M-Banking Security - a futuristic improved security approach
Making Hand Geometry Verification System More Accurate Using Time Series Representation with R-K Band Learning
Making Palm Print Matching Mobile
Making Random Choices Invisible to the Scheduler
Malicious cryptography techniques for unreversable (malicious or not) binaries
Malware Classification based on Call Graph Clustering
Malware Detection using Attribute-Automata to parse Abstract Behavioral Descriptions
Managing Delegation in Access Control Models
Managing key multicasting through orthogonal systems
Mathematical and Statistical Opportunities in Cyber Security
Matrix powers algorithms for trust evaluation in PKI architectures
Maximizing Strength of Digital Watermarks using Fuzzy Logic
MDS Ideal Secret Sharing Scheme from AG-codes on Elliptic Curves
Measuring Password Strength: An Empirical Analysis
Message Detection and Extraction of Chaotic Optical Communication Using Time-Frequency Analysis
Metamorphic Virus Detection in Portable Executables Using Opcodes Statistical Feature
Metamorphic Virus Variants Classification Using Opcode Frequency Histogram
MIMO-Assisted Channel-Based Authentication in Wireless Networks
Min-Sum algorithm for lattices constructed by Construction D
Minimizing Cache Timing Attack Using Dynamic Cache Flushing (DCF) Algorithm