NC-Audit: Auditing for Network Coding Storage
Negative Databases for Biometric Data
Network attack detection at flow level
Network Coding Security: Attacks and Countermeasures
New approach for network monitoring and intrusion detection
New Comparative Study Between DES, 3DES and AES within Nine Factors
New Covert Channels in HTTP
New Extensions of Pairing-based Signatures into Universal (Multi) Designated Verifier Signatures
New families of cryptographic systems
New Frontiers of Network Security: The Threat Within
New ID Based Multi-Proxy Multi-Signcryption Scheme from Pairings
New Lattice Based Cryptographic Constructions
New Multi-step Worm Attack Model
New Results on Scrambling Using the Mesh Array
New security and control protocol for VoIP based on steganography and digital watermarking
New System for Secure Cover File of Hidden Data in the Image Page within Executable File Using Statistical Steganography Techniques
New Visual Cryptography Algorithm For Colored Image
NgViz: Detecting DNS Tunnels through N-Gram Visualization and Quantitative Analysis
NLHB : A Non-Linear Hopper Blum Protocol
NNRU, a noncommutative analogue of NTRU