-
A Legal and Technical Perspective on Secure Cloud Storage
-
Polybius: Secure Web Single-Sign-On for Legacy Applications
-
Integrity Assurance for RESTful XML
-
Interactive Analysis of NetFlows for Misuse Detection in Large IP Networks
-
Large-scale Network Monitoring for Visual Analysis of Attacks
-
Identifying a Distributed Denial of Service (DDoS) attack within a network and defending against such an attack
-
Indra: A Peer-to-Peer Approach to Network Intrusion Detection and Prevention
-
GOSSIB vs. IP Traceback Rumors
-
EKA: Efficient Keyserver using ALMI
-
The VersaKey Framework: Versatile Group Key Management