Baptista-type chaotic cryptosystems: Problems and countermeasures
Base Encryption: Dynamic algorithms, Keys, and Symbol Set
Base Selection and Transmission Synchronization Algorithm in Quantum Cryptography
Bayesian Based Comment Spam Defending Tool
Benaloh's Dense Probabilistic Encryption Revisited
Benchmarking the True Random Number Generator of TPM Chips
Best Effort and Practice Activation Codes
Beyond the Blacklist: Modeling Malware Spread and the Effect of Interventions
Bi-serial DNA Encryption Algorithm(BDEA)
Binary Random Sequences Obtained From Decimal Sequences
Binomial multichannel algorithm
Bio-Authentication based Secure Transmission System using Steganography
Biologically Inspired Execution Framework for Vulnerable Workflow Systems
Birthday attack to discrete logarithm
Blocking Underhand Attacks by Hidden Coalitions (Extended Version)
Bootstrapped Oblivious Transfer and Secure Two-Party Function Computation
Bootstrapping Key Pre-Distribution: Secure, Scalable and User-Friendly Initialization of Sensor Nodes
BotMosaic: Collaborative Network Watermark for Botnet Detection
Botnet Detection by Monitoring Similar Communication Patterns
Bounds for Visual Cryptography Schemes