A computationally-efficient construction for the matrix-based key distribution in sensor network
A Context-based Trust Management Model for Pervasive Computing Systems
A Cost Effective RFID Based Customized DVD-ROM to Thwart Software Piracy
A Cryptographic Study of Some Digital Signature Schemes
A Cryptosystem Based on Hilbert Matrix using Cipher Block Chaining Mode
A d-Sequence based Recursive Random Number Generator
A Detailed Survey on Various Aspects of SQL Injection: Vulnerabilities, Innovative Attacks, and Remedies
A DHT Based Measure of Randomness
A Differential Cryptanalysis of Yen-Chen-Wu Multimedia Cryptography System (MCS)
A Digital Signature Scheme for Long-Term Security
A Digital Signature with Threshold Generation and Verification
A Directed -Threshold Multi-Signature Scheme
A Directed Signature Scheme and its Applications
A Directed Threshold - Signature Scheme
A Directly Public Verifiable Signcryption Scheme based on Elliptic Curves
A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying on Reed-Solomon Codes
A Distributed Data Storage Scheme for Sensor Networks
A Distributed Intrusion Detection System Using Cooperating Agents
A Distributed k-Secure Sum Protocol for Secure Multi-Party Computations
A Distributed Protocol for Detection of Packet Dropping Attack in Mobile Ad Hoc Networks