LACK - a VoIP Steganographic Method
Lattice Problems and Their Reductions(Russian)
Law-Aware Access Control and its Information Model
Learning by Test-infecting Symmetric Ciphers
Length-Based Attacks for Certain Group Based Encryption Rewriting Systems
Length-based cryptanalysis: The case of Thompson's Group
Lessons Learned from the deployment of a high-interaction honeypot
Lightweight Distance bound Protocol for Low Cost RFID Tags
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags
Lightweight Security for Network Coding
Lightweight security mechanism for PSTN-VoIP cooperation
Likelihood that a pseudorandom sequence generator has optimal properties
Linear Relation on General Ergodic T-Function
Linear Secret Sharing from Algebraic-Geometric Codes
Link Prediction by De-anonymization: How We Won the Kaggle Social Network Challenge
Little Dragon Two: An efficient Multivariate Public Key Cryptosystem
Location- and Time-Dependent VPD for Privacy-Preserving Wireless Accesses to Cloud Services
Log Analysis Case Study Using LoGS
Lost Audio Packets Steganography: The First Practical Evaluation
Lower Bounds for Zero-knowledge on the Internet