Combinatorial Bounds and Characterizations of Splitting Authentication Codes
Comment - Practical Data Protection
Comment on A dynamic ID-based Remote User Authentication Scheme
Comments on "Improved Efficient Remote User Authentication Schemes"
Commitment Capacity of Discrete Memoryless Channels
Common Representation of Information Flows for Dynamic Coalitions
Communication and Round Efficient Information Checking Protocol
Communication Complexity and Secure Function Evaluation
Commutative-like Encryption: A New Characterization of ElGamal
Comparing BB84 and Authentication-Aided Kak's Three-Stage Quantum Protocol
Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)
CompChall: Addressing Password Guessing Attacks
Complete Security Framework for Wireless Sensor Networks
Compliance of POLYAS with the Common Criteria Protection Profile
Comprehensive Security Framework for Global Threads Analysis
Computational Complexities and Breaches in Authentication Frameworks of Broadband Wireless Access
Computational Security Analysis of the UMTS and LTE Authentication and Key Agreement Protocols
Computing the biases of parity-check relations
Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model
Confidentiality & Authentication Mechanism for Biometric Information Transmitted over Low Bandwidth & Unreliable channel