Cs-Cr
A Trust Domains Taxonomy for Securely Sharing Information: A Preliminary Investigation
Secure SAML validation to prevent XML signature wrapping attacks
Middle-Solving Grobner bases algorithm for cryptanalysis over finite fields
Improving Hard Disk Contention-based Covert Channel in Cloud Computing Environment
Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors
Android Anti-forensics: Modifying CyanogenMod
Hiding Sound in Image by K-LSB Mutation
Science of Cyber Security as a System of Models and Problems
On the Privacy of Optimization Approaches
Innovative Method for enhancing Key generation and management in the AES-algorithm
Comprehensive Efficient Implementations of ECC on C54xx Family of Low-cost Digital Signal Processors
Breaking a novel image encryption scheme based on improved hyperchaotic sequences
Cybernetic modeling of Industrial Control Systems: Towards threat analysis of critical infrastructure
Modified Apriori Approach for Evade Network Intrusion Detection System
Efficient Key Generation for Dynamic Bloms Scheme
Algorithm for Solving Massively Underdefined Systems of Multivariate Quadratic Equations over Finite Fields
Feedback based Reputation on top of the Bitcoin Blockchain
The Secure Generation of RSA Moduli Using Poor RNG
Testing Security Policies for Distributed Systems: Vehicular Networks as a Case Study
Cryptanalysis of a New Knapsack Type Public-Key Cryptosystem
Big Data: Opportunities and Privacy Challenges
Evaluation of Enhanced Security Solutions in 802.11-Based Networks