To search, Click below search items.
All Published Papers Search Service
Title
An Improved Deniable Authentication Protocol
Author
Chia-Chen Lin, Chin-Chen Chang
Vol. 6 No. 11 pp. 240-243
Keywords
Deniable authentication, mutual authentication, PIM attack.
KAMFEE-X64 Cipher
Ahmed ElShafee
Vol. 12 No. 10 pp. 36-44
X64 systems, block cipher, rotor cipher, brute force attack.
Anti ? Counterfeiting Detection for Near Field Communication (NFC) ? Enabled Logistics
Manmeet Mahinderjit Singh, Tan Han Yee, and Rohail Hassan
Vol. 18 No. 2 pp. 63-73
Near Field Communication (NFC), Tags, Counterfeiting, J48 technique, Logistics, Security attack.
IoT Security and Machine Learning
Sarah Almalki, Hatim Alsuwat, Dr. Emad Alsuwat
Vol. 22 No. 5 pp. 103-114
Internet of Things; IoT security and privacy; machine learning; deep learning; IoT attack.