To search, Click below search items.
All Published Papers Search Service
Title
Compliant Asymmetric Authenticated Encryption Scheme for JPEG2000 Code-streams
Author
Jinyong Fang, Jun Sun, Haifeng Qian
Vol. 6 No. 11 pp. 272-276
Keywords
Authenticated encryption, Compliant encryption structure, JPSEC, JPEG2000
A New Fair Weighted Fair Queuing Scheduling Algorithm in Differentiated Services Network
M. A. Elshaikh, M. Othman, S. Shamala, J. Desa
Vol. 6 No. 11 pp. 267-271
Diffserv, FWFQ, Scheduling, QoS
Privacy-Preserving Mining of Association Rules on Distributed Databases
Chin-Chen Chang, Jieh-Shan Yeh, Yu-Chiang Li
Vol. 6 No. 11 pp. 259-266
data mining, frequent itemset, privacy-preserving, security
An Efficient Attack-Resistant Trust Model for P2P Networks
Chunqi Tian, Shihong Zou, Wendong Wang, Shiduan Cheng
Vol. 6 No. 11 pp. 251-258
Peer-to-Peer, trust, credibility, local trust value.