Optimized Image Steganalysis through Feature Selection using MBEGA
Optimized Implementation of Elliptic Curve Based Additive Homomorphic Encryption for Wireless Sensor Networks
Optimizing One Fair Document Exchange Protocol
Optimizing the Replay Protection at the Link Layer Security Framework in Wireless Sensor Networks
Outflanking and securely using the PIN/TAN-System
Outrepasser les limites des techniques classiques de Prise d'Empreintes grace aux Reseaux de Neurones
Overview: Main Fundamentals for Steganography
PadSteg: Introducing Inter-Protocol Steganography
Pairing-based identification schemes
PAKE-based mutual HTTP authentication for preventing phishing attacks
Pan-private Algorithms: When Memory Does Not Help
Participatory Privacy: Enabling Privacy in Participatory Sensing
Passive Cryptanalysis of Unconditionally Secure Authentication Protocol for RFID Systems
Password Authentication Scheme with Secured Login Interface
Password Based a Generalize Robust Security System Design Using Neural Network
Path O-RAM: An Extremely Simple Oblivious RAM Protocol
Pathwords: a user-friendly schema for common passwords management
Peer to Peer Networks for Defense Against Internet Worms
Peer-to-Peer Secure Multi-Party Numerical Computation
Peer-to-Peer Secure Multi-Party Numerical Computation Facing Malicious Adversaries