Time Synchronization Attack in Smart Grid-Part II: Cross Layer Detection Mechanism
Timed Analysis of Security Protocols
TorrentGuard: stopping scam and malware distribution in the BitTorrent ecosystem
Total Protection of Analytic Invariant Information in Cross Tabulated Tables
Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs
Towards a classical proof of exponential lower bound for 2-probe smooth codes
Towards a Flexible Intra-Trustcenter Management Protocol
Towards A Generic Formal Framework for Access Control Systems
Towards a Security Engineering Process Model for Electronic Business Processes
Towards an Effective Intrusion Response Engine Combined with Intrusion Detection in Ad Hoc Networks
Towards an information-theoretically safe cryptographic protocol
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
Towards Designing a Biometric Measure for Enhancing ATM Security in Nigeria E-Banking System
Towards Exploring Fundamental Limits of System-Specific Cryptanalysis Within Limited Attack Classes: Application to ABSG
Towards Improving the NIST Fingerprint Image Quality (NFIQ) Algorithm (Extended Version)
Towards Plugging Privacy Leaks in Domain Name System
Towards Practical Oblivious RAM
Towards Provable Secure Neighbor Discovery in Wireless Networks
Towards Public Key Infrastructure less authentication in Session Initiation Protocol
Towards Shift Tolerant Visual Secret Sharing Schemes