EPS Confidentiality and Integrity mechanisms Algorithmic Approach
Equivalence of the Random Oracle Model and the Ideal Cipher Model, Revisited
Ermittlung von Verwundbarkeiten mit elektronischen Koedern
Error Detection and Correction for Distributed Group Key Agreement Protocol
EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity
Estimating strength of DDoS attack using various regression models
Estimation of the Embedding Capacity in Pixel-pair based Watermarking Schemes
Estimators in Cryptography
Ethemba Trusted Host EnvironmentMainly Based on Attestation
Evading network-level emulation
Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding
Evaluating the Utility of Anonymized Network Traces for Intrusion Detection
Evaluating Trust in Grid Certificates
Evaluation of Anonymized ONS Queries
Evolution of Computer Virus Concealment and Anti-Virus Techniques: A Short Survey
Evolutionary Computation Algorithms for Cryptanalysis: A Study
Exact, Efficient and Information-Theoretically Secure Voting with an Arbitrary Number of Cheaters
Exception Agent Detection System for IP Spoofing Over Online Environments
Exchanging Secrets without Using Cryptography
Expected loss analysis of thresholded authentication protocols in noisy conditions