Maximizing Strength of Digital Watermarks using Fuzzy Logic
MDS Ideal Secret Sharing Scheme from AG-codes on Elliptic Curves
Measuring Password Strength: An Empirical Analysis
Message Detection and Extraction of Chaotic Optical Communication Using Time-Frequency Analysis
Metamorphic Virus Detection in Portable Executables Using Opcodes Statistical Feature
Metamorphic Virus Variants Classification Using Opcode Frequency Histogram
MIMO-Assisted Channel-Based Authentication in Wireless Networks
Min-Sum algorithm for lattices constructed by Construction D
Minimizing Cache Timing Attack Using Dynamic Cache Flushing (DCF) Algorithm
Mirage: Mitigating Illicit Inventorying in a RFID Enabled Retail Environment
Misbehavior in Mobile Application Markets
Mistake Analyses on Proof about Perfect Secrecy of One-time-pad
Mitigation of Random Query String DoS via Gossip
Mobile IP and protocol authentication extension
Modeling Adversaries in a Logic for Security Protocol Analysis
Modeling Internet Security Investments: The Case of Dealing with Information Uncertainty
Modelling Nonlinear Sequence Generators in terms of Linear Cellular Automata
Modelling the costs and benefits of Honeynets
Modern Quantum Technologies of Information Security
Modern Symmetric Cryptography methodologies and its applications