Cs-Cr
A Design of a Fast Parallel-Pipelined Implementation of AES: Advanced Encryption Standard
A Digital Watermarking Approach Based on DCT Domain Combining QR Code and Chaotic Theory
A general practitioner or a specialist for your infected smartphone?
A Lossless Data Hiding Technique based on AES-DWT
A Low-throughput Wavelet-based Steganography Audio Scheme
A Model for Privacy-enhanced Federated Identity Management
A New Efficient Asymmetric Cryptosystem Based on the Square Root Problem
A New Security Mechanism for Vehicular Communication Networks
A Novel Session Based Dual Steganographic Technique Using DWT and Spread Spectrum
A Privacy Preserving Improvement for SRTA in Telecare Systems
A Secure TFTP Protocol with Security Proofs
A Survey of Digital Privacy Rights Under CISA
Adversary Model: Adaptive Chosen Ciphertext Attack with Timing Attack
Algorithm for Back-up and Authentication of Data Stored on Cloud
Algorithmization, requirements analysis and architectural challenges of TraConDa
An Encrypted Trust-Based Routing Protocol
An Incoercible E-Voting Scheme Based on Revised Simplified Verifiable Re-encryption Mix-nets
An Optimized Signature Verification System for Vehicle Ad hoc NETwork
Analysis of Maximum Likelihood and Mahalanobis Distance for Identifying Cheating Anchor Nodes
Analyzing Cryptographic Algorithms for Secure Cloud Network
AODVSEC: A Novel Approach to Secure Ad Hoc on-Demand Distance Vector (AODV) Routing Protocol from Insider Attacks in MANETs
Applicability of DUKPT Key Management Scheme to Cloud Wallet and other Mobile Payments