A new trust region filter algorithm
Breaking a chaos-based secure communication scheme designed by an improved modulation method
A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
Cryptanalysis of the RCES/RSES image encryption scheme
Baptista-type chaotic cryptosystems: problems and countermeasures
Improving security of a chaotic encryption approach
miR-223 regulates migration and invasion by targeting Artemin in human esophageal carcinoma
Security problems with improper implementations of improved FEA-M
Diffuse biliary tract injury after orthotopic liver transplantation
Human/User-Centric Security
From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?
recommendation letter
From Captchas to Captchæckers: Can we automate usability and security evaluation of CAPTCHAs?