In Things We Trust? Towards trustability in the Internet of Things
Incidence Handling and Response System
Increased security through open source
INDECT Advanced Security Requirements
Indexing Properties of Primitive Pythagorean Triples for Cryptography Applications
Infinite Families of Optimal Splitting Authentication Codes Secure Against Spoofing Attacks of Higher Order
Influence of Speech Codecs Selection on Transcoding Steganography
Informal specification-based performance evaluation of security protocols
Information Flow Safety in Multiparty Sessions
Information Hiding in CSS : A Secure Scheme Text-Steganography using Public Key Cryptosystem
Information Hiding Techniques: A Tutorial Review
Information Hiding Using Improper Frame Padding
Information Networks Secured by the Laws of Physics
Information Rates of Minimal Non-Matroid-Related Access Structures
Information Security Plan for Flight Simulator Applications
Information Security Synthesis in Online Universities
Information Theoretic Authentication and Secrecy Codes in the Splitting Model
Information-theoretic security without an honest majority
Information-theoretically Secret Key Generation for Fading Wireless Channels
Information-Theoretically Secure Voting Without an Honest Majority