Deterministic Secure Positioning in Wireless Sensor Networks
Development of a Window Based Security System for Electronic Data Interchange
Development of mechanism for enhancing data security in quantum cryptography
Differential Fault Analysis on A.E.S
Differential Privacy: on the trade-off between Utility and Information Leakage
Differential properties of functions x -> x^{2^t-1} -- extended version
Digital Forensics Analysis of Spectral Estimation Methods
Digital Signal Transmission with Chaotic Encryption: Design and Evaluation of a FPGA Realization
Direct Sequence Spread Spectrum Steganographic Scheme for IEEE 802.15.4
Disabling equational theories in unification for cryptographic protocol analysis through tagging
Discovery of Elliptic Curve Cryptographic Private Key in O(n)
Discrete logarithms in curves over finite fields
Distributed Denial of Service (DDoS) Attacks Detection Mechanism
Distributed Double Spending Prevention
Distributed Private Data Analysis: On Simultaneously Solving How and What
Double Blind Comparisons using Groups with Infeasible Inversion
Double Blind Comparisons: A New Approach to the Database Aggregation Problem
Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet
DREAM: DiffeRentially privatE smArt Metering
Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detection in ISP Network