To search, Click below search items.
All Published Papers Search Service
Title
A Time-Constrained Secure Data-driven Coordination Model
Author
Hua-Ji SHI, Xue-Jun SHAO, Xing-Yi LI
Vol. 7 No. 3 pp. 230-232
Keywords
Access control, Coordination, Hybrid encryption
A Simple Secure M-Commerce Protocol SSMCP
Elias Haddad, Brian King
Vol. 7 No. 3 pp. 220-229
m-commerce, e-commerce, security for mobile devices
A Multicast Island Partitioning Model of OMN Based on Fuzzy Recognition
Deqiang Cheng, Jiansheng Qian
Vol. 7 No. 3 pp. 215-219
Multicast island, Partitioning model, Overlay multicast network, Fuzzy recognition
Application of Genetic Algorithm with Content Scrambling System
Dr. Pushpa R.Suri, Priti Puri
Vol. 7 No. 3 pp. 210-214
Genetic, LFSR, title key, mutation, seed, sector key