Checking Security Policy Compliance
Choreographies with Secure Boxes and Compromised Principals
Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher
Ciphertext Policy Attribute based Encryption with anonymous access policy
Class of Trustworthy Pseudo-Random Number Generators
Classical Authentication Aided Three-Stage Quantum Protocol
Classical Knowledge for Quantum Security
Classification and Evaluation the Privacy Preserving Data Mining Techniques by using a Data Modification-based Framework
Client-Server Password Recovery (Extended Abstract)
Cloud Computing Security in Business Information Systems
Cluster based Key Management in Wireless Sensor Networks
CNoA: Challenging Number Approach for uncovering TCP SYN flooding using SYN spoofing attack
Coarse-grained Dynamic Taint Analysis for Defeating Control and Non-control Data Attacks
Code Attestation with Compressed Instruction Code
Code injection attacks on harvard-architecture devices
Code Reverse Engineering problem for Identification Codes
Coding for Cryptographic Security Enhancement using Stopping Sets
Collaborative Trust: A Novel Paradigm of Trusted Mobile Computing
Collision-resistant hash function based on composition of functions
Combating False Reports for Secure Networked Control in Smart Grid via Trustiness Evaluation