A Survey on Security Issues in Cloud Computing
A Survey on Wireless Sensor Network Security
A Symbolic Intruder Model for Hash-Collision Attacks
A Tiered Security System for Mobile Devices
A topological chaos framework for hash functions
A Trace Based Bisimulation for the Spi Calculus
A Trace Logic for Local Security Properties
A Trust Based Cross Layer Security Protocol for Mobile Ad hoc Networks
A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes in a Peer-to-Peer Wireless Mesh Network
A Type System for Data-Flow Integrity on Windows Vista
A User Model for Information Erasure
A Verifiable Partial Key Escrow, Based on McCurley Encryption Scheme
A watermarking algorithm satisfying topological chaos properties
A Weakest Chain Approach to Assessing the Overall Effectiveness of the 802.11 Wireless Network Security
A Wide range Survey on Recall Based Graphical User Authentications Algorithms Based on ISO and Attack Patterns
A Workflow for Differentially-Private Graph Synthesis
Abstract Certification of Global Non-Interference in Rewriting Logic
Access Control for Hierarchical Joint-Tenancy
Accountable Anonymous Group Messaging
Achieving Both Valid and Secure Logistic Regression Analysis on Aggregated Data from Different Private Sources