Cs-Cr
Random Linear Network Coding: A free cipher?
AES Implementation and Performance Evaluation on 8-bit Microcontrollers
RFID Authentication, Efficient Proactive Information Security within Computational Security
Encoding of Network Protection Codes Against Link and Node Failures Over Finite Fields
On the deployment of Mobile Trusted Modules
Software Security Rules, SDLC Perspective
Efficient FPGA-based multipliers for F_{3^97} and F_{3^{6*97}}
GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries
Direct and Reverse Secret-Key Capacities of a Quantum Channel
INDECT Advanced Security Requirements
Optimal Iris Fuzzy Sketches
Multi Layer Approach to Defend DDoS Attacks Caused by Spam
General Hardness Amplification of Predicates and Puzzles
A Modeling Framework for Generating Security Protocol Specifications
Safer in the Clouds (Extended Abstract)
Cryptanalysis of group-based key agreement protocols using subgroup distance functions
Design and Analysis of an Attack Resilient and Adaptive Medium access Control Protocol for Computer Networks
Emoji-Based Jailbreaking of Large Language Models
Prompt-Induced Over-Generation as Denial-of-Service: A Black-Box Attack-Side Benchmark
A Survey on Wireless Sensor Network Security
A secure email login system using virtual password
Securing data transfer in the cloud through introducing identification packet and UDT-authentication option field: a characterization