Poseidon: a 2-tier Anomaly-based Intrusion Detection System
Power-Efficient Direct-Voting Assurance for Data Fusion in Wireless Sensor Networks
Practical Attacks on a RFID Authentication Protocol Conforming to EPC C-1 G-2 Standard
Practical Constructions for the Efficient Cryptographic Enforcement of Interval-Based Access Control Policies
Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications
Practical Schemes For Privacy & Security Enhanced RFID
Prediciendo el generador cuadratico (in Spanish)
Predicting the Presence of Internet Worms using Novelty Detection
Preserving Privacy and Sharing the Data in Distributed Environment using Cryptographic Technique on Perturbed data
Pretty-Simple Password-Authenticated Key-Exchange Protocol
Preventing Coordinated Attacks Via Distributed Alert Exchange
Prevention of Wormhole Attack in Wireless Sensor Network
Pricing and Investments in Internet Security: A Cyber-Insurance Perspective
Privacy Amplification and Non-Malleable Extractors Via Character Sums
Privacy constraints in regularized convex optimization
Privacy in Location Based Services: Primitives Toward the Solution
Privacy Preservation Technologies in Internet of Things
Privacy Preserving Association Rule Mining Revisited
Privacy Preserving Data Aggregation in Wireless Sensor Networks
Privacy Preserving k Secure Sum Protocol