Algorithms and Approaches of Proxy Signature: A Survey
Alice Meets Bob: A Comparative Usability Study of Wireless Device Pairing Methods for a "Two-User" Setting
Alternative security architecture for IP Telephony based on digital watermarking
An $L (1/3 + ε)$ Algorithm for the Discrete Logarithm Problem for Low Degree Curves
An $L (1/3)$ Discrete Logarithm Algorithm for Low Degree Curves
An Active Defense Mechanism for TCP SYN flooding attacks
An Activity-Based Model for Separation of Duty
An Adaptive Technique using Advanced Encryption Standard to Implement Hard Disk Security
An Agent-Based Intrusion Detection System for Local Area Networks
An Algebraic Characterization of Security of Cryptographic Protocols
An Algorithm for Computing $m$-Tight Error Linear Complexity of Sequences over $GF(p^{m})$ with Period $p^{m}$
An Algorithm for Detection of Selfish Nodes in Wireless Mesh Networks
An algorithm for the k-error linear complexity of a sequence with period 2pn over GF(q)
An Analysis of Chinese Search Engine Filtering
An Analysis of Routing Disruption Attack on Dynamic Source Routing Protocol
An Anonymous Authentication and Communication Protocol for Wireless Mesh Networks
An Approach for Message Hiding using Substitution Techniques and Audio Hiding in Steganography
An approach to secure highly confidential documents of any size in the corporate or institutes having unsecured networks
An Asymmetric Fingerprinting Scheme based on Tardos Codes
An Asymptotically Optimal RFID Authentication Protocol Against Relay Attacks