Detection of Insider Attacks to the Web Server
Rethinking IP Mobility Management
A Special Purpose Signature Scheme for Secure Computation of Traffic in a Distributed Network
Digital scene of crime: technique of profiling users
Security Analysis of Oine E-cash Systems with Malicious Insider
A New Efficient Verifiable Fuzzy Keyword Search Scheme
A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search
PKI Based Signcryption without Pairing: an Efficient Scheme with Tight Security Reduction
Never Die Network Based on Cognitive Wireless Network and Satellite System for Large Scale Disaster
A Thief among Us: The Use of Finite-State Machines to Dissect Insider Threat in Cloud Communications