A Survey of System Security in Contactless Electronic Passports
A Survey on Cross-Site Scripting Attacks
A Survey on Low-cost RFID Authentication Protocols
A Survey on Recognition Based Graphical User Authentication Algorithms
A Survey on Reputation and Trust-Based Systems for Wireless Communication Networks
A Survey on Security Issues in Ad Hoc Routing Protocols and their Mitigation Techniques
A Survey on Security Issues in Cloud Computing
A Survey on Wireless Sensor Network Security
A Symbolic Intruder Model for Hash-Collision Attacks
A Tiered Security System for Mobile Devices
A topological chaos framework for hash functions
A Trace Based Bisimulation for the Spi Calculus
A Trace Logic for Local Security Properties
A Trust Based Cross Layer Security Protocol for Mobile Ad hoc Networks
A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes in a Peer-to-Peer Wireless Mesh Network
A Type System for Data-Flow Integrity on Windows Vista
A User Model for Information Erasure
A Verifiable Partial Key Escrow, Based on McCurley Encryption Scheme
A watermarking algorithm satisfying topological chaos properties
A Weakest Chain Approach to Assessing the Overall Effectiveness of the 802.11 Wireless Network Security