ACRR: Ad Hoc On-Demand Distance Vector Routing with Controlled Route Requests
Actor-network procedures: Modeling multi-factor authentication, device pairing, social interactions
Adaptation of the neural network-based IDS to new attacks detection
Adding Query Privacy to Robust DHTs
Advanced exploitation of buffer overflow
Advanced Software Protection Now
Advanced Trace Pattern For Computer Intrusion Discovery
AES Encryption and Decryption Using Direct3D 10 API
AES Implementation and Performance Evaluation on 8-bit Microcontrollers
Aggregating and Deploying Network Access Control Policies
Algebraic Attack on the Alternating Step(r,s)Generator
Algebraic Watchdog: Mitigating Misbehavior in Wireless Network Coding
Algorithmic Permutation of part of the Torah
Algorithmic Self-Assembly of DNA Tiles and its Application to Cryptanalysis
Algorithms and Approaches of Proxy Signature: A Survey
Alice Meets Bob: A Comparative Usability Study of Wireless Device Pairing Methods for a "Two-User" Setting
Alternative security architecture for IP Telephony based on digital watermarking
An $L (1/3 + ε)$ Algorithm for the Discrete Logarithm Problem for Low Degree Curves
An $L (1/3)$ Discrete Logarithm Algorithm for Low Degree Curves
An Active Defense Mechanism for TCP SYN flooding attacks