Cs-Cr
Security issues for data sharing and service interoperability in eHealth systems: the Nu.Sa. test bed
The Hush Cryptosystem
Pairing-based algorithms for jacobians of genus 2 curves with maximal endomorphism ring
CAWS - Security Algorithms for Wireless Sensor Networks: A Cellular Automata Based Approach
Symbolic Protocol Analysis for Diffie-Hellman
Integrated Key based Strict Friendliness Verification of Neighbors in MANET
Globally reasoning about localised security policies in distributed systems
Deducing Security Goals From Shape Analysis Sentences
Data Aggregation without Secure Channel: How to Evaluate a Multivariate Polynomial Securely
Pixastic: Steganography based Anti-Phihsing Browser Plug-in
Data Hiding Techniques using number decompositions
A Novel Effective, Secure and Robust CDMA Digital Image Watermarking in YUV Color Space Using DWT2
Detection of Configuration Vulnerabilities in Distributed (Web) Environments
Refining a Quantitative Information Flow Metric
A Robust Cryptographic System using Neighborhood-Generated Keys
Cryptanalysis and Improvements on Some Graph-based Authentication Schemes
Algebraic properties of generalized Rijndael-like ciphers
A Review of Techniques to Mitigate Sybil Attacks
Wireless Public key Infrastructure for Mobile Phones
Exploring Relay Cooperation for Secure and Reliable Transmission in Two-Hop Wireless Networks
Low Rank Mechanism for Optimizing Batch Queries under Differential Privacy
A Text Steganography Method Using Pangram and Image Mediums