Cs-Cr
The Peacock Encryption Method
Universal Secure Network Coding via Rank-Metric Codes
Steganography in Handling Oversized IP Packets
Randomness Efficient Steganography
A Secure and Efficient Protocol for Group Key agreement in Heterogeneous Environment
Approach To Solving Cybercrime And Cybersecurity
An Authentication Code against Pollution Attacks in Network Coding
On Secrecy Capacity Scaling in Wireless Networks
A Formal Foundation for XrML
Quantifying Timing Leaks and Cost Optimisation
Proving Noninterference by a Fully Complete Translation to the Simply Typed lambda-calculus
Branching proofs of infeasibility in low density subset sum problems
Short expressions of permutations as products and cryptanalysis of the Algebraic Eraser
Self-Organized Authentication in Mobile Ad-hoc Networks
MemoryRanger Prevents Hijacking FILE_OBJECT Structures in Windows Kernel
Variations on Kaks Three Stage Quantum Cryptography Protocol
From Qualitative to Quantitative Proofs of Security Properties Using First-Order Conditional Logic
Authentication and Secrecy Codes for Equiprobable Source Probability Distributions
E-Net Models of a Software System for Web Pages Security SECURITY
Encoding points on hyperelliptic curves over finite fields in deterministic polynomial time
The E-net model for the Risk Analysis and Assessment System for the Information Security of Communication and Information Systems ("Defining" Subsystem)
How to Avoid Reidentification with Proper Anonymization