Analysis of the various key management algorithms and new proposal in the secure multicast communications
Analyzing and Improving Performance of a Class of Anomaly-based Intrusion Detectors
Analyzing standards for RSA integers
Analyzing Worms and Network Traffic using Compression
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
ANDaNA: Anonymous Named Data Networking Application
Anonymity and Information Hiding in Multiagent Systems
Anonymity and verifiability in multi-attribute reverse auction
Anonymity in the Wild: Mixes on unstructured networks
Anonymous Oblivious Transfer
Another Co*cryption Method
Anti-Collusion Digital Fingerprinting Codes via Partially Cover-Free Families
ANTIDS: Self-Organized Ant-based Clustering Model for Intrusion Detection System
Aperiodic logarithmic signatures
APHRODITE: an Anomaly-based Architecture for False Positive Reduction
Application of Steganography for Anonymity through the Internet
Applying Data Privacy Techniques on Tabular Data in Uganda
Applying statistical methods to text steganography
Approaches to Formal Verification of Security Protocols
Approximate Privacy: Foundations and Quantification