A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics. [Citation Graph (, )][DBLP]
Security in Quantum Networks as an Optimization Problem. [Citation Graph (, )][DBLP]
Finding Preimages of Multiple Passwords Secured with VSH. [Citation Graph (, )][DBLP]
Choosing Parameters to Achieve a Higher Success Rate for Hellman Time Memory Trade Off Attack. [Citation Graph (, )][DBLP]
Generalized Robust Combiners for Oblivious Transfer. [Citation Graph (, )][DBLP]
Including Security Rules Support in an MDA Approach for Secure DWs. [Citation Graph (, )][DBLP]
A System of Privacy Preserving Distributed Spatial Data Warehouse Using Relation Decomposition. [Citation Graph (, )][DBLP]
Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs. [Citation Graph (, )][DBLP]
Novel Algorithms for Subgroup Detection in Terrorist Networks. [Citation Graph (, )][DBLP]
QR-TAN: Secure Mobile Transaction Authentication. [Citation Graph (, )][DBLP]
An Authentication Watermark Algorithm for JPEG images. [Citation Graph (, )][DBLP]
A New Watermarking Attack Using Long-Range Correlation Image Restoration. [Citation Graph (, )][DBLP]
The Case for a Simpler Security Model in Grid Computing. [Citation Graph (, )][DBLP]
Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trusting Robots. [Citation Graph (, )][DBLP]
Position Paper: Secure Infrastructure for Scientific Data Life Cycle Management. [Citation Graph (, )][DBLP]
A Robust Image Watermarking Method in Wavelet Domain Using Genetic Algorithm. [Citation Graph (, )][DBLP]
An Efficient Measurement of Object Oriented Design Vulnerability. [Citation Graph (, )][DBLP]
FORVEST: A Support Tool for Formal Verification of Security Specifications with ISO/IEC 15408. [Citation Graph (, )][DBLP]
Using Hybrid Trust Model for Handling Inaccurate Resource. [Citation Graph (, )][DBLP]
A High Speed and Low Cost Error Correction Technique for the Carry Select Adder. [Citation Graph (, )][DBLP]
An Improvement of REM: A Replication Oriented Event-Based Middleware. [Citation Graph (, )][DBLP]
Patterns to Support the Development of Privacy Policies. [Citation Graph (, )][DBLP]
Multidimensional Management of Information Security - A Metrics Based Approach Merging Business and Information Security Topics. [Citation Graph (, )][DBLP]
A Security Management Assurance Model to Holistically Assess the Information Security Posture. [Citation Graph (, )][DBLP]
Methodology to Align Business and IT Policies: Use Case from an IT Company. [Citation Graph (, )][DBLP]
On the Higher Order Nonlinearities of Boolean Functions and S-boxes. [Citation Graph (, )][DBLP]
A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier. [Citation Graph (, )][DBLP]
A Standard MIDI File Steganography Based on Fluctuation of Duration. [Citation Graph (, )][DBLP]
A Signature Scheme Associated with Universal Re-signcryption. [Citation Graph (, )][DBLP]
Real-Time Audio Watermarking with Wavetable Alternation in Digital Instrument. [Citation Graph (, )][DBLP]
A Reconfigurable-Permutation Algorithm for M_S-Box. [Citation Graph (, )][DBLP]
Protecting Global and Static Variables from Buffer Overflow Attacks. [Citation Graph (, )][DBLP]
Static Code Analysis to Detect Software Security Vulnerabilities - Does Experience Matter? [Citation Graph (, )][DBLP]
hACMEgame: A Tool for Teaching Software Security. [Citation Graph (, )][DBLP]
Towards Evaluation of Security Assurance during the Software Development Lifecycle. [Citation Graph (, )][DBLP]
An Architectural Foundation for Security Model Sharing and Reuse. [Citation Graph (, )][DBLP]
A Knowledge Management Approach to Support a Secure Software Development. [Citation Graph (, )][DBLP]
A Practical Framework for the Dataflow Pointcut in AspectJ. [Citation Graph (, )][DBLP]
SecureMDD: A Model-Driven Development Method for Secure Smart Card Applications. [Citation Graph (, )][DBLP]
Linking Privacy Solutions to Developer Goals. [Citation Graph (, )][DBLP]
Software Inspections Using Guided Checklists to Ensure Security Goals. [Citation Graph (, )][DBLP]
Enterprise-Oriented Digital Rights Management Mechanism: eDRM. [Citation Graph (, )][DBLP]
Utility and Risk of JPEG-Based Continuous Microdata Protection Methods. [Citation Graph (, )][DBLP]
Towards Efficient ID-Based Signature Schemes with Batch Verifications from Bilinear Pairings. [Citation Graph (, )][DBLP]
Yet Another Sanitizable Signature from Bilinear Maps. [Citation Graph (, )][DBLP]
Generation of Prototypes for Masking Sequences of Events. [Citation Graph (, )][DBLP]
Enhancing Control of Service Compositions in Service-Oriented Architectures. [Citation Graph (, )][DBLP]
Truly Anonymous Paper Submission and Review Scheme. [Citation Graph (, )][DBLP]
An Implementation of the Binding Mechanism in the Web Browser for Preventing XSS Attacks: Introducing the Bind-Value Headers. [Citation Graph (, )][DBLP]
Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network Packets. [Citation Graph (, )][DBLP]
Automated Instruction-Set Randomization for Web Applications in Diversified Redundant Systems. [Citation Graph (, )][DBLP]
An Improvement to a Decentralized Management Method for Uniquely Accessible Attribute Information. [Citation Graph (, )][DBLP]
Making Use of Human Visual Capability to Improve Information Security. [Citation Graph (, )][DBLP]
Enhancement of Forensic Computing Investigations through Memory Forensic Techniques. [Citation Graph (, )][DBLP]
Improving Performance in Digital Forensics: A Case Using Pattern Matching Board. [Citation Graph (, )][DBLP]
Computer Forensics in Japan: A Preliminary Study. [Citation Graph (, )][DBLP]
Enhancing Computer Forensics Investigation through Visualisation and Data Exploitation. [Citation Graph (, )][DBLP]