To search, Click below search items.
All Published Papers Search Service
Title
A Secure Route Optimization Protocol in Mobile IPV6
Author
D.Kavitha, K.E.Sreenivasa Murthy, S.Zahoor ul Huq
Vol. 9 No. 3 pp. 27-34
Keywords
Authentication, Binding Update, Mobile IPV6, route optimization, Security
Real-Time Symmetric Cryptography using Quaternion Julia Set
P. M. Rubesh Anand, Gaurav Bajpai, Vidhyacharan Bhaskar
Vol. 9 No. 3 pp. 20-26
Cryptography, Quaternion Julia set, Symmetric key generation, Real-time encryption
Towards Novel And Efficient Security Architecture For Role-Based Access Control In Grid Computing
M.Nithya, R.S.D.Wahida Banu
Vol. 9 No. 3 pp. 12-19
Grid computing, Grid security, Authorization and Access Control, Role Based Access Control (RBAC), Community Authorization Server (CAS), Virtual Organization (VO), User credentials
Security Verification for Authentication and Key Exchange Protocols
Haruki Ota, Shinsaku Kiyomoto, Toshiaki Tanaka
Vol. 9 No. 3 pp. 1-11
Security Verification Method, Authentication and Key Exchange Protocols, Verification Points, Bellare et al.'s Model, Ubiquitous Environment