Anonymity and Information Hiding in Multiagent Systems
Anonymity and verifiability in multi-attribute reverse auction
Anonymity in the Wild: Mixes on unstructured networks
Anonymous Oblivious Transfer
Another Co*cryption Method
Anti-Collusion Digital Fingerprinting Codes via Partially Cover-Free Families
ANTIDS: Self-Organized Ant-based Clustering Model for Intrusion Detection System
Aperiodic logarithmic signatures
APHRODITE: an Anomaly-based Architecture for False Positive Reduction
Application of Steganography for Anonymity through the Internet
Applying Data Privacy Techniques on Tabular Data in Uganda
Applying statistical methods to text steganography
Approaches to Formal Verification of Security Protocols
Approximate Privacy: Foundations and Quantification
Approximate Privacy: PARs for Set Problems
ARBAC Policy for a Large Multi-National Bank
Architecture Of A Identity Based Firewall System
Area Efficient Hardware Implementation of Elliptic Curve Cryptography by Iteratively Applying Karatsuba's Method
ARQ Security in Wi-Fi and RFID Networks
Array Based Java Source Code Obfuscation Using Classes with Restructured Arrays