Perfectly Secure Message Transmission Revisited
Performance Analysis of a Keyed Hash Function based on Discrete and Chaotic Proven Iterations
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator
Performance Considerations for an Embedded Implementation of OMA DRM 2
Performance Evaluation of Mesh based Multicast Reactive Routing Protocol under Black Hole Attack
Performance Evaluation of Security Protocols
Performance of the Fuzzy Vault for Multiple Fingerprints (Extended Version)
Performance Study on Image Encryption Schemes
Period of the d-Sequence Based Random Number Generator
Periodic sequences with stable $k$-error linear complexity
Permutation graphs, fast forward permutations, and sampling the cycle structure of a permutation
PERSEUS Technology: New Trends in Information and Communication Security
Persistent Asymmetric Password-Based Key Exchange
Personal data disclosure and data breaches: the customer's viewpoint
Personal Marks and Community Certificates: Detecting Clones in Mobile Wireless Networks of Smart-Phones
Philosophical Survey of Passwords
PhishDef: URL Names Say It All
Phishing - A Growing Threat to E-Commerce
Physical Unclonable Function (PUF) Based Random Number Generator
Physical-Layer Security over Correlated Erasure Channels