To search, Click below search items.
All Published Papers Search Service
Title
Analysis of Residual data for High Efficiency Video Coding (HEVC)
Author
Anis BenHajyoussef, Tahar Ezzedine
Vol. 12 No. 8 pp. 90-93
Keywords
HEVC, video compression, residual, distortion. DC coefficients
Secured Public key Authentication and Energy Efficient MAC Implementation in Wireless Sensor Networks
Manoj Challa, M .Damodar Reddy, P. Venkata Subba Reddy, Jitendra Nath Mungara
Vol. 12 No. 8 pp. 84-89
Secured Public key, Authentication, Wireless Sensor Network
Camouflage in Malware: from Encryption to Metamorphism
Babak Bashari Rad, Maslin Masrom, Suhaimi Ibrahim
Vol. 12 No. 8 pp. 74-83
Camouflage in Malware, Malware Evolution, Malware Encryption, Malware Oligomorphism, Malware Polymorphism, Malware Metamorphism, Obfuscation Techniques
Network based Security model using Symmetric Key Cryptography (AES 256? Rijndael Algorithm) with Public Key Exchange Protocol (Diffie-Hellman Key Exchange Protocol)
Nitin K. Jharbade, Rajesh Shrivastava
Vol. 12 No. 8 pp. 69-73
AES, Rijndael, Diffie-Hellman, Primitive root, MIM