To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10600

Title

Network based Security model using Symmetric Key Cryptography (AES 256? Rijndael Algorithm) with Public Key Exchange Protocol (Diffie-Hellman Key Exchange Protocol)

Author

Nitin K. Jharbade, Rajesh Shrivastava

Citation

Vol. 12  No. 8  pp. 69-73

Keywords

AES, Rijndael, Diffie-Hellman, Primitive root, MIM


Title

Camouflage in Malware: from Encryption to Metamorphism

Author

Babak Bashari Rad, Maslin Masrom, Suhaimi Ibrahim

Citation

Vol. 12  No. 8  pp. 74-83

Keywords

Camouflage in Malware, Malware Evolution, Malware Encryption, Malware Oligomorphism, Malware Polymorphism, Malware Metamorphism, Obfuscation Techniques


Title

Secured Public key Authentication and Energy Efficient MAC Implementation in Wireless Sensor Networks

Author

Manoj Challa, M .Damodar Reddy, P. Venkata Subba Reddy, Jitendra Nath Mungara

Citation

Vol. 12  No. 8  pp. 84-89

Keywords

Secured Public key, Authentication, Wireless Sensor Network


Title

Analysis of Residual data for High Efficiency Video Coding (HEVC)

Author

Anis BenHajyoussef, Tahar Ezzedine

Citation

Vol. 12  No. 8  pp. 90-93

Keywords

HEVC, video compression, residual, distortion. DC coefficients


[1] ... [prev] [841] [842] [843] [844] [845] [846] [847] [848] [849] [850] [next] ... [2650]