Non Abelian Bent Functions
Non-Archimedean analysis, T-functions, and cryptography
Non-blind watermarking of network flows
Non-Boolean almost perfect nonlinear functions on non-Abelian groups
Non-Malleable Codes from the Wire-Tap Channel
Non-Malleable Extractors, Two-Source Extractors and Privacy Amplification
Non-Repudiation in Internet Telephony
Nonadaptive Mastermind Algorithms for String and Vector Databases, with Case Studies
NoSEBrEaK - Attacking Honeynets
Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques
Novel hybrid intrusion detection system for clustered wireless sensor network
Novel Mechanism to Defend DDoS Attacks Caused by Spam
NP-completeness of Certain Sub-classes of the Syndrome Decoding Problem
NVision-PA: A Tool for Visual Analysis of Command Behavior Based on Process Accounting Logs (with a Case Study in HPC Cluster Security)