Validating a Web Service Security Abstraction by Typing
Van Wijngaarden grammars, metamorphism and K-ary malwares
Variations on Kak's Three Stage Quantum Cryptography Protocol
Vcache: Caching Dynamic Documents
Vectorial Resilient $PC(l)$ of Order $k$ Boolean Functions from AG-Codes
Verifying Search Results Over Web Collections
Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures (Full version)
Video Encryption: A Survey
Visual Secret Sharing Scheme using Grayscale Images
VoIP Steganography and Its Detection - A Survey
Vulnerability Analysis of PAP for RFID Tags