Cs-Cr
A Secure TFTP Protocol with Security Proofs
A Survey of Digital Privacy Rights Under CISA
Adversary Model: Adaptive Chosen Ciphertext Attack with Timing Attack
Algorithm for Back-up and Authentication of Data Stored on Cloud
Algorithmization, requirements analysis and architectural challenges of TraConDa
An Encrypted Trust-Based Routing Protocol
An Incoercible E-Voting Scheme Based on Revised Simplified Verifiable Re-encryption Mix-nets
An Optimized Signature Verification System for Vehicle Ad hoc NETwork
Analysis of Maximum Likelihood and Mahalanobis Distance for Identifying Cheating Anchor Nodes
Analyzing Cryptographic Algorithms for Secure Cloud Network
AODVSEC: A Novel Approach to Secure Ad Hoc on-Demand Distance Vector (AODV) Routing Protocol from Insider Attacks in MANETs
Applicability of DUKPT Key Management Scheme to Cloud Wallet and other Mobile Payments
Application of Multi factor authentication in Internet of Things domain
Applying recent secure element relay attack scenarios to the real world: Google Wallet Relay Attack
ASIA: An Access Control, Session Invocation and Authorization Architecture for Home Energy Appliances in Smart Energy Grid Environments
Assessing Inconspicuous Smartphone Authentication for Blind People
Attacks on quantum key distribution protocols that employ non-ITS authentication
Automated Verification Of Role-Based Access Control Policies Constraints Using Prover9
Chip and Skim: cloning EMV cards with the pre-play attack
Classification of Attacks in Wireless Sensor Networks
CloRoFor: Cloud Robust Forensics
Collaborative Applications over Peer-to-Peer Systems - Challenges and Solutions