To search, Click below search items.
All Published Papers Search Service
Title
Using Elliptic Curves on RFID Tags
Author
Michael Braun, Erwin Hess, Bernd Meyer
Vol. 8 No. 2 pp. 1-9
Keywords
RFID, Authentication, Elliptic Curve Cryptography, Privacy
An Optimal Sensor Architecture for Wi-Fi Intrusion Detection
Zhiqi Tao, Baikunth Nath, Andrew Lonie
Vol. 8 No. 2 pp. 10-19
Wi-Fi network security, IEEE 802.11 network, Network Monitoring, intrusion detection, clustering
New Hash Function Based on Chaos Theory (CHA-1)
Mahmoud Maqableh, Azman Bin Samsudin, Mohammad A. Alia
Vol. 8 No. 2 pp. 20-26
Hash Functions, SHA-1, Chaos Theory, Logistic Map and Collision Search Attacks
Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms
Y.Dhanalakshmi, I. Ramesh Babu
Vol. 8 No. 2 pp. 27-32
Data Mining algorithms, Apriori, Fuzzy logic, Genetic algorithms