Cs-Cr
A bias-free quantum random number generation using photon arrival time selectively
VHDL Modeling of Intrusion Detection & Prevention System (IDPS) A Neural Network Approach
Referencing Tool for Reputation and Trust in Wireless Sensor Networks
You Only Live Twice or "The Years We Wasted Caring about Shoulder-Surfing"
A Novel Technique for Secret Message / Image Transmission through (2, 2)Visual Cryptographic Protocol (SMITVCP)
CloudMine: Multi-Party Privacy-Preserving Data Analytics Service
Distributed Denial of Service (DDoS) Attacks Detection Mechanism
A Heuristic Reputation Based System to Detect Spam activities in a Social Networking Platform, HRSSSNP
Fast Subsequent Color Iris Matching in large Database
Path ORAM: An Extremely Simple Oblivious RAM Protocol
An Efficient Analytical Solution to Thwart DDoS Attacks in Public Domain
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage
Securing Instrumented Environments over Content-Centric Networking: the Case of Lighting Control
Efficient Quasigroup Block Cipher for Sensor Networks
Algorithm for searching bridges of specified types in the protection graph for Take-Grant protection model
Functional Programming and Security
An efficient classification in IBE Provide with an improvement of BB2 to an efficient Commutative Blinding scheme
Preserving privacy for secure and outsourcing for Linear Programming in cloud computing
Quantitative Information Flow as Safety and Liveness Hyperproperties
Risk Assessment Algorithm in Wireless Sensor Networks using Beta Distribution
Metric-Aware Secure Service Orchestration
IPv6 Prefix Alteration: An Opportunity to Improve Online Privacy