An ISP Level Solution to Combat DDoS Attacks using Combined Statistical Based Approach
An L(1/3) algorithm for ideal class group and regulator computation in certain number fields
An LSB Data Hiding Technique Using Natural Numbers
An LSB Data Hiding Technique Using Prime Numbers
An online algorithm for generating fractal hash chains applied to digital chains of custody
An Overview of the Security Concerns in Enterprise Cloud Computing
An unbreakable cryptosystem
An unbreakable cryptosystem for common people
An Unconditionally Secure Key Management Scheme for Large-Scale Heterogeneous Wireless Sensor Networks
Analyse des suites aléatoires engendrées par des automates cellulaires et applications à la cryptographie
Analysis and Implementation of Distinct Steganographic Methods
Analysis and improvement of a strongly secure certificateless key exchange protocol without pairing
Analysis of a Key Distribution Scheme in Secure Multicasting
Analysis of a procedure for inserting steganographic data into VoIP calls
Analysis of Biometric Authentication Protocols in the Blackbox Model
Analysis of Differential Phase Shift Quantum Key Distribution
Analysis of Implementation Hierocrypt-3 algorithm (and its comparison to Camellia algorithm) using ALTERA devices
Analysis of Kak's Quantum Cryptography Protocol from the Perspective of Source Strength
Analysis of Prime Reciprocal Sequences in Base 10
Analysis of the Security of BB84 by Model Checking