Cs-Cr
AES-CBC Software Execution Optimization
A Theory of Pricing Private Data
CRAW: Combination of Re-Keying and Authentication in Wireless Networks for Secure Multicast Increasing Efficiency of Member Join/Leave and Movement
An Enciphering Scheme Based on a Card Shuffle
DoS and DDoS in Named-Data Networking
Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network
A Novel Approach for Handling Misbehaving Nodes in Behavior-Aware Mobile Networking
Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks
On the Parameterized Complexity and Kernelization of the Workflow Satisfiability Problem
Tracing the Man in the Middle in Monoidal Categories
Anonymous Communication in Peer-to-Peer Networks for providing more Privacy and Security
Analisis Keamanan Protokol Secure Socket Layer (SSL) Terhadap Proses Sniffing di Jaringan
Dpush: A scalable decentralized spam resistant unsolicited messaging protocol
Security Analysis of Secure Force Algorithm for Wireless Sensor Networks
An Open Source P2P Encrypted VoIP Application
Coding Side-Information for Implementing Cubic Transformation
Development of an Ontology Based Forensic Search Mechanism: Proof of Concept
Protection de la vie privee `a base dagents dans un syst`eme de-learning
A Review of Technical Problems when Conducting an Investigation in Cloud Based Environments
Survey of Strong Authentication Approaches for Mobile Proximity and Remote Wallet Applications - Challenges and Evolution
Turning Bitcoins into the Best-coins
Understanding Information Hiding in iOS