Approximate Privacy: PARs for Set Problems
ARBAC Policy for a Large Multi-National Bank
Architecture Of A Identity Based Firewall System
Area Efficient Hardware Implementation of Elliptic Curve Cryptography by Iteratively Applying Karatsuba's Method
ARQ Security in Wi-Fi and RFID Networks
Array Based Java Source Code Obfuscation Using Classes with Restructured Arrays
Artificial Immune Privileged Sites as an Enhancement to Immuno-Computing Paradigm
Aryabhata's Mathematics
Aspects of Nonabelian Group Based Cryptography: A Survey and Open Problems
Asymptotic fingerprinting capacity for non-binary alphabets
Asymptotically false-positive-maximizing attack on non-binary Tardos codes
Atomicity Improvement for Elliptic Curve Scalar Multiplication
Attack Interference in Non-Collaborative Scenarios for Security Protocol Analysis [Extended Version]
Attack on Fully Homomorphic Encryption over the Integers
Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks
Attack--Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent - Technical Report with Proofs
Attacking an OT-Based Blind Signature Scheme
Attacking the combination generator
Attacks on Local Searching Tools
Attaque algebrique de NTRU a l'aide des vecteurs de Witt