A New Approach to Practical Active-Secure Two-Party Computation
A new authentication protocol for revocable anonymity in ad-hoc networks
A New Bound on the Performance of the Bandwidth Puzzle
A New Cryptosystem Based On Hidden Order Groups
A new efficient k-out-of-n Oblivious Transfer protocol
A New Efficient Key Management Protocol for Wireless Sensor and Actor Networks
A New Enforcement on Declassification with Reachability Analysis
A New Family of Practical Non-Malleable Diffie-Hellman Protocols
A New Fuzzy MCDM Framework to Evaluate E-Government Security Strategy
A New Generic Taxonomy on Hybrid Malware Detection Technique
A New Guess-and-Determine Attack on the A5/1
A new key establishment scheme for wireless sensor networks
A new key exchange cryptosystem
A New Key-Agreement-Protocol
A New Look at Composition of Authenticated Byzantine Generals
A New Non Linear, Time Stamped & Feed Back Model Based Encryption Mechanism with Acknowledgement Support
A new Protocol for 1-2 Oblivious Transfer
A new protocol implementing authentication transformations for multi-located parties
A New Proxy Ring Signature Scheme
A New Remote User Authentication Scheme Using Smart Cards with Check Digits