UCLog+ : A Security Data Management System for Correlating Alerts, Incidents, and Raw Data From Remote Logs
Undeniable Signature Schemes Using Braid Groups
Underwater Hacker Missile Wars: A Cryptography and Engineering Contest
Universally Optimal Privacy Mechanisms for Minimax Agents
Unwinding Conditional Noninterference
Upper and Lower Bounds on Black-Box Steganography
User Awareness Measurement Through Social Engineering
Using a Secret Key to Foil an Eavesdropper
Using Agent to Coordinate Web Services
Using CAS to Manage Role-Based VO Sub-Groups
Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population
Using Image Attributes for Human Identification Protocols
Using In-Memory Encrypted Databases on the Cloud
Using LDAP Directories for Management of PKI Processes
Using Linear Difference Equations to Model Nonlinear Cryptographic Sequences
Using Neural Networks to improve classical Operating System Fingerprinting techniques
Using Quasigroups for Generating Pseudorandom Numbers
Using Repeating Decimals As An Alternative To Prime Numbers In Encryption
Using Repeating Decimals As An Alternative To Prime Numbers In Encryption
Using shifted conjugacy in braid-based cryptography