Detecting Security threats in the Router using Computational Intelligence
Detecting Threat E-mails using Bayesian Approach
Detection of Denial of Service Attacks against Domain Name System Using Neural Networks
Deterministic Secure Positioning in Wireless Sensor Networks
Development of a Window Based Security System for Electronic Data Interchange
Development of mechanism for enhancing data security in quantum cryptography
Differential Fault Analysis on A.E.S
Differential Privacy: on the trade-off between Utility and Information Leakage
Differential properties of functions x -> x^{2^t-1} -- extended version
Digital Forensics Analysis of Spectral Estimation Methods
Digital Signal Transmission with Chaotic Encryption: Design and Evaluation of a FPGA Realization
Direct Sequence Spread Spectrum Steganographic Scheme for IEEE 802.15.4
Disabling equational theories in unification for cryptographic protocol analysis through tagging
Discovery of Elliptic Curve Cryptographic Private Key in O(n)
Discrete logarithms in curves over finite fields
Distributed Denial of Service (DDoS) Attacks Detection Mechanism
Distributed Double Spending Prevention
Distributed Private Data Analysis: On Simultaneously Solving How and What
Double Blind Comparisons using Groups with Infeasible Inversion
Double Blind Comparisons: A New Approach to the Database Aggregation Problem