• Towards an Autonomic Security System for Mobile Ad Hoc Networks

  • Secure E-Commerce Protocol for Purchase of e-Goods - Using Smart Card

  • Hierarchical Multi-Party Key Agreement for Wireless Networks

  • Enforcing Privacy by Means of an Ontology Driven XACML Framework

  • Organized Anonymous Agents

  • Non-Stationary Markov Models and Anomaly Propagation Analysis in IDS

  • FPGA/ASIC based Cryptographic Object Store System

  • Program Fragmentation as a Metamorphic Software Protection

  • A Purpose-Based Access Control Model

  • Modeling Security Protocols as Games