Channel Sounding for the Masses: Low Complexity GNU 802.11b Channel Impulse Response Estimation
Chaos for Stream Cipher
Chaotic iterations for steganography: Stego-security and topological-security
Chaotic iterations versus Spread-spectrum: chaos and stego security
Chaotic iterations versus Spread-spectrum: topological-security and stego-security
Characterization of $2^n$-periodic binary sequences with fixed 3-error or 4-error linear complexity
Characterization of $m$-Sequences of Lengths $2^{2k}-1$ and $2^k-1$ with Three-Valued Crosscorrelation
Characterizing Internet Worm Infection Structure
Characterizing Spam traffic and Spammers
Checking Security Policy Compliance
Choreographies with Secure Boxes and Compromised Principals
Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher
Ciphertext Policy Attribute based Encryption with anonymous access policy
Class of Trustworthy Pseudo-Random Number Generators
Classical Authentication Aided Three-Stage Quantum Protocol
Classical Knowledge for Quantum Security
Classification and Evaluation the Privacy Preserving Data Mining Techniques by using a Data Modification-based Framework
Client-Server Password Recovery (Extended Abstract)
Cloud Computing Security in Business Information Systems
Cluster based Key Management in Wireless Sensor Networks