Security analysis of a binary image permutation scheme based on Logistic map
Security Analysis of two Distance-Bounding Protocols
Security and complexity of the McEliece cryptosystem based on QC-LDPC codes
Security and Non-Repudiation for Voice-Over-IP Conversations
Security Assessment of E-Tax Filing Websites
Security Considerations for Remote Electronic Voting over the Internet
Security Estimates for Quadratic Field Based Cryptosystems
Security Features of an Asymmetric Cryptosystem based on the Diophantine Equation Hard Problem
Security Flaws in a Recent Ultralightweight RFID Protocol
Security for Distributed Web-Applications via Aspect-Oriented Programming
Security for Grid Services
Security impact ratings considered harmful
Security in Distributed Storage Systems by Communicating a Logarithmic Number of Bits
Security Mitigations for Return-Oriented Programming Attacks
Security Notions for Information Theoretically Secure Encryptions
Security of a biometric identity-based encryption scheme
Security of mobile agents: a new concept of the integrity protection
Security of public key cryptosystems based on Chebyshev Polynomials
Security of the Cao-Li Public Key Cryptosystem
Security Policy Enforcement Through Refinement Process