An Identity Based Strong Bi-Designated Verifier (t, n) Threshold Proxy Signature Scheme
An Implementation of Intrusion Detection System Using Genetic Algorithm
An Improved Efficient Key Distribution Mechanism for Large-Scale Heterogeneous Mobile Sensor Networks
An Improved FPGA Implementation of the Modified Hybrid Hiding Encryption Algorithm (MHHEA) for Data Communication Security
An Improved Implementation of Grain
An Improved Remote User Authentication Scheme Using Smart Cards
An Improved Robust Fuzzy Extractor
An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards
An Improvement of RC4 Cipher Using Vigenere Cipher
An In-depth Analysis of Spam and Spammers
An Independent Validation of Vulnerability Discovery Models
An Information-Theoretic Analysis of the Security of Communication Systems Employing the Encoding-Encryption Paradigm
An Information-Theoretical View of Network-Aware Malware Attacks
An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks
An ISP Level Solution to Combat DDoS Attacks using Combined Statistical Based Approach
An L(1/3) algorithm for ideal class group and regulator computation in certain number fields
An LSB Data Hiding Technique Using Natural Numbers
An LSB Data Hiding Technique Using Prime Numbers
An online algorithm for generating fractal hash chains applied to digital chains of custody
An Overview of the Security Concerns in Enterprise Cloud Computing