Group Signature Schemes Using Braid Groups
Groups from Cyclic Infrastructures and Pohlig-Hellman in Certain Infrastructures
GSM Security Using Identity-based Cryptography
Guaranteeing the diversity of number generators
Handling Confidential Data on the Untrusted Cloud: An Agent-based Approach
Handsets Malware Threats and Facing Techniques
Handwritten Text Image Authentication using Back Propagation
Hard Fault Analysis of Trivium
Hardware Engines for Bus Encryption: A Survey of Existing Techniques
Hardware Implementation of TDES Crypto System with On Chip Verification in FPGA
Harvesting SSL Certificate Data to Identify Web-Fraud
Hash function based on arithmetic coding and public-key cryptography
Hash function based secret sharing scheme designs
Heuristic Methods for Security Protocols
HF-hash : Hash Functions Using Restricted HFE Challenge-1
Hidden Polynomial(s) Cryptosystems
Hidden Polynomial(s) Cryptosystems
Hidden-Markov Program Algebra with iteration
Hiding Data in OFDM Symbols of IEEE 802.11 Networks
Hiding Information in a Stream Control Transmission Protocol