Paper Recommendation
1982 Cryptography and Data Security

1997 Low Power Signal Processing Architectures For Network Microsensors

1994 Electronic Marking and Identification Techniques To Discourage Document Copying

1996 Digital Watermarks For Audio Signals

1981 Cryptography - A New Dimension in Computer Data Security

1984 Security For Computer Networks: An introduction To Data Security in Teleprocessing and Electronic Funds Transfer

1999 Multicast Security: A Taxonomy and Some Efficient Constructions

1988 Protocol Failures in Cryptosystems

1996 Role-based Access Control Models

1982 Development of A New Type Fault Locator Using The one-Terminal Voltage and Current Data


1996 Cooperating Security Managers: A Peer-based intrusion Detection System

2010 Information and Communications Security

1998 Towards Mobile Cryptography

1988 A Survey of information Authentication

2000 PicoRadio Supports Ad Hoc Ultra-low Power Wireless Networking

2009 Advances in Cryptology - CRYPTO 2009

1988 The First Ten Years of Public-key Cryptography

1990 Information Transmission, Modulation, and Noise

2009 Understanding android Security