To search, Click below search items.
All Published Papers Search Service
Title
Secure Communication Using Two Party Authenticated Quantum key Distribution Protocols
Author
S.Venkatramulu, S.Veena
Vol. 10 No. 8 pp. 233-238
Keywords
simulate attacks, provable security, Quantum cryptography, two-party key distribution protocol, provable security
AutoFuzz: Automated Network Protocol Fuzzing Framework
Serge Gorbunov, Arnold Rosenbloom
Vol. 10 No. 8 pp. 239-245
Automated Fuzzing, Software Security, Vulnerability Detection
Improved Proxy Signature Scheme Based on Schnorr¡¯s Scheme with ECC
Asif uddin khan, Banamali Dinda, Jayakrushna Sahoo
Vol. 10 No. 8 pp. 246-249
proxy signature, public key cryptography, ECC, Digital signature, Authentication, Cryptanalysis
Nonlinear filters for preprocessing Heart rate variability signals
N.Kumaravel, C.Santhi
Vol. 10 No. 8 pp. 250-254
Adaptive rank order filter, Adaptive median filter, Ectopic beats, Heart rate variability, Median filter