All Stories

  1. An efficient and provably secure RFID grouping proof protocol
  2. A trust model based energy detection for cognitive radio networks
  3. Cascading attacks against smart grid using control command disaggregation and services
  4. Policy based security architecture for software defined networks
  5. Anonymous Yoking-Group Proofs
  6. A novel malware for subversion of self-protection in anti-virus
  7. Securing wireless mobile nodes from distributed denial-of-service attacks
  8. Antivirus security: naked during updates