"On the Road" - Reflections on the Security of Vehicular Communication Systems
"Reminder: please update your details": Phishing Trends
#h00t: Censorship Resistant Microblogging
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
22-Step Collisions for SHA-2
9-variable Boolean Functions with Nonlinearity 242 in the Generalized Rotation Class
A 3D RGB Axis-based Color-oriented Cryptography
A Basic Framework for the Cryptanalysis of Digital Chaos-Based Cryptography
A Block Cipher using Rotation and Logical XOR Operations
A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements
A chaos-based approach for information hiding security
A Chaotic Cipher Mmohocc and Its Randomness Evaluation
A Chaotic Cipher Mmohocc and Its Security Analysis
A Clustering-based Location Privacy Protection Scheme for Pervasive Computing
A Comparison between Memetic algorithm and Genetic algorithm for the cryptanalysis of Simplified Data Encryption Standard algorithm
A Comparison of Cryptography Courses
A Comparison of Link Layer Attacks on Wireless Sensor Networks
A Comparison of Secret Sharing Schemes Based on Latin Squares and RSA
A Comparison of Trojan Virus Behavior in Linux and Windows Operating Systems
A Complexity Approach for Steganalysis