Analysis of information leakage from encrypted Skype conversations Benoît DupasquierStefan BurschkaSakir Sezer Regular Contribution 24 July 2010 Pages: 313 - 325
Flowchart description of security primitives for controlled physical unclonable functions Boris ŠkorićMarc X. Makkes Regular Contribution 03 August 2010 Pages: 327 - 335
Using contourlet transform and cover selection for secure steganography Hedieh SajediMansour Jamzad Regular Contribution 05 August 2010 Pages: 337 - 352
A hybrid scheme for securing fingerprint templates Haiyong ChenHailiang Chen Regular Contribution 02 September 2010 Pages: 353 - 361
Regular 2 w -ary right-to-left exponentiation algorithm with very efficient DPA and FA countermeasures Yoo-Jin Baek Regular Contribution 24 September 2010 Pages: 363 - 370