Pseudorandom permutations with the fast forward property
PTaCL: A Language for Attribute-Based Access Control in Open Systems
Public Key Cryptography based on Semigroup Actions
Public Key Protocol Based on Amalgamated Free Product
Public-key cryptography and invariant theory
Public-Key Cryptography Based on Modular Lattices
Public-key cryptography in functional programming context
Publishing Location Dataset Differential Privately with Isotonic Regression
Pythagorean Triples and Cryptographic Coding
Q-ESP: a QoS-compliant Security Protocol to enrich IPSec Framework
Quality of Source Location Protection in Globally Attacked Sensor Networks
Quantifying and qualifying trust: Spectral decomposition of trust networks
Quantifying Information Leak Vulnerabilities
Quantifying Information Leakage in Finite Order Deterministic Programs
Quantifying pervasive authentication: the case of the Hancke-Kuhn protocol
Quantifying Shannon's Work Function for Cryptanalytic Attacks
Quantifying Timing Leaks and Cost Optimisation
Quantitative Analysis of Information Leakage in Probabilistic and Nondeterministic Systems
Quantum Bit Commitment Expansion
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration