Darknet-Based Inference of Internet Worm Temporal Characteristics
Darwin inside the machines: Malware evolution and the consequences for computer security
Data Aggregation and Privacy for Police Patrols
Data Confidentiality in Mobile Ad hoc Networks
Data Group Anonymity: General Approach
Data Hiding Techniques Using Prime and Natural Numbers
Data Reduction in Intrusion Alert Correlation
Data Security Equals Graph Connectivity
Data security in mobile devices by geo locking
Data Tastes Better Seasoned: Introducing the ASH Family of Hashing Algorithms
DDNFS: a Distributed Digital Notary File System
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
De-anonymizing Social Networks
Dealing With Curious Players in Secure Networks
Debunking some myths about biometric authentication
DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks
Declarative Reconfigurable Trust Management
Decoding square-free Goppa codes over $\F_p$
Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface
Deducing Security Goals From Shape Analysis Sentences