To search, Click below search items.
All Published Papers Search Service
Title
Prevention of Impersonation Attack in Wireless Mobile Ad hoc Networks
Author
Latha Tamilselvan, Dr. V. Sankaranarayanan
Vol. 7 No. 3 pp. 118-123
Keywords
Security, Ad hoc Networks, Routing Protocols, Hash Chains, Secure AODV, Digital Signature
Block-sliced DRM System for Secure Multi-Media Contents
Tae-Chul Jung, Moon-Seog Jun
Vol. 7 No. 10 pp. 234-241
Hash Chain, DRM, DOI, OTP, Multimedia Contents
Security Vulnerabilities and Solutions in Mobile WiMAX
Andreas Deininger, Shinsaku Kiyomoto, Jun Kurihara, Toshiaki Tanaka
Vol. 7 No. 11 pp. 7-15
IEEE 802.16e security, multi- and broadcast service, shared key vulnerability, hash chaining solution
A Method for Detecting the Exposure of a Secret Key in Key-Insulated Scheme
Younggyo Lee, Dongho Won
Vol. 8 No. 9 pp. 13-20
key-insulated signature, one-time hash chain, NOVOMODO, PSD