Authenticated-Encryption: Security Notions, Designs and Applications .- New Results on Identity-based Encryption from Quadratic Residuosity.- Efficient techniques for extracting secrets from electronic devices.- Secure and Trusted Application Execution on Embedded Devices.- A Number-Theoretic Error-Correcting Code.- Full duplex OTP cryptosystem based on DNA key for text transmissions.- Evaluation of Lightweight Block Ciphers for Embedded Systems.- SCA Resistance Analysis on FPGA Implementations of Sponge based MAC-PHOTON.- A Novel Fast and Secure Chaos-Based Algorithm for Image Encryption.- A Novel Key Management for Virtually Limitless Key Size.- Efficient Montgomery Multiplication on GPUs.- Applying Cryptographic Acceleration Techniques to Error Correction.- A Cooperative Black Hole Node Detection and Mitigation Approach for MANETs.- Up-high to Down-low: Applying Machine Learning to an Exploit Database.- Detecting Computers in the Cyber Space Maliciously Exploited as SSH Proxies.- On a Lightweight Authentication Protocol for RFID.- Spam Filtering using Automated Classifying Services Over a Cloud Computing Infrastructure.- Contributions to Steganographic Techniques on Mobile Devices.- Secure implementation of Stream cipher: Trivium.- Fast Searching in Image Databases Using Multi-Hash Robust Fingerprinting.

Share This Book: