Is A Quantum Stabilizer Code Degenerate or Nondegenerate for Pauli Channel?
Is Cloud Computing Steganography-proof?
Is entanglement necessary to have unconditional security in quantum bit commitment ?
Isogenies of Elliptic Curves: A Computational Approach
IT Security Issues Within the Video Game Industry
IT Security Plan for Flight Simulation Program
Iterative method for improvement of coding and decryption
Java Components Vulnerabilities - An Experimental Classification Targeted at the OSGi Platform
JConstHide: A Framework for Java Source Code Constant Hiding
JDATATRANS for Array Obfuscation in Java Source Code to Defeat Reverse Engineering from Decompiled Codes
Jigsaw-based Security in Data Transfer in Computer Networks
JIT Spraying and Mitigations
Kerberos Authentication in Wireless Sensor Networks
Key Agreement and Authentication Schemes Using Non-Commutative Semigroups
Key Distillation and the Secret-Bit Fraction
Key Distribution Scheme without Deployment Knowledge
Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels - Design, Implementation, and Analysis
Key Management in Mobile Sensor Networks
Key Management in Wireless Sensor Networks Using a Modified Blom Scheme
Key Reduction of McEliece's Cryptosystem Using List Decoding