Pipelined Algorithms to Detect Cheating in Long-Term Grid Computations
PKI Implementation Issues: A Comparative Study of Pakistan with some Asian Countries
PKI Scalability Issues
Planning for Directory Services in Public Key Infrastructures
Platform-Independent Firewall Policy Representation
Plug-in privacy for Smart Metering billing
Plugging Side-Channel Leaks with Timing Information Flow Control
Poseidon: a 2-tier Anomaly-based Intrusion Detection System
Power-Efficient Direct-Voting Assurance for Data Fusion in Wireless Sensor Networks
Practical Attacks on a RFID Authentication Protocol Conforming to EPC C-1 G-2 Standard
Practical Constructions for the Efficient Cryptographic Enforcement of Interval-Based Access Control Policies
Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications
Practical Schemes For Privacy & Security Enhanced RFID
Prediciendo el generador cuadratico (in Spanish)
Predicting the Presence of Internet Worms using Novelty Detection
Preserving Privacy and Sharing the Data in Distributed Environment using Cryptographic Technique on Perturbed data
Pretty-Simple Password-Authenticated Key-Exchange Protocol
Preventing Coordinated Attacks Via Distributed Alert Exchange
Prevention of Wormhole Attack in Wireless Sensor Network
Pricing and Investments in Internet Security: A Cyber-Insurance Perspective