Artificial Immune Privileged Sites as an Enhancement to Immuno-Computing Paradigm
Aryabhata's Mathematics
Aspects of Nonabelian Group Based Cryptography: A Survey and Open Problems
Asymptotic fingerprinting capacity for non-binary alphabets
Asymptotically false-positive-maximizing attack on non-binary Tardos codes
Atomicity Improvement for Elliptic Curve Scalar Multiplication
Attack Interference in Non-Collaborative Scenarios for Security Protocol Analysis [Extended Version]
Attack on Fully Homomorphic Encryption over the Integers
Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks
Attack--Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent - Technical Report with Proofs
Attacking an OT-Based Blind Signature Scheme
Attacking the combination generator
Attacks on Local Searching Tools
Attaque algebrique de NTRU a l'aide des vecteurs de Witt
Attribute Weighting with Adaptive NBTree for Reducing False Positives in Intrusion Detection
Attrition Defenses for a Peer-to-Peer Digital Preservation System
Audio Watermarking with Error Correction
Augmented Rotation-Based Transformation for Privacy-Preserving Data Clustering
Autenticazione biometrica: Realtà e fantasia
Authenticated Append-only Skip Lists