Hierarchical Identity-Based Lossy Trapdoor Functions
Hilbert Matrix Based Cryptosystem using a Session Key
History-sensitive versus future-sensitive approaches to security in distributed systems
Homomorphic encryption from codes
Homomorphic public-key cryptosystems and encrypting boolean circuits
Homomorphic public-key cryptosystems over groups and rings
Homophonic Coding Design for Communication Systems Employing the Encoding-Encryption Paradigm
Honesty can be the best policy within quantum mechanics
How China Is Blocking Tor
How Hidden Can Be Even More Hidden?
How not to share a set of secrets
How Open Should Open Source Be?
How To Break Anonymity of the Netflix Prize Dataset
How to Bypass Verified Boot Security in Chromium OS
How to Guarantee Secrecy for Cryptographic Protocols
How to prevent type-flaw and multi-protocol attacks on cryptographic protocols under Exclusive-OR
How to prevent type-flaw attacks on security protocols under algebraic properties
How to retrieve priced data
How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET
How to Work with Honest but Curious Judges? (Preliminary Report)