Proceedings 8th International Workshop on Security Issues in Concurrency
Processor-Dependent Malware... and codes
Proof of a Conjecture about Rotation Symmetric Functions
Proofs of Zero Knowledge
Proposal of a New Block Cipher reasonably Non-Vulnerable against Cryptanalytic Attacks
Proposed Information Sharing Security Approach for Security Personnels, Vertical Integration, Semantic Interoperability Architecture and Framework for Digital Government
Proposed platform for improving grid security by trust management system
Proposed System for data hiding using Cryptography and Steganography Proposed System for data hiding using Cryptography and Steganography
Protection of DVB Systems by Trusted Computing
Protection of Web Applications from Cross-Site Scripting Attacks in Browser Side
Protocol Channels
Protocol indepedence through disjoint encryption under Exclusive-OR
Protocols for Kak's Cubic Cipher and Diffie-Hellman Based Asymmetric Oblivious Key Exchange
Provable Secure Identity Based Generalized Signcryption Scheme
Provably Secure Universal Steganographic Systems
Providing Data Group Anonymity Using Concentration Differences
Providing Group Anonymity Using Wavelet Transform
Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings
Pseudorandom number generation by $p$-adic ergodic transformations
Pseudorandom number generation by p-adic ergodic transformations: an addendum