On the Performance Evaluation of Encounter-based Worm Interactions Based on Node Characteristics
On the Privacy of Two Tag Ownership Transfer Protocols for RFIDs
On the Protocol Composition Logic PCL
On the provable security of BEAR and LION schemes
On the Rabin signature
On the Relations Between Diffie-Hellman and ID-Based Key Agreement from Pairings
On the Relationship between Strand Spaces and Multi-Agent Systems
On the security of an enhanced short signature scheme
On the Security of Liaw et al.'s Scheme
On the security of new key exchange protocols based on the triple decomposition problem
On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack
On the Security of the Cha-Ko-Lee-Han-Cheon Braid Group Public Key Cryptosystem
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)
On the Security of the Yi-Tan-Siew Chaos-Based Cipher
On the Security of ``an efficient and complete remote user authentication scheme''
On the Semantics of Purpose Requirements in Privacy Policies
On the Unicity Distance of Stego Key
On the Use of Cellular Automata in Symmetric Cryptography
On Unconditionally Secure Computation with Vanishing Communication Cost
On Vulnerabilities, Constraints and Assumptions