Gaming security by obscurity
GB-hash : Hash Functions Using Groebner Basis
Gbits/s physical-layer stream ciphers based on chaotic light
GDB: Group Distance Bounding Protocols
General Hardness Amplification of Predicates and Puzzles
Generalized Discriminant Analysis algorithm for feature reduction in Cyber Attack Detection System
Generalized Maiorana-McFarland Constructions for Almost Optimal Resilient Functions
Generalized partially bent functions
Generic Unpacking of Self-modifying, Aggressive, Packed Binary Programs
Genetic Programming Framework for Fingerprint Matching
Global Heuristic Search on Encrypted Data (GHSED)
GNSS-based positioning: Attacks and Countermeasures
Google Android: A State-of-the-Art Review of Security Mechanisms
GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries
Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing
Governing Information Security in Conjunction with COBIT and ISO 27001
GPRS Video Streaming Surveillance System GVSS
Grid Security and Integration with Minimal Performance Degradation
Group Anonymity
Group Anonymity: Problems and Solutions