Cs-Cr
Analysis of a Key Distribution Scheme in Secure Multicasting
Geocast into the Past: Towards a Privacy-Preserving Spatiotemporal Multicast for Cellular Networks
A hybrid artificial immune system and Self Organising Map for network intrusion detection
Comparison between security majors in virtual machine and linux containers
Authentication Using Piggy Bank Approach to Secure Double-Lock Cryptography
A Novel Approach to Fully Private and Secure Auction: A Sealed Bid Knapsack Auction
A security suite for wireless body area networks
Application of Steganography for Anonymity through the Internet
Monografia
Signcryption scheme based on schnorr digital signature
Mining Techniques in Network Security to Enhance Intrusion Detection Systems
Channel Independent Cryptographic Key Distribution
A Multi-Path Certification Protocol for Mobile Ad Hoc Networks
DREAM: DiffeRentially privatE smArt Metering
An Active Defense Mechanism for TCP SYN flooding attacks
Polynomial-Time, Semantically-Secure Encryption Achieving the Secrecy Capacity
Some Recommended Protection Technologies for Cyber Crime Based on Social Engineering Techniques -- Phishing
Secure and Robust Transmission and Verification of Unknown Quantum States in Minkowski Space
Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art
AES-CBC Software Execution Optimization
A Theory of Pricing Private Data
CRAW: Combination of Re-Keying and Authentication in Wireless Networks for Secure Multicast Increasing Efficiency of Member Join/Leave and Movement