To search, Click below search items.
All Published Papers Search Service
Title
A Visual Information Encryption Scheme Based on Visual Cryptography and D-H Key Agreement Scheme
Author
Chao-Wen Chan, Yi-Da Wu
Vol. 8 No. 4 pp. 128-132
Keywords
Visual cryptography, secret sharing, toral automorphism, key agreement
A new Technique using Signal Correlation of One Node B to Estimate Mobile Location
Keeratpal Singh, Mahamod Ismail, Kasmiran Jumari
Vol. 8 No. 4 pp. 133-139
Location Determining Techniques, Positioning in UMTS, Location Based Services, Neural Network
Data and Event Stream Mining
Kavya Naveen, M.V.Sathyanarayana, N.C. Naveen
Vol. 8 No. 4 pp. 140-143
Mining, event streams, constraint ?based mining, data streams, knowledge
A Threshold Determining Method for the Dynamic Filtering in Wireless Sensor Networks Based on Fuzzy Logic
Sang Jin Lee, Hae Young Lee, Tae Ho Cho
Vol. 8 No. 4 pp. 155-159
sensor networks, false reports, en-route filtering, false data injection attack, fuzzy logic, security