Authenticated tree parity machine key exchange
Authentication and Authorization in Server Systems for Bio-Informatics
Authentication and Encryption in GSM and 3GUMTS: An Emphasis on Protocols and Algorithms
Authentication from matrix conjugation
Authentication Schemes Using Braid Groups
Authentication Without Identification using Anonymous Credential System
Automated Composition of Security Protocols
Automated Symbolic Analysis of ARBAC-Policies (Extended Version)
Automated Validation of Security-sensitive Web Services specified in BPEL and RBAC (Extended Version)
Automatic analysis of distance bounding protocols
Automatic Verification of Correspondences for Security Protocols
Avoiding bias in cards cryptography
Avoiding Black Hole and Cooperative Black Hole Attacks in Wireless Ad hoc Networks