Proposed System for data hiding using Cryptography and Steganography Proposed System for data hiding using Cryptography and Steganography
Protection of DVB Systems by Trusted Computing
Protection of Web Applications from Cross-Site Scripting Attacks in Browser Side
Protocol Channels
Protocol indepedence through disjoint encryption under Exclusive-OR
Protocols for Kak's Cubic Cipher and Diffie-Hellman Based Asymmetric Oblivious Key Exchange
Provable Secure Identity Based Generalized Signcryption Scheme
Provably Secure Universal Steganographic Systems
Providing Data Group Anonymity Using Concentration Differences
Providing Group Anonymity Using Wavelet Transform
Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings
Pseudorandom number generation by $p$-adic ergodic transformations
Pseudorandom number generation by p-adic ergodic transformations: an addendum
Pseudorandom permutations with the fast forward property
PTaCL: A Language for Attribute-Based Access Control in Open Systems
Public Key Cryptography based on Semigroup Actions
Public Key Protocol Based on Amalgamated Free Product
Public-key cryptography and invariant theory
Public-Key Cryptography Based on Modular Lattices
Public-key cryptography in functional programming context