To search, Click below search items.
All Published Papers Search Service
Title
Network based Security model using Symmetric Key Cryptography (AES 256? Rijndael Algorithm) with Public Key Exchange Protocol (Diffie-Hellman Key Exchange Protocol)
Author
Nitin K. Jharbade, Rajesh Shrivastava
Vol. 12 No. 8 pp. 69-73
Keywords
AES, Rijndael, Diffie-Hellman, Primitive root, MIM
Camouflage in Malware: from Encryption to Metamorphism
Babak Bashari Rad, Maslin Masrom, Suhaimi Ibrahim
Vol. 12 No. 8 pp. 74-83
Camouflage in Malware, Malware Evolution, Malware Encryption, Malware Oligomorphism, Malware Polymorphism, Malware Metamorphism, Obfuscation Techniques
Secured Public key Authentication and Energy Efficient MAC Implementation in Wireless Sensor Networks
Manoj Challa, M .Damodar Reddy, P. Venkata Subba Reddy, Jitendra Nath Mungara
Vol. 12 No. 8 pp. 84-89
Secured Public key, Authentication, Wireless Sensor Network
Analysis of Residual data for High Efficiency Video Coding (HEVC)
Anis BenHajyoussef, Tahar Ezzedine
Vol. 12 No. 8 pp. 90-93
HEVC, video compression, residual, distortion. DC coefficients