Handling Confidential Data on the Untrusted Cloud: An Agent-based Approach
Handsets Malware Threats and Facing Techniques
Handwritten Text Image Authentication using Back Propagation
Hard Fault Analysis of Trivium
Hardware Engines for Bus Encryption: A Survey of Existing Techniques
Hardware Implementation of TDES Crypto System with On Chip Verification in FPGA
Harvesting SSL Certificate Data to Identify Web-Fraud
Hash function based on arithmetic coding and public-key cryptography
Hash function based secret sharing scheme designs
Heuristic Methods for Security Protocols
HF-hash : Hash Functions Using Restricted HFE Challenge-1
Hidden Polynomial(s) Cryptosystems
Hidden Polynomial(s) Cryptosystems
Hidden-Markov Program Algebra with iteration
Hiding Data in OFDM Symbols of IEEE 802.11 Networks
Hiding Information in a Stream Control Transmission Protocol
Hiding Information in Retransmissions
Hiding Inside HTML and Other Source Codes
Hiding Malicious Content in PDF Documents
Hierarchical Grid-Based Pairwise Key Pre-distribution in Wireless Sensor Networks