CNoA: Challenging Number Approach for uncovering TCP SYN flooding using SYN spoofing attack
Coarse-grained Dynamic Taint Analysis for Defeating Control and Non-control Data Attacks
Code Attestation with Compressed Instruction Code
Code injection attacks on harvard-architecture devices
Code Reverse Engineering problem for Identification Codes
Coding for Cryptographic Security Enhancement using Stopping Sets
Collaborative Trust: A Novel Paradigm of Trusted Mobile Computing
Collision-resistant hash function based on composition of functions
Combating False Reports for Secure Networked Control in Smart Grid via Trustiness Evaluation
Combinatorial Bounds and Characterizations of Splitting Authentication Codes
Comment - Practical Data Protection
Comment on A dynamic ID-based Remote User Authentication Scheme
Comments on "Improved Efficient Remote User Authentication Schemes"
Commitment Capacity of Discrete Memoryless Channels
Common Representation of Information Flows for Dynamic Coalitions
Communication and Round Efficient Information Checking Protocol
Communication Complexity and Secure Function Evaluation
Commutative-like Encryption: A New Characterization of ElGamal
Comparing BB84 and Authentication-Aided Kak's Three-Stage Quantum Protocol
Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)