Confidentiality, Integrity and High Availability with Open Source IT green
Confirmation of Shannon's Mistake about Perfect Secrecy of One-time-pad
Consideration Points Detecting Cross-Site Scripting
Constrained Role Mining
Constructing and Counting Even-Variable Symmetric Boolean Functions with Algebraic Immunity not Less Than $d$
Constructing Optimal Authentication Codes with Perfect Multi-fold Secrecy
Constructing Perfect Steganographic Systems
Construction and Count of Boolean Functions of an Odd Number of Variables with Maximum Algebraic Immunity
Content Based Image Retrieval with Mobile Agents and Steganography
Content based Zero-Watermarking Algorithm for Authentication of Text Documents
Context Protecting Privacy Preservation in Ubiquitous Computing
Context-aware Authorization in Highly Dynamic Environments
Continued fractions and RSA with small secret exponent
Convergence of Corporate and Information Security
Cooperative Defense against Pollution Attacks in Network Coding Using SpaceMac
Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels
Correlated Node Behavior Model based on Semi Markov Process for MANETS
Countering Gattaca: Efficient and Secure Testing of Fully-Sequenced Human Genomes (Full Version)
Countering Trusting Trust through Diverse Double-Compiling
Covert channel detection using Information Theory