To search, Click below search items.
All Published Papers Search Service
Title
User¡¯s authorization in singularity operating system
Author
Rami Matarneh, Suha Al_Jubori
Vol. 9 No. 2 pp. 439-445
Keywords
Access Controller, Certificate Authority, Access Control Lists, Singularity
A New Variant Nevine Maurice Ebied¡¯s Key Randomization Counter Measures to Power Analysis Attacks on Elliptic Curve Cryptosystems
E.Kesavulu Reddy, V.V.Lakshmi Prasad
Vol. 9 No. 2 pp. 446-455
Elliptic curve cryptography, Simple power Analysis, Differential Power analysis
Linear Programming and Sensitivity Analysis in Production Planning
Taghrid Imam, Fatma Hassan
Vol. 9 No. 2 pp. 456-465
Linear programming, Integer Programming, Sensitivity analysis, production planning
Security Verification for Authentication and Key Exchange Protocols
Haruki Ota, Shinsaku Kiyomoto, Toshiaki Tanaka
Vol. 9 No. 3 pp. 1-11
Security Verification Method, Authentication and Key Exchange Protocols, Verification Points, Bellare et al.'s Model, Ubiquitous Environment