To search, Click below search items.
All Published Papers Search Service
Title
Real-Time Symmetric Cryptography using Quaternion Julia Set
Author
P. M. Rubesh Anand, Gaurav Bajpai, Vidhyacharan Bhaskar
Vol. 9 No. 3 pp. 20-26
Keywords
Cryptography, Quaternion Julia set, Symmetric key generation, Real-time encryption
Towards Novel And Efficient Security Architecture For Role-Based Access Control In Grid Computing
M.Nithya, R.S.D.Wahida Banu
Vol. 9 No. 3 pp. 12-19
Grid computing, Grid security, Authorization and Access Control, Role Based Access Control (RBAC), Community Authorization Server (CAS), Virtual Organization (VO), User credentials
Security Verification for Authentication and Key Exchange Protocols
Haruki Ota, Shinsaku Kiyomoto, Toshiaki Tanaka
Vol. 9 No. 3 pp. 1-11
Security Verification Method, Authentication and Key Exchange Protocols, Verification Points, Bellare et al.'s Model, Ubiquitous Environment
Linear Programming and Sensitivity Analysis in Production Planning
Taghrid Imam, Fatma Hassan
Vol. 9 No. 2 pp. 456-465
Linear programming, Integer Programming, Sensitivity analysis, production planning