Cs-Cr
Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs
Enter Sandbox: Android Sandbox Comparison
Entropy Based Detection And Behavioral Analysis Of Hybrid Covert Channeling Secured Communication
Evaluasi Celah Keamanan Web Server pada LPSE Kota Palembang
Evaluation of Contactless Smartcard Antennas
Genuine onion: Simple, Fast, Flexible, and Cheap Website Authentication
How the Voynich Manuscript was created
Identity Management issues in Cloud Computing
Improving GGH Public Key Scheme Using Low Density Lattice Codes
Information Hiding in CSS : A Secure Scheme Text-Steganography using Public Key Cryptosystem
Intrusion Detection using Continuous Time Bayesian Networks
Investigation of Hill Cipher Modifications Based on Permutation and Iteration
JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface
Key recycling in authentication
Loc-Auth: Location-Enabled Authentication Through Attribute-Based Encryption
Minimization of image watermarking side effects through subjective optimization
Multiplayer Games and their Need for Scalable and Secure State Management
New Method for Public Key Distribution Based on Social Networks
Optimal error of query sets under the differentially-private matrix mechanism
Owning Your Home Network: Router Security Revisited
Packet Drop Attack Detection Techniques in Wireless Ad hoc Networks: A Review
Parallel Vectorized Algebraic AES in MATLAB for Rapid Prototyping of Encrypted Sensor Processing Algorithms and Database Analytics