A Secure Traitor Tracing Scheme against Key Exposure
A Secure Variant of the Hill Cipher
A Secure Web-Based File Exchange Server: Software Requirements Specification Document
A Secure Wireless Routing Protocol Using Enhanced Chain Signatures
A secured Cryptographic Hashing Algorithm
A Security Protocol for Multi-User Authentication
A security suite for wireless body area networks
A Semantic Analysis of Key Management Protocols for Wireless Sensor Networks
A Semantic Hierarchy for Erasure Policies
A Sensitive Attribute based Clustering Method for kanonymization
A Service-Centric Approach to a Parameterized RBAC Service
A Simple Computational Model for Acceptance/Rejection of Binary Sequence Generators
A simple generalization of El-Gamal cryptosystem to non-abelian groups
A simple generalization of the ElGamal cryptosystem to non-abelian groups II
A State-of-the-art Survey on IDS for Mobile Ad-Hoc Networks and Wireless Mesh Networks
A Study of CAPTCHAs for Securing Web Services
A Study on Recent Approaches in Handling DDoS Attacks
A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks
A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges
A Survey of RFID Authentication Protocols Based on Hash-Chain Method