An Activity-Based Model for Separation of Duty
An Adaptive Technique using Advanced Encryption Standard to Implement Hard Disk Security
An Agent-Based Intrusion Detection System for Local Area Networks
An Algebraic Characterization of Security of Cryptographic Protocols
An Algorithm for Computing $m$-Tight Error Linear Complexity of Sequences over $GF(p^{m})$ with Period $p^{m}$
An Algorithm for Detection of Selfish Nodes in Wireless Mesh Networks
An algorithm for the k-error linear complexity of a sequence with period 2pn over GF(q)
An Analysis of Chinese Search Engine Filtering
An Analysis of Routing Disruption Attack on Dynamic Source Routing Protocol
An Anonymous Authentication and Communication Protocol for Wireless Mesh Networks
An Approach for Message Hiding using Substitution Techniques and Audio Hiding in Steganography
An approach to secure highly confidential documents of any size in the corporate or institutes having unsecured networks
An Asymmetric Fingerprinting Scheme based on Tardos Codes
An Asymptotically Optimal RFID Authentication Protocol Against Relay Attacks
An attack on MySQL's login protocol
An Attack on Privacy Preserving Data Aggregation Protocol for Wireless Sensor Networks
An Audit Logic for Accountability
An Automated Analysis of the Security of Quantum Key Distribution
An Efficient Algorithm for Detection of Selfish Packet Dropping Nodes in Wireless Mesh Networks
An Efficient Analytical Solution to Thwart DDoS Attacks in Public Domain