| Approximate Secrecy Capacity of Gaussian Parallel Relay Networks – PHD IN NS2 |
| Understanding Information Hiding in iOS– PHD IN NS2 |
| On the Secrecy Rate Region of Multiple-Access Wiretap Channel With Noncausal Side Information– PHD IN NS2 |
| Face Spoof Detection With Image Distortion Analysis– PHD IN NS2 |
| Distributed Detection in Tree Networks: Byzantines and Mitigation Techniques– PHD IN NS2 |
| Twofold Video Hashing With Automatic Synchronization– PHD IN NS2 |
| The CEO Problem With Secrecy Constraints– PHD IN NS2 |
| Advanced Joint Bayesian Method for Face Verification– PHD IN NS2 |
| Hill-Climbing Attacks on Multibiometrics Recognition Systems– PHD IN NS2 |
| K-center: An Approach on the Multi-source Identification of Information Diffusion– PHD IN NS2 |
| Cracking More Password Hashes With Patterns– PHD IN NS2 |
| Novel Approach to Protect Advanced Encryption Standard Algorithm Implementation Against Differential Electromagnetic and Power Analysis– PHD IN NS2 |
| Strong, Neutral, or Weak: Exploring the Impostor Score Distribution– PHD IN NS2 |
| StirTraceV2.0: Enhanced Benchmarking and Tuning of Printed Fingerprint Detection– PHD IN NS2 |
| One-Time Spectrum Coexistence in Dynamic Spectrum Access When the Secondary User May Be Malicious– PHD IN NS2 |
| Security-Aware Max–Min Resource Allocation in Multiuser OFDMA Downlink– PHD IN NS2 |
| Anonymous multi-receiver remote data retrieval for pay-TV in public clouds– PHD IN NS2 |
| An Approach to Predict Drive-by-Download Attacks by Vulnerability Evaluation and Opcode– PHD IN NS2 |
| Privacy-Preserving Epidemiological Analysis for a Distributed Database of Hospitals– PHD IN NS2 |
| Dynamic and verifiable multi-secret sharing scheme based on Hermite interpolation and bilinear maps– PHD IN NS2 |
| Parallel key management scheme for mobile ad hoc network based on traffic mining– PHD IN NS2 |
| Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware– PHD IN NS2 |
| Asymptotics of Fingerprinting and Group Testing: Tight Bounds From Channel Capacities– PHD IN NS2 |
| Preliminary Design of a Novel Lightweight Authenticated Encryption Scheme Based on the Sponge Function– PHD IN NS2 |
| Physical Layer Spectrum Usage Authentication In Cognitive Radio: Analysis and Implementation– PHD IN NS2 |
| 2015 IEEE PHD IN NS2 |