To search, Click below search items.
All Published Papers Search Service
Title
High Performance Elliptic Curve GF(2m) Cryptoprocessor Secure Against Timing Attacks
Author
Turki F. Al-Somani, M. K. Ibrahim
Vol. 6 No. 1 pp. 177~183
Keywords
Elliptic Curves Cryptosystems, Mixed Coordinates, Parallel Designs, Normal Basis
Design of Secure Clustering Routing Protocol using SNEP and ?TESLA on Sensor Network Communication
Kun-Won Jang, Woo-sik Jung, Dong-kyu Shin, Moon-Seog Jun
Vol. 6 No. 1 pp. 171~176
Sensor network, Key management, Clustering, Energy savings
Possible attacks on XML Web Services
Esmiralda Moradian, Anne H?kansson
Vol. 6 No. 1 pp. 154~170
Web Services, SOAP security, XML security, possible attacks, vulnerabilities
Overview on VoIP: Subjective and Objective Measurement Methods
Floriano De Rango, Mauro Tropea, Peppino Fazio, Salvatore Marano
Vol. 6 No. 1 pp. 140~153
VoIP, Subjective measurement method, MOS, Objective measurement method, PESQ, E-Model