Inspiration from genetics to promote recognition and protection within ad hoc sensor networks
Integrated Key based Strict Friendliness Verification of Neighbors in MANET
Integrated Solution Modeling Software: A New Paradigm on Information Security Review
Integrated Solution Modeling Software: A New Paradigm on Information Security Review and Assessment
Integrating identity-based cryptography in IMS service authentication
Integrity Constraints in Trust Management
Interactive Privacy via the Median Mechanism
Internet voting protocol based on implicit data security
Interoperability between Heterogeneous Federation Architectures: Illustration with SAML and WS-Federation
Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues
Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues
Intrinsically Legal-For-Trade Objects by Digital Signatures
Introduction of a Triple Prime Symmetric Key Block Cipher
Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms
Intrusion Detection System Using Advanced Honeypots
Intrusion Detection System: Overview
Intrusion Detection Using Cost-Sensitive Classification
Intrusion-aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks
Intrusions into Privacy in Video Chat Environments: Attacks and Countermeasures
Investigating the Distribution of Password Choices