To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10600

Title

Security Verification for Authentication and Key Exchange Protocols

Author

Haruki Ota, Shinsaku Kiyomoto, Toshiaki Tanaka

Citation

Vol. 9  No. 3  pp. 1-11

Keywords

Security Verification Method, Authentication and Key Exchange Protocols, Verification Points, Bellare et al.'s Model, Ubiquitous Environment


Title

Linear Programming and Sensitivity Analysis in Production Planning

Author

Taghrid Imam, Fatma Hassan

Citation

Vol. 9  No. 2  pp. 456-465

Keywords

Linear programming, Integer Programming, Sensitivity analysis, production planning


Title

A New Variant Nevine Maurice Ebied¡¯s Key Randomization Counter Measures to Power Analysis Attacks on Elliptic Curve Cryptosystems

Author

E.Kesavulu Reddy, V.V.Lakshmi Prasad

Citation

Vol. 9  No. 2  pp. 446-455

Keywords

Elliptic curve cryptography, Simple power Analysis, Differential Power analysis


Title

User¡¯s authorization in singularity operating system

Author

Rami Matarneh, Suha Al_Jubori

Citation

Vol. 9  No. 2  pp. 439-445

Keywords

Access Controller, Certificate Authority, Access Control Lists, Singularity


[1] ... [prev] [2161] [2162] [2163] [2164] [2165] [2166] [2167] [2168] [2169] [2170] [next] ... [2650]