RFID Authentication, Efficient Proactive Information Security within Computational Security
RFID Key Establishment Against Active Adversaries
Robust Audio Watermarking Against the D/A and A/D conversions
Robust Multi biometric Recognition Using Face and Ear Images
Robust Watermarking in Multiresolution Walsh-Hadamard Transform
Role-Based Access Controls
Rossler Nonlinear Dynamical Machine for Cryptography Applications
S3A: Secure System Simplex Architecture for Enhanced Security of Cyber-Physical Systems
Safe Data Sharing and Data Dissemination on Smart Devices
Safe Deals Between Strangers
Safer in the Clouds (Extended Abstract)
SafeVchat: Detecting Obscene Content and Misbehaving Users in Online Video Chat Services
SANA - Network Protection through artificial Immunity
SANA - Security Analysis in Internet Traffic through Artificial Immune Systems
Scenario Based Worm Trace Pattern Identification Technique
SCRUB-PA: A Multi-Level Multi-Dimensional Anonymization Tool for Process Accounting
Secrecy in Multiagent Systems
Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups
Secret Sharing for n-Colorable Graphs with Application to Public Key Cryptography
Secret sharing with a class of minimal linear codes