To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10675

Title

Critical Infrastructure Cyber Threat ? A Case Study

Author

Y Wangdi, D Veal, S P Maj

Citation

Vol. 11  No. 6  pp. 20-23

Keywords

Critical infrastructure, cyber threats, network security


Title

Scrambling and Encrypting- Based Authenticating for Open Networks Communication

Author

M. W. Youssef, Hazem El-Gendy

Citation

Vol. 11  No. 6  pp. 24-29

Keywords

Computer Communications, Computer communications Protocols, Network Security, Authentication, Scrambling, Encryption, Standard Protocols, ISO Open System Interconnections(OSI) Model.


Title

Elliptic Curve Diffie-Hellman Protocol Implementation Using Picoblaze

Author

Makhamisa Senekane, Sehlabaka Qhobosheane, B.M. Taele

Citation

Vol. 11  No. 6  pp. 30-34

Keywords

Diffie-Hellman, Elliptic Curve Cryptography, Field Programmable Gate Array, Galois Field, Picoblaze


Title

A Lossless Effective Method for the Digital Elevation Model Compression for Fast Retrieval Problem

Author

Le Hoang Son, Nguyen Duy Linh, Tran Van Huong, Nguyen Huu Dien

Citation

Vol. 11  No. 6  pp. 35-44

Keywords

DEM compression, Lagrange methods, Parallel Computation, Sliding Windows


[1] ... [prev] [751] [752] [753] [754] [755] [756] [757] [758] [759] [760] [next] ... [2669]