOMALY-BASED WEB APPLICATION FIREWALL
ITERATED TRANSFORMATIONS AND QUANTITATIVE METRICS FOR SOFTWARE PROTECTION
AN APPROACH FOR DESIGNING OF ENTERPRISE IT LANDSCAPES TO PERFORM QUANTITAVE INFORMATION SECURITY RISK ASSESSMENT
MONITORING NODE SELECTION ALGORITHM FOR INTRUSION DETECTION IN CONGESTED SENSOR NETWORK
CERTIFIED PSEUDONYMS COLLIGATED WITH MASTER SECRET KEY
INTERACTIVE SECRET SHARE MANAGEMENT
AN ALTERNATIVE APPROACH FOR FORMULA MODELLING IN SECURITY METRICS
VISUAL PROGRAMMING LANGUAGE FOR SECURITY REQUIREMENTS IN BUSINESS PROCESSES AS MODEL-DRIVEN SOFTWARE DEVELOPMENT
AN EFFICIENT GROUP KEY AGREEMENT PROTOCOL FOR HETEROGENEOUS ENVIRONMENT
EVALUATION OF QUALITY AND SECURITY OF A VOIP NETWORK BASED ON ASTERISK AND OpenVPN
BEHAVIOR-BASED CLUSTERING FOR DISCRIMINATION BETWEEN FLASH CROWDS AND DDoS ATTACKS
NETWORK STACK OPTIMIZATION FOR IMPROVED IPSEC PERFORMANCE ON LINUX
ON THE NEED TO DIVIDE THE SIGNATURE CREATION ENVIRONMENT
FAST RE-ESTABILISHMENT OF IKEV2 SECURITY ASSOCIATIONS FOR RECOVERY OF IPSEC GATEWAYS IN MOBILE NETWORK
PHISHPIN: AN INTEGRATED, IDENTITY-BASED ANTI-PHISHING APPROACH
INFORMATION-THEORETICALLY SECURE STRONG VERIFIABLE SECRET SHARING
FINGER VEIN VERIFICATION TECHNOLOGY FOR MOBILE APPARATUS
COLLABORATIVE SECURITY ASSESSMENTS IN EMBEDDED SYSTEMS DEVELOPMENT - The ESSAF Framework for Structured Qualitative Analysis
IDENTIFYING SECURITY ELEMENTS FOR COOPERATIVE INFORMATION SYSTEMS
A SECURITY DESIGN PATTERN TAXONOMY BASED ON ATTACK PATTERNS - Findings of a Systematic Literature Review
MANAGING SECURITY OF GRID ARCHITECTURE WITH A GRID SECURITY OPERATION CENTER
MULTIPARTY COMPARISON - An Improved Multiparty Protocol for Comparison of Secret-shared Values
TOOL SUPPORT FOR ACHIEVING QUALITATIVE SECURITY ASSESSMENTS OF CRITICAL INFRASTRUCTURES - The ESSAF Framework for Structured Qualitative Analysis
ON THE SECURITY OF ADDING CONFIRMERS INTO DESIGNATED CONFIRMER SIGNATURES
EFFICIENT TRAITOR TRACING FOR CONTENT PROTECTION
AD-HOC ON DEMAND AUTHENTICATION CHAIN PROTOCOL - An Authentication Protocol for Ad-hoc Networks
RFID AUTHENTICATION PROTOCOLS BASED ON ELLIPTIC CURVES - A Top-Down Evaluation Survey
THE DARK SIDE OF SECURITY BY OBSCURITY - and Cloning MiFare Classic Rail and Building Passes, Anywhere, Anytime
ISEE: AN INFORMATION SECURITY ENGINEERING ENVIRONMENT
SIMULATION OF AN IDENTITY-BASED CRYPTOGRAPHY SCHEME FOR AD HOC NETWORKS
NMIX: AN IDEAL CANDIDATE FOR KEY MIXING
A NEW ANALYSIS OF RC4 - A Data Mining Approach (J48)
ONE-TOUCH FINANCIAL TRANSACTION AUTHENTICATION
UNIVERSAL AUTHENTICATION FRAMEWORK - Requirements and Phase Design
ADDING EXPERT KNOWLEDGE TO TAN-BASED INTRUSION DETECTION SYSTEMS
IMPLEMENTING TRUE RANDOM NUMBER GENERATORS IN FPGAS BY CHIP FILLING
A CHAOS BASED ENCRYPTION METHOD USING DYNAMICAL SYSTEMS WITH STRANGE ATTRACTORS
THE CHAMELEON CIPHER-192 (CC-192) - A Polymorphic Cipher
SAFE REVERSE AUCTIONS PROTOCOL - Adding Treatment Against Collusive Shill Bidding and Sniping Attacks
THROTTLING DDoS ATTACKS
A SECOND PREIMAGE ATTACK ON THE MERKLE-DAMGARD SCHEME WITH A PERMUTATION FOR HASH FUNCTIONS
SECURITY PATTERNS, TOWARDS A FURTHER LEVEL
FREE SECURITY SUITE 2 - Easy, Intuitive and Complete Free Security Suite with Web Browser Integration
SERVICE AND TIMEFRAME DEPENDENT UNLINKABLE ONE-TIME PSEUDONYMS
A TRAFFIC COHERENCE ANALYSIS MODEL FOR DDOS ATTACK DETECTION
EFFICIENT ALGORITHMS AND ABSTRACT DATA TYPES FOR LOCAL INCONSISTENCY ISOLATION IN FIREWALL ACLS
RESISTING IMPERSONATION ATTACKS IN CHAINING-BASED PUBLIC-KEY MANAGEMENT ON MANETS - The Virtual Public-Key Management
ASSESSMENT OF MOBILE SECURITY PLATFORMS
RESYNCHRONIZATION ATTACK ON STREAM CIPHERS FILTERED BY MAIORANA-MCFARLAND FUNCTIONS
A NEW IMAGE ENCRYPTION ALGORITHM USING CELLULAR AUTOMATA
ATTACK GRAPH GENERATION WITH INFUSED FUZZY CLUSTERING