Implementing a Web Browser with Phishing Detection Techniques
Implementing New-age Authentication Techniques using OpenID for Security Automation
Implementing the modular eballot system V0.6
Implementing the Three-Stage Quantum Cryptography Protocol
Impossibility of Differentially Private Universally Optimal Mechanisms
Improved Analysis of Kannan's Shortest Lattice Vector Algorithm
Improved code-based identification scheme
Improved Content Based Image Watermarking
Improved identity-based identification using correcting codes
Improved information security using robust Steganography system
Improved Latin Square based Secret Sharing Scheme
Improved Upper Bounds for the Information Rates of the Secret Sharing Schemes Induced by the Vamos Matroid
Improved Watermarking Scheme Using Decimal Sequences
Improvements to time bracketed authentication
Improving Anonymity in Shared Key Primitives Based on Perfect Hash Families
Improving Integral Cryptanalysis against Rijndael with Large Blocks
Improving random number generators by chaotic iterations. Application in data hiding
Improving Security Levels of IEEE 802.16e Authentication By Diffie-Hellman Method
Improving Spam Detection Based on Structural Similarity
Improving the Usability of Privacy Settings in Facebook