To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10675

Title

Security Enhancement of Pairing and Authentication Process of Bluetooth

Author

Ariful Alam, Mohammad Ibrahim Khan

Citation

Vol. 10  No. 6  pp. 243-249

Keywords

Bluetooth, Man-in-the-middle attack, Authentication, Secure Simple Pairing, Diffie-Hellman cryptography, Vernam Cipher


Title

Simulator for Identifying Critical Components for Testing in a Component Based Software System

Author

P K Suri, Sandeep Kumar

Citation

Vol. 10  No. 6  pp. 250-257

Keywords

Component, Component Based software, Testing, Component Execution Graph (CEG), Simulation, Erlang


Title

Energy Efficient High Throughput MAC Protocol Analysis for Wireless AD Hoc Networks

Author

Humaira Nishat, Shakeel Ahmed, D.Srinivasa Rao

Citation

Vol. 10  No. 6  pp. 258-263

Keywords

Wireless ad hoc networks, IEEE 802.11, throughput, MAC protocol


Title

Kleptographic Attacks on Elliptic Curve Signatures

Author

Elsayed Mohamed, Hassan Elkamchouchi

Citation

Vol. 10  No. 6  pp. 264-267

Keywords

Elliptic Curve, Kleptography, Subliminal Channel, SETUP, ECDSA, Signature


[1] ... [prev] [651] [652] [653] [654] [655] [656] [657] [658] [659] [660] [next] ... [2669]