Cs-Cr
Analysis of Security Threats in Wireless Sensor Network
Cryptanalysis of a one round chaos-based Substitution Permutation Network
Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey
Dynamic Selection of Symmetric Key Cryptographic Algorithms for Securing Data Based on Various Parameters
A Method in Security of Wireless Sensor Network based on Optimized Artificial immune system in Multi-Agent Environments
Differentially Private Grids for Geospatial Data
A mathematical problem for security analysis of hash functions and pseudorandom generators
APRAP: Another Privacy Preserving RFID Authentication Protocol
Study of Security Issues in Pervasive Environment of Next Generation Internet of Things
Optical Encryption with Jigsaw Transform using Matlab
FuGeIDS: Fuzzy Genetic paradigms in Intrusion Detection Systems
Simplification Resilient LDPC-Coded Sparse-QIM Watermarking for 3D-Meshes
Time Synchronization Attack in Smart Grid-Part II: Cross Layer Detection Mechanism
VoIP Steganography and Its Detection - A Survey
Personal data disclosure and data breaches: the customers viewpoint
BotMosaic: Collaborative Network Watermark for Botnet Detection
A Novel Data Hiding Scheme for Binary Images
On Randomness of Goldbach Sequences
A Key Pre-Distribution Scheme based on Multiple Block Codes for Wireless Sensor Networks
Torsion Limits and Riemann-Roch Systems for Function Fields and Applications
Noninterference with Local Policies
Breaking a novel colour image encryption algorithm based on chaos