Cs-Cr
Evaluasi Celah Keamanan Web Server pada LPSE Kota Palembang
Evaluation of Contactless Smartcard Antennas
Genuine onion: Simple, Fast, Flexible, and Cheap Website Authentication
How the Voynich Manuscript was created
Identity Management issues in Cloud Computing
Improving GGH Public Key Scheme Using Low Density Lattice Codes
Information Hiding in CSS : A Secure Scheme Text-Steganography using Public Key Cryptosystem
Intrusion Detection using Continuous Time Bayesian Networks
Investigation of Hill Cipher Modifications Based on Permutation and Iteration
JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface
Key recycling in authentication
Loc-Auth: Location-Enabled Authentication Through Attribute-Based Encryption
Minimization of image watermarking side effects through subjective optimization
Multiplayer Games and their Need for Scalable and Secure State Management
New Method for Public Key Distribution Based on Social Networks
Optimal error of query sets under the differentially-private matrix mechanism
Owning Your Home Network: Router Security Revisited
Packet Drop Attack Detection Techniques in Wireless Ad hoc Networks: A Review
Parallel Vectorized Algebraic AES in MATLAB for Rapid Prototyping of Encrypted Sensor Processing Algorithms and Database Analytics
Percolation Model of Insider Threats to Assess the Optimum Number of Rules
Perfect Secrecy under Deep Random assumption
Performance Analysis of AODV, DSDV and DSR in MANETs