PadSteg: Introducing Inter-Protocol Steganography
Pairing-based identification schemes
PAKE-based mutual HTTP authentication for preventing phishing attacks
Pan-private Algorithms: When Memory Does Not Help
Participatory Privacy: Enabling Privacy in Participatory Sensing
Passive Cryptanalysis of Unconditionally Secure Authentication Protocol for RFID Systems
Password Authentication Scheme with Secured Login Interface
Password Based a Generalize Robust Security System Design Using Neural Network
Path O-RAM: An Extremely Simple Oblivious RAM Protocol
Pathwords: a user-friendly schema for common passwords management
Peer to Peer Networks for Defense Against Internet Worms
Peer-to-Peer Secure Multi-Party Numerical Computation
Peer-to-Peer Secure Multi-Party Numerical Computation Facing Malicious Adversaries
Perfectly Secure Message Transmission Revisited
Performance Analysis of a Keyed Hash Function based on Discrete and Chaotic Proven Iterations
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator
Performance Considerations for an Embedded Implementation of OMA DRM 2
Performance Evaluation of Mesh based Multicast Reactive Routing Protocol under Black Hole Attack
Performance Evaluation of Security Protocols
Performance of the Fuzzy Vault for Multiple Fingerprints (Extended Version)