An attack on MySQL's login protocol
An Attack on Privacy Preserving Data Aggregation Protocol for Wireless Sensor Networks
An Audit Logic for Accountability
An Automated Analysis of the Security of Quantum Key Distribution
An Efficient Algorithm for Detection of Selfish Packet Dropping Nodes in Wireless Mesh Networks
An Efficient Analytical Solution to Thwart DDoS Attacks in Public Domain
An Efficient and Publicly Verifiable Id-Based Multi-Signcryption Scheme
An Efficient and User Privacy-Preserving Routing Protocol for Wireless Mesh Networks
An efficient certificateless authenticated key agreement protocol without bilinear pairings
An Efficient Cryptographic Hash Algorithm (BSA)
An Efficient Dynamic and Distributed RSA Accumulator
An efficient multi-use multi-secret sharing scheme based on hash function
An Efficient PKC-Based Security Architecture for Wireless Sensor Networks
An Efficient Scheme for Sensitive Message Transmission using Blind Signcryption
An Efficient Security Mechanism for High-Integrity Wireless Sensor Networks
An Efficient Security Mechanism for High-Integrity Wireless Sensor Networks
An Elliptic Curve-based Signcryption Scheme with Forward Secrecy
An Empirical Study of Spam and Prevention Mechanisms in Online Video Chat Services
An Empirical Study of Spam and Spam Vulnerable email Accounts
An ensemble approach for feature selection of Cyber Attack Dataset