Cs-Cr
Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network
A Novel Approach for Handling Misbehaving Nodes in Behavior-Aware Mobile Networking
Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks
On the Parameterized Complexity and Kernelization of the Workflow Satisfiability Problem
Tracing the Man in the Middle in Monoidal Categories
Anonymous Communication in Peer-to-Peer Networks for providing more Privacy and Security
Analisis Keamanan Protokol Secure Socket Layer (SSL) Terhadap Proses Sniffing di Jaringan
Dpush: A scalable decentralized spam resistant unsolicited messaging protocol
Security Analysis of Secure Force Algorithm for Wireless Sensor Networks
An Open Source P2P Encrypted VoIP Application
Coding Side-Information for Implementing Cubic Transformation
Development of an Ontology Based Forensic Search Mechanism: Proof of Concept
Protection de la vie privee `a base dagents dans un syst`eme de-learning
A Review of Technical Problems when Conducting an Investigation in Cloud Based Environments
Survey of Strong Authentication Approaches for Mobile Proximity and Remote Wallet Applications - Challenges and Evolution
Turning Bitcoins into the Best-coins
Understanding Information Hiding in iOS
A New Result on the Random Residue Sequence Algorithm
Increasing Randomness Using Permutations on Blocks
Analysis of Security Threats in Wireless Sensor Network
Cryptanalysis of a one round chaos-based Substitution Permutation Network
Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey