To search, Click below search items.
All Published Papers Search Service
Title
Implementation of Pinkas Partial Matching (PM)-Semi Honest Protocol Using Mixed Multiplicative Homomorphic Encryption (MMH) For Location Based Services (LBS)
Author
Levent Ertaul, Saleha Shakoor
Vol. 15 No. 3 pp. 1-10
Keywords
Private-Set Matching & Intersection, Location Tags, MMH encryption, Location Based Services, PM-Semi-Honest Protocol.
Cryptographic Mutual Authentication System with HMAC for Networking Application
Ansu Merin Varughese, M.Lakshmi
Vol. 15 No. 2 pp. 119-122
authentication, challenge-response, client challenge, server challenge, hash message authentication code
A Modified Aodv Protocol to Detect and Prevent The Wormhole: A Hybrid Approach
Neha Sahu, Deepak Singh Tomar, Neelam Pathak
Vol. 15 No. 2 pp. 115-118
Adhoc network, wormhole, threshold, AODV
An Efficient Location and Detection (ELD) based Mobile ad-hoc networks implementation with Embedded Systems
RAJARAM.M, V.SUMATHY
Vol. 15 No. 2 pp. 103-114
Adhoc networks, Location, Detection attacks, Scalability benefits, Tiny 2.OS