Breaking a Chaotic Cryptographic Scheme Based on Composition Maps
Breaking a chaotic image encryption algorithm based on perceptron model
Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps
Breaking a new substitution-diffusion based image cipher using chaotic standard and logistic maps
Breaking a novel colour image encryption algorithm based on chaos
Breaking an image encryption algorithm based on chaos
Breaking GSM with rainbow Tables
Browser-Based Covert Data Exfiltration
Building Computer Network Attacks
Can Alice and Bob be random: a study on human playing zero knowledge protocols
Candidate One-Way Functions and One-Way Permutations Based on Quasigroup String Transformations
Capacity of Steganographic Channels
Case Study On Social Engineering Techniques for Persuasion
Categorical interpretations of some key agreement protocols
CD-PHY: Physical Layer Security in Wireless Networks through Constellation Diversity
Cellular Automata in Stream Ciphers
CensorSpoofer: Asymmetric Communication with IP Spoofing for Censorship-Resistant Web Browsing
Certificate Revocation Paradigms
Certificate-based Single Sign-On Mechanism for Multi-Platform Distributed Systems
Changing Neighbors k Secure Sum Protocol for Secure Multi Party Computation