Cs-Cr
A Two Intermediates Audio Steganography Technique
Logic of Negation-Complete Interactive Proofs (Formal Theory of Epistemic Deciders)
AES CCMP Algorithm with N-Way Interleaved Cipher Block Chaining
On the Efficiency of Classical and Quantum Secure Function Evaluation
ISWAR: An Imaging System with Watermarking and Attack Resilience
No SQL, No Injection? Examining NoSQL Security
A novel approach against E-mail attacks derived from user-awareness based techniques
A short note on the kissing number of the lattice in Gaussian wiretap coding
An Effective Fusion Technique of Cloud Computing and Networking Series
The 2008 Australian study of remnant data contained on 2nd hand hard disks: the saga continues
The Metadata Anonymization Toolkit
Accelerating Iterative SpMV for Discrete Logarithm Problem Using GPUs
Linear Transformations for Randomness Extraction
A Formal Approach to Distributed System Security Test Generation
Differential Spectrum of Some Power Functions With Low Differential Uniformity
A Novel Approach of Color Image Hiding using RGB Color planes and DWT
A General Approach for Securely Querying and Updating XML Data
Physical Unclonable Function (PUF) Based Random Number Generator
Simple and Efficient Contract Signing Protocol
Security issues for data sharing and service interoperability in eHealth systems: the Nu.Sa. test bed
The Hush Cryptosystem
Pairing-based algorithms for jacobians of genus 2 curves with maximal endomorphism ring