Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments
Enhanced Authentication and Locality Aided - Destination Mobility in Dynamic Routing Protocol for MANET
Enhanced Secure Algorithm for Message Communion
Enhanced User Authentication through Trajectory Clustering
Enhancement of Secrecy of Block Ciphered Systems by Deliberate Noise
Enhancements to A Lightweight RFID Authentication Protocol
Enhancing Data Security by Making Data Disappear in a P2P Systems
Enhancing Privacy for Biometric Identification Cards
Ensuring message embedding in wet paper steganography
EphPub: Toward Robust Ephemeral Publishing
EPS Confidentiality and Integrity mechanisms Algorithmic Approach
Equivalence of the Random Oracle Model and the Ideal Cipher Model, Revisited
Ermittlung von Verwundbarkeiten mit elektronischen Koedern
Error Detection and Correction for Distributed Group Key Agreement Protocol
EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity
Estimating strength of DDoS attack using various regression models
Estimation of the Embedding Capacity in Pixel-pair based Watermarking Schemes
Estimators in Cryptography
Ethemba Trusted Host EnvironmentMainly Based on Attestation
Evading network-level emulation