To search, Click below search items.
All Published Papers Search Service
Title
Elliptic Curve Diffie-Hellman Protocol Implementation Using Picoblaze
Author
Makhamisa Senekane, Sehlabaka Qhobosheane, B.M. Taele
Vol. 11 No. 6 pp. 30-34
Keywords
Diffie-Hellman, Elliptic Curve Cryptography, Field Programmable Gate Array, Galois Field, Picoblaze
Scrambling and Encrypting- Based Authenticating for Open Networks Communication
M. W. Youssef, Hazem El-Gendy
Vol. 11 No. 6 pp. 24-29
Computer Communications, Computer communications Protocols, Network Security, Authentication, Scrambling, Encryption, Standard Protocols, ISO Open System Interconnections(OSI) Model.
Critical Infrastructure Cyber Threat ? A Case Study
Y Wangdi, D Veal, S P Maj
Vol. 11 No. 6 pp. 20-23
Critical infrastructure, cyber threats, network security
A Novel E-cash Payment Protocol Using Trapdoor Hash Function on Smart Mobile Devices
Jian-Sen Wang, Fuw-Yi Yang, Incheon Paik
Vol. 11 No. 6 pp. 12-19
Electronic commerce, E-cash, Trapdoor hash function, Smart mobile devices