To search, Click below search items.
All Published Papers Search Service
Title
Security Enhancement of Pairing and Authentication Process of Bluetooth
Author
Ariful Alam, Mohammad Ibrahim Khan
Vol. 10 No. 6 pp. 243-249
Keywords
Bluetooth, Man-in-the-middle attack, Authentication, Secure Simple Pairing, Diffie-Hellman cryptography, Vernam Cipher
Simulator for Identifying Critical Components for Testing in a Component Based Software System
P K Suri, Sandeep Kumar
Vol. 10 No. 6 pp. 250-257
Component, Component Based software, Testing, Component Execution Graph (CEG), Simulation, Erlang
Energy Efficient High Throughput MAC Protocol Analysis for Wireless AD Hoc Networks
Humaira Nishat, Shakeel Ahmed, D.Srinivasa Rao
Vol. 10 No. 6 pp. 258-263
Wireless ad hoc networks, IEEE 802.11, throughput, MAC protocol
Kleptographic Attacks on Elliptic Curve Signatures
Elsayed Mohamed, Hassan Elkamchouchi
Vol. 10 No. 6 pp. 264-267
Elliptic Curve, Kleptography, Subliminal Channel, SETUP, ECDSA, Signature