On secret sharing for graphs
On Secure Distributed Implementations of Dynamic Access Control
On Secure Workflow Decentralisation on the Internet
On Steganography in Lost Audio Packets
On the AAGL Protocol
On the Analysis and Generalization of Extended Visual Cryptography Schemes
On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks
On the Boundaries of Trust and Security in Computing and Communications Systems
On The Cost Distribution of a Memory Bound Function
On the cryptanalysis of the generalized simultaneous conjugacy search problem and the security of the Algebraic Eraser
On the Decidability of Non Interference over Unbounded Petri Nets
On the defence notion
On the deployment of Mobile Trusted Modules
On the design of a family of CI pseudo-random number generators
On the Duality of Probing and Fault Attacks
On the Eavesdropper's Correct Decision in Gaussian and Fading Wiretap Channels Using Lattice Codes
On the Efficiency of Fast RSA Variants in Modern Mobile Phones
On the gradual deployment of random pairwise key distribution schemes (Extended Version)
On the graph coloring check-digit scheme with applications to verifiable secret sharing
On the impossibility of non-static quantum bit commitment between two parties