Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding
Evaluating the Utility of Anonymized Network Traces for Intrusion Detection
Evaluating Trust in Grid Certificates
Evaluation of Anonymized ONS Queries
Evolution of Computer Virus Concealment and Anti-Virus Techniques: A Short Survey
Evolutionary Computation Algorithms for Cryptanalysis: A Study
Exact, Efficient and Information-Theoretically Secure Voting with an Arbitrary Number of Cheaters
Exception Agent Detection System for IP Spoofing Over Online Environments
Exchanging Secrets without Using Cryptography
Expected loss analysis of thresholded authentication protocols in noisy conditions
Experimenting with the Novel Approaches in Text Steganography
Explicit formulas for efficient multiplication in F_{3^{6m}}
Explicit Randomness is not Necessary when Modeling Probabilistic Encryption
Exploring Linkablility of Community Reviewing
Expressing Security Properties Using Selective Interleaving Functions
Extended Combinatorial Constructions for Peer-to-peer User-Private Information Retrieva
Extending Firewall Session Table to Accelerate NAT, QoS Classification and Routing
Extending the Trusted Path in Client-Server Interaction
Extending WS-Security to Implement Security Protocols for Web Services
Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution