How to prevent type-flaw attacks on security protocols under algebraic properties
How to retrieve priced data
How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET
How to Work with Honest but Curious Judges? (Preliminary Report)
How Unique and Traceable are Usernames?
HowTo Authenticate and Encrypt
Hybrid approach for Image Encryption Using SCAN Patterns and Carrier Images
Hybrid Intrusion Detection and Prediction multiAgent System HIDPAS
Hybrid Spam Filtering for Mobile Communication
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings
Identification with Encrypted Biometric Data
Identifying Tipping Points in a Decision-Theoretic Model of Network Security
Identity Based Strong Designated Verifier Parallel Multi-Proxy Signature Scheme
Image Encryption Based on Diffusion and Multiple Chaotic Maps
Image Encryption Using Differential Evolution Approach in Frequency Domain
Image Steganography, a New Approach for Transferring Security Information
Impact of Rushing attack on Multicast in Mobile Ad Hoc Network
Impact of Vehicular Communications Security on Transportation Safety
Impersonation with the Echo Protocol
Implementing a Unification Algorithm for Protocol Analysis with XOR