Context-aware Authorization in Highly Dynamic Environments
Continued fractions and RSA with small secret exponent
Convergence of Corporate and Information Security
Cooperative Defense against Pollution Attacks in Network Coding Using SpaceMac
Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels
Correlated Node Behavior Model based on Semi Markov Process for MANETS
Countering Gattaca: Efficient and Secure Testing of Fully-Sequenced Human Genomes (Full Version)
Countering Trusting Trust through Diverse Double-Compiling
Covert channel detection using Information Theory
Cresterea securitatii sistemelor informatice si de comunicatii prin criptografia cuantica
Criticism of Knapsack Encryption Scheme
Crossing Borders: Security and Privacy Issues of the European e-Passport
Cryptanalyse de Achterbahn-128/80
Cryptanalysis and enhancement of two low cost rfid authentication protocols
Cryptanalysis And Further Improvement Of A Biometric-Based Remote User Authentication Scheme Using Smart Cards
Cryptanalysis of a lattice-based proxy signature scheme
Cryptanalysis of a more efficient and secure dynamic id-based remote user authentication scheme
Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve
Cryptanalysis of an Elliptic Curve-based Signcryption Scheme
Cryptanalysis of an Encryption Scheme Based on Blind Source Separation