To search, Click below search items.
All Published Papers Search Service
Title
A Novel Approach for Keyboard Dynamics Authentication based on Fusion of Stochastic Classifiers
Author
A. Rezaei, S. Mirzakochaki
Vol. 12 No. 8 pp. 60-68
Keywords
Authentication, Imposter, keyboard dynamics, Linear discriminant classifier (LDC), quadratic discriminat classifer (QDC), k-nearest neighbor classifier (K-NN), Classifier combination, Discriminant functions
Network based Security model using Symmetric Key Cryptography (AES 256? Rijndael Algorithm) with Public Key Exchange Protocol (Diffie-Hellman Key Exchange Protocol)
Nitin K. Jharbade, Rajesh Shrivastava
Vol. 12 No. 8 pp. 69-73
AES, Rijndael, Diffie-Hellman, Primitive root, MIM
Camouflage in Malware: from Encryption to Metamorphism
Babak Bashari Rad, Maslin Masrom, Suhaimi Ibrahim
Vol. 12 No. 8 pp. 74-83
Camouflage in Malware, Malware Evolution, Malware Encryption, Malware Oligomorphism, Malware Polymorphism, Malware Metamorphism, Obfuscation Techniques
Secured Public key Authentication and Energy Efficient MAC Implementation in Wireless Sensor Networks
Manoj Challa, M .Damodar Reddy, P. Venkata Subba Reddy, Jitendra Nath Mungara
Vol. 12 No. 8 pp. 84-89
Secured Public key, Authentication, Wireless Sensor Network