E-net models for distribution, access and use of resources in security information systems
E-Net Models of a Software System for E-Mail Security
E-Net Models of a Software System for Web Pages Security SECURITY
Early Phishing
Eavesdropping on GSM: state-of-affairs
ECAKP: Encrypt Collect Authenticate Kill Play
Effective Privacy Amplification for Secure Classical Communications
Effective Steganography Detection Based On Data Compression
Effectiveness and detection of denial of service attacks in Tor
Effectiveness of Intrusion Prevention Systems (IPS) in Fast Networks
Efficiency of Biometric integration with Salt Value at an Enterprise Level and Data Centres
Efficient and Cryptographically Secure Generation of Chaotic Pseudorandom Numbers on GPU
Efficient and Dynamic Group Key Agreement in Ad hoc Networks
Efficient and Robust Secure Aggregation for Sensor Networks
Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications
Efficient Authenticated Data Structures for Graph Connectivity and Geometric Search Problems
Efficient Authenticated Encryption Schemes with Public Verifiability
Efficient Defence against Misbehaving TCP Receiver DoS Attacks
Efficient Detection of Sybil Attack Based on Cryptography in Vanet
Efficient FPGA-based multipliers for F_{3^97} and F_{3^{6*97}}