91 | -- | 112 | Rakesh Kumar, Geetu Mahajan. A novel framework for secure file transmission using modified AES and MD5 algorithms |
113 | -- | 139 | Raphaƫl Khoury, Nadia Tawbi. Equivalence-preserving corrective enforcement of security properties |
140 | -- | 159 | Peng Wang, Chinya V. Ravishankar. Hierarchical policy delegation in multiple-authority ABE |
160 | -- | 176 | William R. Mahoney. Modifications to GCC for increased software privacy |
177 | -- | 195 | M. Thangavel, P. Varalakshmi, Mukund Murrali, K. Nithya. Secure file storage and retrieval in cloud |
196 | -- | 215 | Ratnakirti Roy, Shabnam Samima, Suvamoy Changder. A map-based image steganography scheme for RGB images |
216 | -- | 239 | Georgios Mantas, Natalia Stakhanova, Hugo Gonzalez, Hossein Hadian Jazi, Ali A. Ghorbani. Application-layer denial of service attacks: taxonomy and survey |
240 | -- | 254 | Jonathan Pan. Data leakage triage: quantitative measure of effectiveness of containment plan |