To search, Click below search items.
All Published Papers Search Service
Title
Security Verification for Authentication and Key Exchange Protocols
Author
Haruki Ota, Shinsaku Kiyomoto, Toshiaki Tanaka
Vol. 9 No. 3 pp. 1-11
Keywords
Security Verification Method, Authentication and Key Exchange Protocols, Verification Points, Bellare et al.'s Model, Ubiquitous Environment
Towards Novel And Efficient Security Architecture For Role-Based Access Control In Grid Computing
M.Nithya, R.S.D.Wahida Banu
Vol. 9 No. 3 pp. 12-19
Grid computing, Grid security, Authorization and Access Control, Role Based Access Control (RBAC), Community Authorization Server (CAS), Virtual Organization (VO), User credentials
Real-Time Symmetric Cryptography using Quaternion Julia Set
P. M. Rubesh Anand, Gaurav Bajpai, Vidhyacharan Bhaskar
Vol. 9 No. 3 pp. 20-26
Cryptography, Quaternion Julia set, Symmetric key generation, Real-time encryption
A Secure Route Optimization Protocol in Mobile IPV6
D.Kavitha, K.E.Sreenivasa Murthy, S.Zahoor ul Huq
Vol. 9 No. 3 pp. 27-34
Authentication, Binding Update, Mobile IPV6, route optimization, Security