To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10849

Title

Critical Infrastructure Cyber Threat ? A Case Study

Author

Y Wangdi, D Veal, S P Maj

Citation

Vol. 11  No. 6  pp. 20-23

Keywords

Critical infrastructure, cyber threats, network security


Title

A Novel E-cash Payment Protocol Using Trapdoor Hash Function on Smart Mobile Devices

Author

Jian-Sen Wang, Fuw-Yi Yang, Incheon Paik

Citation

Vol. 11  No. 6  pp. 12-19

Keywords

Electronic commerce, E-cash, Trapdoor hash function, Smart mobile devices


Title

A New EAP Authentication Method for IEEE 802.11 Wireless

Author

Younes El Hajjaji El Idrissi, Noureddine Zahid, Mohamed Jedra

Citation

Vol. 11  No. 6  pp. 1-11

Keywords

Wireless network, security protocol, Access control, EAP, HPSL


Title

Two-stage image denoising by Principal Component Analysis with Self Similarity pixel Strategy

Author

K. John Peter, K. Senthamarai Kannan, S. Arumugan, G.Nagarajan

Citation

Vol. 11  No. 5  pp. 296-300

Keywords

Demosaicking, Gradient, Mosaic Image, Local Similarities, Mosaic, CFA


[1] ... [prev] [1951] [1952] [1953] [1954] [1955] [1956] [1957] [1958] [1959] [1960] [next] ... [2713]