To search, Click below search items.
All Published Papers Search Service
Title
Secure Communication Using Two Party Authenticated Quantum key Distribution Protocols
Author
S.Venkatramulu, S.Veena
Vol. 10 No. 8 pp. 233-238
Keywords
simulate attacks, provable security, Quantum cryptography, two-party key distribution protocol, provable security
ZRLBS: Zone Reputation Based Load Balancing Simulator to Grip Selfish Behavior in Social Networks
P.K. Suri, Kavita Taneja
Vol. 10 No. 8 pp. 224-232
Mobile Ad hoc Network (MANET), Mobile Unit (MU), Selfish Node (SN), Zone Incharge (ZI), Zone Reputation Based Load Balancing Simulator (ZRLBS)
Multiple RFID Tag/Reader Co ? Existence Proof Based On Rabin Cryptosystem
Aik Theng Tan, Dahlan Abdullah, Ronsen Purba, Rahmat Budiarto
Vol. 10 No. 8 pp. 215-223
Rabin Cryptosystem, Symmetric Secret Sharing Key, Asymmetric Secret Key, RFID ? Radio Frequency Identification
Heterogeneous Density Based Spatial Clustering of Application with Noise
J. Hencil Peter, A.Antonysamy
Vol. 10 No. 8 pp. 210-214
Density Different Cluster(s), Variance Density DBSCAN, Heterogeneous Density Clusters