A Wide range Survey on Recall Based Graphical User Authentications Algorithms Based on ISO and Attack Patterns
A Workflow for Differentially-Private Graph Synthesis
Abstract Certification of Global Non-Interference in Rewriting Logic
Access Control for Hierarchical Joint-Tenancy
Accountable Anonymous Group Messaging
Achieving Both Valid and Secure Logistic Regression Analysis on Aggregated Data from Different Private Sources
ACRR: Ad Hoc On-Demand Distance Vector Routing with Controlled Route Requests
Actor-network procedures: Modeling multi-factor authentication, device pairing, social interactions
Adaptation of the neural network-based IDS to new attacks detection
Adding Query Privacy to Robust DHTs
Advanced exploitation of buffer overflow
Advanced Software Protection Now
Advanced Trace Pattern For Computer Intrusion Discovery
AES Encryption and Decryption Using Direct3D 10 API
AES Implementation and Performance Evaluation on 8-bit Microcontrollers
Aggregating and Deploying Network Access Control Policies
Algebraic Attack on the Alternating Step(r,s)Generator
Algebraic Watchdog: Mitigating Misbehavior in Wireless Network Coding
Algorithmic Permutation of part of the Torah
Algorithmic Self-Assembly of DNA Tiles and its Application to Cryptanalysis