The Discrete Hilbert Transform for Non-Periodic Signals
The discrete logarithm problem in the group of non-singular circulant matrices
The E-net model for the Risk Analysis and Assessment System for the Information Security of Communication and Information Systems ("Defining" Subsystem)
The Effective Key Length of Watermarking Schemes
The El-Gamal AA_β Public Key Cryptosystem - A new approach utilizing the subset sum problem in designing an asymmetric cryptosystem
The ElGamal cryptosystem over circulant matrices
The entropy of keys derived from laser speckle
The Ephemeral Pairing Problem
The Evolution of Cyberinsurance
The Identity Crisis. Security, Privacy and Usability Issues in Identity Management
The Impact of Secure OSs on Internet Security: What Cyber-Insurers Need to Know
The Key Authority - Secure Key Management in Hierarchical Public Key Infrastructures
The Lattice of Machine Invariant Sets and Subword Complexity
The Logic of XACML - Extended
The McEliece Cryptosystem Resists Quantum Fourier Sampling Attacks
The Modified Scheme is still vulnerable to the parallel Session Attack
The one-way function based on computational uncertainty principle
The Password Change Phase is Still Insecure
The Peacock Encryption Method
The privacy implications of Bluetooth