To search, Click below search items.
All Published Papers Search Service
Title
Critical Infrastructure Cyber Threat ? A Case Study
Author
Y Wangdi, D Veal, S P Maj
Vol. 11 No. 6 pp. 20-23
Keywords
Critical infrastructure, cyber threats, network security
Scrambling and Encrypting- Based Authenticating for Open Networks Communication
M. W. Youssef, Hazem El-Gendy
Vol. 11 No. 6 pp. 24-29
Computer Communications, Computer communications Protocols, Network Security, Authentication, Scrambling, Encryption, Standard Protocols, ISO Open System Interconnections(OSI) Model.
Elliptic Curve Diffie-Hellman Protocol Implementation Using Picoblaze
Makhamisa Senekane, Sehlabaka Qhobosheane, B.M. Taele
Vol. 11 No. 6 pp. 30-34
Diffie-Hellman, Elliptic Curve Cryptography, Field Programmable Gate Array, Galois Field, Picoblaze
A Lossless Effective Method for the Digital Elevation Model Compression for Fast Retrieval Problem
Le Hoang Son, Nguyen Duy Linh, Tran Van Huong, Nguyen Huu Dien
Vol. 11 No. 6 pp. 35-44
DEM compression, Lagrange methods, Parallel Computation, Sliding Windows