Cs-Cr
HyberLoc: Providing Physical Layer Location Privacy in Hybrid Sensor Networks
Using Linear Difference Equations to Model Nonlinear Cryptographic Sequences
An Improved Implementation of Grain
New Binomial Bent Function over the Finite Fields of Odd Characteristic
Strategies and performances of Soft Input Decryption
Alice Meets Bob: A Comparative Usability Study of Wireless Device Pairing Methods for a "Two-User" Setting
Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet
Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication
Choreographies with Secure Boxes and Compromised Principals
A Graph Theoretic Approach for Optimizing Key Pre-distribution in Wireless SensorNetworks
Finding passwords by random walks: How long does it take?
Global Heuristic Search on Encrypted Data (GHSED)
Security impact ratings considered harmful
Fading Cognitive Multiple-Access Channels With Confidential Messages
On the Relations Between Diffie-Hellman and ID-Based Key Agreement from Pairings
Identity Based Strong Designated Verifier Parallel Multi-Proxy Signature Scheme
Probabilistic Anonymity and Admissible Schedulers
A Distributed Sequential Algorithm for Collaborative Intrusion Detection Networks
Detecting Motifs in System Call Sequences
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
FreeBSD Mandatory Access Control Usage for Implementing Enterprise Security Policies
Global Linear Complexity Analysis of Filter Keystream Generators