To search, Click below search items.
All Published Papers Search Service
Title
A Hybrid Approach to Key Predistribution for Ubiquitous Sensor Network
Author
Jong Sou Park, Mohammed Golam Sadi, Dong Seong Kim
Vol. 6 No. 1 pp. 258~264
Keywords
Key predistribution, Ubiquitous sensor network, Information security, symmetric key
Breaking Predictive-Coding-Based Steganography and Modification for Enhanced Security
Guangjie Liu, Yuewei Dai, Zhiquan Wang
Vol. 6 No. 3 pp. 144-149
Steganalysis, Steganography, Information Security, Predictive Coding
Information Security Architecture-Context Aware Access Control Model for Educational Applications
N.DuraiPandian, V.Shanmughaneethi, Dr.C.Chellappan
Vol. 6 No. 12 pp. 197-204
Access Control, RBAC, Information Security, Dynamic Authorization, Context aware Systems, and Authentication
Technologies for 3D Model Watermarking: A Survey
Chang-Min Chou, Din-Chang Tseng
Vol. 7 No. 2 pp. 328-334
3D watermarking, 3D mesh, Digital signature, Copyright protection, information security