Location- and Time-Dependent VPD for Privacy-Preserving Wireless Accesses to Cloud Services
Log Analysis Case Study Using LoGS
Lost Audio Packets Steganography: The First Practical Evaluation
Lower Bounds for Zero-knowledge on the Internet
Lower bounds in differential privacy
Lower Bounds on the Algebraic Immunity of Boolean Functions
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
LWE-based Identification Schemes
Lyapunov exponent evaluation of a digital watermarking scheme proven to be secure
M-Banking Security - a futuristic improved security approach
Making Hand Geometry Verification System More Accurate Using Time Series Representation with R-K Band Learning
Making Palm Print Matching Mobile
Making Random Choices Invisible to the Scheduler
Malicious cryptography techniques for unreversable (malicious or not) binaries
Malware Classification based on Call Graph Clustering
Malware Detection using Attribute-Automata to parse Abstract Behavioral Descriptions
Managing Delegation in Access Control Models
Managing key multicasting through orthogonal systems
Mathematical and Statistical Opportunities in Cyber Security
Matrix powers algorithms for trust evaluation in PKI architectures