A New Scheme for Minimizing Malicious Behavior of Mobile Nodes in Mobile Ad Hoc Networks
A New Secret key Agreement Scheme in a Four-Terminal Network
A New Stream Cipher: Dicing
A New Technique for Text Data Compression
A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security
A New Type of Cipher
A New Type of Cipher: DICING_csb
A new zero-knowledge code based identification scheme with reduced communication
A Noise Addition Scheme in Decision Tree for Privacy Preserving Data Mining
A Note on "On the Construction of Boolean Functions with Optimal Algebraic Immunity"
A note on conjugacy search and racks
A Note on Differential Privacy: Defining Resistance to Arbitrary Side Information
A Note On the Bounds for the Generalized Fibonacci-p-Sequence and its Application in Data-Hiding
A Note on the Periodicity and the Output Rate of Bit Search Type Generators
A note on using finite non-abelian $p$-groups in the MOR cryptosystem
A Novel and Efficient Bilateral Remote User Authentication Scheme Using Smart Cards
A Novel Approach for Authenticating Textual or Graphical Passwords Using Hopfield Neural Network
A novel approach for implementing Steganography with computing power obtained by combining Cuda and Matlab
A Novel Approach For Intranet Mailing For Providing User Authentication
A Novel Approach for Pass Word Authentication using Brain -State -In -A Box (BSB) Model