The El-Gamal AA_β Public Key Cryptosystem - A new approach utilizing the subset sum problem in designing an asymmetric cryptosystem
The ElGamal cryptosystem over circulant matrices
The entropy of keys derived from laser speckle
The Ephemeral Pairing Problem
The Evolution of Cyberinsurance
The Identity Crisis. Security, Privacy and Usability Issues in Identity Management
The Impact of Secure OSs on Internet Security: What Cyber-Insurers Need to Know
The Key Authority - Secure Key Management in Hierarchical Public Key Infrastructures
The Lattice of Machine Invariant Sets and Subword Complexity
The Logic of XACML - Extended
The McEliece Cryptosystem Resists Quantum Fourier Sampling Attacks
The Modified Scheme is still vulnerable to the parallel Session Attack
The one-way function based on computational uncertainty principle
The Password Change Phase is Still Insecure
The Peacock Encryption Method
The privacy implications of Bluetooth
The Random Oracle Methodology, Revisited
The ray attack, an inefficient trial to break RSA cryptosystems
The REESSE2+ Public-key Encryption Scheme - Another Application of the Lever Function and its Connotation
The SAT solving method as applied to cryptographic analysis of asymmetric ciphers