An Efficient and Publicly Verifiable Id-Based Multi-Signcryption Scheme
An Efficient and User Privacy-Preserving Routing Protocol for Wireless Mesh Networks
An efficient certificateless authenticated key agreement protocol without bilinear pairings
An Efficient Cryptographic Hash Algorithm (BSA)
An Efficient Dynamic and Distributed RSA Accumulator
An efficient multi-use multi-secret sharing scheme based on hash function
An Efficient PKC-Based Security Architecture for Wireless Sensor Networks
An Efficient Scheme for Sensitive Message Transmission using Blind Signcryption
An Efficient Security Mechanism for High-Integrity Wireless Sensor Networks
An Efficient Security Mechanism for High-Integrity Wireless Sensor Networks
An Elliptic Curve-based Signcryption Scheme with Forward Secrecy
An Empirical Study of Spam and Prevention Mechanisms in Online Video Chat Services
An Empirical Study of Spam and Spam Vulnerable email Accounts
An ensemble approach for feature selection of Cyber Attack Dataset
An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols
An equivalence preserving transformation from the Fibonacci to the Galois NLFSRs
An Evaluated Certification Services System for the German National Root CA - Legally Binding and Trustworthy Transactions in E-Business and E-Government
An Experimental Investigation of Secure Communication With Chaos Masking
An Extension for Combination of Duty Constraints in Role-Based Access Control
An Identity Based Key Management Scheme in Wireless Sensor Networks