Security Publications
Towards blind detection of low-rate spatial embedding in image steganalysis Modeling and Optimization of Straggling Mappers Performance Modeling and Optimization of MapReduce Security Weaknesses in PGP Protocol Eigenvalues-based LSB steganalysis Image steganalysis based on SVD and noise estimation: Improve sensitivity to spatial LSB embedding families Multi-dimensional correlation steganalysis Game-theoretic approach to mitigate packet dropping in wireless ad-hoc networks Risk of attack coefficient effect on availability of adhoc networks Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup (PIAKAP) Locally Multi-path Adaptive Routing Protocol Resilient to Selfishness and Wormholes Extended Authentication and Key Agreement Protocol of UMTS