Multi-Use Unidirectional Proxy Re-Signatures
Multidimensional Network Monitoring for Intrusion Detection
Multilayer Approach to Defend Phishing Attacks
Multilevel Image Encryption
Multipartite Secret Correlations and Bound Information
Multiparty computation unconditionally secure against Q^2 adversary structures
MV2-algorithm's clones
MV3: A new word based stream cipher using rapid mixing and revolving buffers