Cs-Cr
A Hierarchical Key Management Scheme for Wireless Sensor Networks Based on Identity-based Encryption
"The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography
Applying Memory Forensics to Rootkit Detection
A Secure Communication in Mobile Agent System
Differentially Private Location Privacy in Practice
Concrete Attribute-Based Encryption Scheme with Verifiable Outsourced Decryption
Non-commutative Digital Signatures
A Public Key Cryptoscheme Using Bit-pairs and Probabilistic Mazes
A Piggybank Protocol for Quantum Cryptography
A Provenance-Policy Based Access Control Model For Data Usage Validation In Cloud
Goldbach Circles and Balloons and Their Cross Correlation
Transaction Remote Release (TRR): A New Anonymization Technology for Bitcoin
A new Watermarking Technique for Medical Image using Hierarchical Encryption
A Forensically Sound Adversary Model for Mobile Devices
Random Sequences from Primitive Pythagorean Triples
The Case for a Collaborative Universal Peer-to-Peer Botnet Investigation Framework
Privacy in Content-Oriented Networking: Threats and Countermeasures
Privacy in the Internet of Things: Threats and Challenges
A Trust Domains Taxonomy for Securely Sharing Information: A Preliminary Investigation
Secure SAML validation to prevent XML signature wrapping attacks
Middle-Solving Grobner bases algorithm for cryptanalysis over finite fields
Improving Hard Disk Contention-based Covert Channel in Cloud Computing Environment