An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols
An equivalence preserving transformation from the Fibonacci to the Galois NLFSRs
An Evaluated Certification Services System for the German National Root CA - Legally Binding and Trustworthy Transactions in E-Business and E-Government
An Experimental Investigation of Secure Communication With Chaos Masking
An Extension for Combination of Duty Constraints in Role-Based Access Control
An Identity Based Key Management Scheme in Wireless Sensor Networks
An Identity Based Strong Bi-Designated Verifier (t, n) Threshold Proxy Signature Scheme
An Implementation of Intrusion Detection System Using Genetic Algorithm
An Improved Efficient Key Distribution Mechanism for Large-Scale Heterogeneous Mobile Sensor Networks
An Improved FPGA Implementation of the Modified Hybrid Hiding Encryption Algorithm (MHHEA) for Data Communication Security
An Improved Implementation of Grain
An Improved Remote User Authentication Scheme Using Smart Cards
An Improved Robust Fuzzy Extractor
An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards
An Improvement of RC4 Cipher Using Vigenere Cipher
An In-depth Analysis of Spam and Spammers
An Independent Validation of Vulnerability Discovery Models
An Information-Theoretic Analysis of the Security of Communication Systems Employing the Encoding-Encryption Paradigm
An Information-Theoretical View of Network-Aware Malware Attacks
An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks