On the cryptanalysis of the generalized simultaneous conjugacy search problem and the security of the Algebraic Eraser
On the Decidability of Non Interference over Unbounded Petri Nets
On the defence notion
On the deployment of Mobile Trusted Modules
On the design of a family of CI pseudo-random number generators
On the Duality of Probing and Fault Attacks
On the Eavesdropper's Correct Decision in Gaussian and Fading Wiretap Channels Using Lattice Codes
On the Efficiency of Fast RSA Variants in Modern Mobile Phones
On the gradual deployment of random pairwise key distribution schemes (Extended Version)
On the graph coloring check-digit scheme with applications to verifiable secret sharing
On the impossibility of non-static quantum bit commitment between two parties
On the Performance Evaluation of Encounter-based Worm Interactions Based on Node Characteristics
On the Privacy of Two Tag Ownership Transfer Protocols for RFIDs
On the Protocol Composition Logic PCL
On the provable security of BEAR and LION schemes
On the Rabin signature
On the Relations Between Diffie-Hellman and ID-Based Key Agreement from Pairings
On the Relationship between Strand Spaces and Multi-Agent Systems
On the security of an enhanced short signature scheme
On the Security of Liaw et al.'s Scheme