Cs-Cr
Assisted Common Information with Applications to Secure Two-Party Computation
Intrusions into Privacy in Video Chat Environments: Attacks and Countermeasures
Little Dragon Two: An efficient Multivariate Public Key Cryptosystem
Network Coding-Based Protection Strategy Against Node Failures
HF-hash : Hash Functions Using Restricted HFE Challenge-1
A Novel Scheme for Secured Data Transfer Over Computer Networks
MIMO-Assisted Channel-Based Authentication in Wireless Networks
Double Sided Watermark Embedding and Detection with Perceptual Analysis
Composable Security in the Bounded-Quantum-Storage Model
Bounds on the degree of APN polynomials The Case of $x^{-1}+g(x)$
Course Material Selection Rubric for Creating Network Security Courses
Efficient Steganography with Provable Security Guarantees
SECOQC Business White Paper
Efficient Authenticated Data Structures for Graph Connectivity and Geometric Search Problems
Secure Two-party Protocols for Point Inclusion Problem
Random Linear Network Coding: A free cipher?
AES Implementation and Performance Evaluation on 8-bit Microcontrollers
RFID Authentication, Efficient Proactive Information Security within Computational Security
Encoding of Network Protection Codes Against Link and Node Failures Over Finite Fields
On the deployment of Mobile Trusted Modules
Software Security Rules, SDLC Perspective
Efficient FPGA-based multipliers for F_{3^97} and F_{3^{6*97}}