Non-Boolean almost perfect nonlinear functions on non-Abelian groups
Non-Malleable Codes from the Wire-Tap Channel
Non-Malleable Extractors, Two-Source Extractors and Privacy Amplification
Non-Repudiation in Internet Telephony
Nonadaptive Mastermind Algorithms for String and Vector Databases, with Case Studies
NoSEBrEaK - Attacking Honeynets
Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques
Novel hybrid intrusion detection system for clustered wireless sensor network
Novel Mechanism to Defend DDoS Attacks Caused by Spam
NP-completeness of Certain Sub-classes of the Syndrome Decoding Problem
NVision-PA: A Tool for Visual Analysis of Command Behavior Based on Process Accounting Logs (with a Case Study in HPC Cluster Security)
O Algoritmo usado no programa de criptografia PASME
Object Oriented Modelling of Idea using GA based efficient key generation for e-governance security (OOMIG)
Oblivious RAM Simulation with Efficient Worst-Case Access Overhead
Oblivious Storage with Low I/O Overhead
Oblivious Transfer based on Key Exchange
Oblivious Transfer using Elliptic Curves
Oblivious-Transfer Amplification
Octopus: A Secure and Anonymous DHT Lookup
On $2k$-Variable Symmetric Boolean Functions with Maximum Algebraic Immunity $k$