To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10600

Title

User¡¯s authorization in singularity operating system

Author

Rami Matarneh, Suha Al_Jubori

Citation

Vol. 9  No. 2  pp. 439-445

Keywords

Access Controller, Certificate Authority, Access Control Lists, Singularity


Title

A New Variant Nevine Maurice Ebied¡¯s Key Randomization Counter Measures to Power Analysis Attacks on Elliptic Curve Cryptosystems

Author

E.Kesavulu Reddy, V.V.Lakshmi Prasad

Citation

Vol. 9  No. 2  pp. 446-455

Keywords

Elliptic curve cryptography, Simple power Analysis, Differential Power analysis


Title

Linear Programming and Sensitivity Analysis in Production Planning

Author

Taghrid Imam, Fatma Hassan

Citation

Vol. 9  No. 2  pp. 456-465

Keywords

Linear programming, Integer Programming, Sensitivity analysis, production planning


Title

Security Verification for Authentication and Key Exchange Protocols

Author

Haruki Ota, Shinsaku Kiyomoto, Toshiaki Tanaka

Citation

Vol. 9  No. 3  pp. 1-11

Keywords

Security Verification Method, Authentication and Key Exchange Protocols, Verification Points, Bellare et al.'s Model, Ubiquitous Environment


[1] ... [prev] [481] [482] [483] [484] [485] [486] [487] [488] [489] [490] [next] ... [2650]