To search, Click below search items.
All Published Papers Search Service
Title
Enhancing Authentication Protocol from Unauthorized Access
Author
M.Muthuselvi, P.Jeevananthini, B.Vijayakumar
Vol. 15 No. 1 pp. 123-126
Keywords
Stream authentication, cryptography, content distribution network, trap door functions
Fuzzy-NNARX based Tool for Monitoring and Predicting Patients Conditions using Selected Vital Signs
Cecilia H. Vallejos de Schatz, Fabio K. Schneider, Paulo J. Abatti, Julio C. Nievola
Vol. 15 No. 1 pp. 113-122
Artificial Neural Network, Fuzzy Logic, Recurrent Neural Network, Neural Network Auto-Regressive model with eXogenous inputs, NNARX, Elman
Role of Threshold Cryptography in Securing MANETs
Aasia Samreen, Syed Irfan Hyderv
Vol. 15 No. 1 pp. 106-112
Threshold signature, Proxy signature, Threshold multi-signature, authentication, Threshold cryptography
Secure Transmission Over Remote Group: A New Key Management Prototype
K.Sudha, J.Prem ranjith, S.Ganapathy
Vol. 15 No. 1 pp. 102-105
Access control, ad hoc networks, broadcast, cooperative computing, information security, key management