Monografia
More on Combinatorial Batch Codes
More Robust Multiparty Protocols with Oblivious Transfer
Multi Layer Approach to Defend DDoS Attacks Caused by Spam
Multi-Dimensional Hash Chains and Application to Micropayment Schemes
Multi-Flow Attacks Against Network Flow Watermarks: Analysis and Countermeasures
Multi-Level Steganography: Improving Hidden Communication in Networks
Multi-Map Orbit Hopping Chaotic Stream Cipher
Multi-Proxy Multi-Signcryption Scheme from Pairings
Multi-Use Unidirectional Proxy Re-Signatures
Multidimensional Network Monitoring for Intrusion Detection
Multilayer Approach to Defend Phishing Attacks
Multilevel Image Encryption
Multipartite Secret Correlations and Bound Information
Multiparty computation unconditionally secure against Q^2 adversary structures
MV2-algorithm's clones
MV3: A new word based stream cipher using rapid mixing and revolving buffers
NC-Audit: Auditing for Network Coding Storage
Negative Databases for Biometric Data
Network attack detection at flow level