Mirage: Mitigating Illicit Inventorying in a RFID Enabled Retail Environment
Misbehavior in Mobile Application Markets
Mistake Analyses on Proof about Perfect Secrecy of One-time-pad
Mitigation of Random Query String DoS via Gossip
Mobile IP and protocol authentication extension
Modeling Adversaries in a Logic for Security Protocol Analysis
Modeling Internet Security Investments: The Case of Dealing with Information Uncertainty
Modelling Nonlinear Sequence Generators in terms of Linear Cellular Automata
Modelling the costs and benefits of Honeynets
Modern Quantum Technologies of Information Security
Modern Symmetric Cryptography methodologies and its applications
Monografia
More on Combinatorial Batch Codes
More Robust Multiparty Protocols with Oblivious Transfer
Multi Layer Approach to Defend DDoS Attacks Caused by Spam
Multi-Dimensional Hash Chains and Application to Micropayment Schemes
Multi-Flow Attacks Against Network Flow Watermarks: Analysis and Countermeasures
Multi-Level Steganography: Improving Hidden Communication in Networks
Multi-Map Orbit Hopping Chaotic Stream Cipher
Multi-Proxy Multi-Signcryption Scheme from Pairings