To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10675

Title

New Hash Function Based on Chaos Theory (CHA-1)

Author

Mahmoud Maqableh, Azman Bin Samsudin, Mohammad A. Alia

Citation

Vol. 8  No. 2  pp. 20-26

Keywords

Hash Functions, SHA-1, Chaos Theory, Logistic Map and Collision Search Attacks


Title

An Optimal Sensor Architecture for Wi-Fi Intrusion Detection

Author

Zhiqi Tao, Baikunth Nath, Andrew Lonie

Citation

Vol. 8  No. 2  pp. 10-19

Keywords

Wi-Fi network security, IEEE 802.11 network, Network Monitoring, intrusion detection, clustering


Title

Using Elliptic Curves on RFID Tags

Author

Michael Braun, Erwin Hess, Bernd Meyer

Citation

Vol. 8  No. 2  pp. 1-9

Keywords

RFID, Authentication, Elliptic Curve Cryptography, Privacy


Title

An Optimized Scheme for Vertical Partitioning of a Distributed Database

Author

Eltayeb Salih Abuelyaman

Citation

Vol. 8  No. 1  pp. 310-315

Keywords

Distribution, partition, Query, reflexive, symmetry, transitive


[1] ... [prev] [2361] [2362] [2363] [2364] [2365] [2366] [2367] [2368] [2369] [2370] [next] ... [2669]