Efficient Identity Based Public Verifiable Signcryption Scheme
Efficient Implementation of Elliptic Curve Cryptography Using Low-power Digital Signal Processor
Efficient linear feedback shift registers with maximal period
Efficient methodology for implementation of Encrypted File System in User Space
Efficient Password-Typed Key Agreement Scheme
Efficient Privacy-Preserving Authentication Protocol for Vehicular Communications with Trustworthy
Efficient Steganography with Provable Security Guarantees
Efficient, Differentially Private Point Estimators
Electronic Authority Variation
Elliptic Curve Based Zero Knowledge Proofs and Their Applicability on Resource Constrained Devices
Embedding Secret Data in HTML Web Page
Employing Trusted Computing for the forward pricing of pseudonyms in reputation systems
Encipher of information on the basis of geometrical presentations
Encoding a Taxonomy of Web Attacks with Different-Length Vectors
Encoding points on hyperelliptic curves over finite fields in deterministic polynomial time
Encryption of Binary and Non-Binary Data Using Chained Hadamard Transforms
Encryption of Data using Elliptic Curve over Finite fields
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images
Encryption Schemes using Finite Frames and Hadamard Arrays
Energy Efficient Security Architecture for Wireless BioMedical Sensor Networks