A New Look at Composition of Authenticated Byzantine Generals
A New Non Linear, Time Stamped & Feed Back Model Based Encryption Mechanism with Acknowledgement Support
A new Protocol for 1-2 Oblivious Transfer
A new protocol implementing authentication transformations for multi-located parties
A New Proxy Ring Signature Scheme
A New Remote User Authentication Scheme Using Smart Cards with Check Digits
A New Scheme for Minimizing Malicious Behavior of Mobile Nodes in Mobile Ad Hoc Networks
A New Secret key Agreement Scheme in a Four-Terminal Network
A New Stream Cipher: Dicing
A New Technique for Text Data Compression
A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security
A New Type of Cipher
A New Type of Cipher: DICING_csb
A new zero-knowledge code based identification scheme with reduced communication
A Noise Addition Scheme in Decision Tree for Privacy Preserving Data Mining
A Note on "On the Construction of Boolean Functions with Optimal Algebraic Immunity"
A note on conjugacy search and racks
A Note on Differential Privacy: Defining Resistance to Arbitrary Side Information
A Note On the Bounds for the Generalized Fibonacci-p-Sequence and its Application in Data-Hiding
A Note on the Periodicity and the Output Rate of Bit Search Type Generators