Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs
Towards a classical proof of exponential lower bound for 2-probe smooth codes
Towards a Flexible Intra-Trustcenter Management Protocol
Towards A Generic Formal Framework for Access Control Systems
Towards a Security Engineering Process Model for Electronic Business Processes
Towards an Effective Intrusion Response Engine Combined with Intrusion Detection in Ad Hoc Networks
Towards an information-theoretically safe cryptographic protocol
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
Towards Designing a Biometric Measure for Enhancing ATM Security in Nigeria E-Banking System
Towards Exploring Fundamental Limits of System-Specific Cryptanalysis Within Limited Attack Classes: Application to ABSG
Towards Improving the NIST Fingerprint Image Quality (NFIQ) Algorithm (Extended Version)
Towards Plugging Privacy Leaks in Domain Name System
Towards Practical Oblivious RAM
Towards Provable Secure Neighbor Discovery in Wireless Networks
Towards Public Key Infrastructure less authentication in Session Initiation Protocol
Towards Shift Tolerant Visual Secret Sharing Schemes
Tracing Technique for Blaster Attack
TrackMeNot: Enhancing the privacy of Web Search
Transformation from Identity Stone Age to Digital Identity
Transitive trust in mobile scenarios