Performance Study on Image Encryption Schemes
Period of the d-Sequence Based Random Number Generator
Periodic sequences with stable $k$-error linear complexity
Permutation graphs, fast forward permutations, and sampling the cycle structure of a permutation
PERSEUS Technology: New Trends in Information and Communication Security
Persistent Asymmetric Password-Based Key Exchange
Personal data disclosure and data breaches: the customer's viewpoint
Personal Marks and Community Certificates: Detecting Clones in Mobile Wireless Networks of Smart-Phones
Philosophical Survey of Passwords
PhishDef: URL Names Say It All
Phishing - A Growing Threat to E-Commerce
Physical Unclonable Function (PUF) Based Random Number Generator
Physical-Layer Security over Correlated Erasure Channels
Pipelined Algorithms to Detect Cheating in Long-Term Grid Computations
PKI Implementation Issues: A Comparative Study of Pakistan with some Asian Countries
PKI Scalability Issues
Planning for Directory Services in Public Key Infrastructures
Platform-Independent Firewall Policy Representation
Plug-in privacy for Smart Metering billing
Plugging Side-Channel Leaks with Timing Information Flow Control