Q-ESP: a QoS-compliant Security Protocol to enrich IPSec Framework
Quality of Source Location Protection in Globally Attacked Sensor Networks
Quantifying and qualifying trust: Spectral decomposition of trust networks
Quantifying Information Leak Vulnerabilities
Quantifying Information Leakage in Finite Order Deterministic Programs
Quantifying pervasive authentication: the case of the Hancke-Kuhn protocol
Quantifying Shannon's Work Function for Cryptanalytic Attacks
Quantifying Timing Leaks and Cost Optimisation
Quantitative Analysis of Information Leakage in Probabilistic and Nondeterministic Systems
Quantum Bit Commitment Expansion
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration
Quantum m-out-of-n Oblivious Transfer
Quantum mechanics can provide unbiased result
Quantum Three-Pass protocol: Key distribution using quantum superposition states
Quire: Lightweight Provenance for Smart Phone Operating Systems