To search, Click below search items.
All Published Papers Search Service
Title
A Hybrid Approach to Key Predistribution for Ubiquitous Sensor Network
Author
Jong Sou Park, Mohammed Golam Sadi, Dong Seong Kim
Vol. 6 No. 1 pp. 258~264
Keywords
Key predistribution, Ubiquitous sensor network, Information security, symmetric key
Synchronous Counterfeiting Attacks on self-embedding Watermarking Schemes
Hongjie He, Jiashu Zhang, Hongxia Wang
Vol. 6 No. 1 pp. 251~257
Self-embedding watermarking, Counterfeiting attacks, Vector quantization attack, the offset
Cryptanalysis of Sui et al.'s Second ID-based Key Issuing Protocol without Key Escrow
Hyunjue Kim, Seungjoo Kim, Dongho Won
Vol. 6 No. 1 pp. 247~250
ID-based cryptography, Key escrow problem, Secure key issuing
Cryptanalysis of Simplified Data Encryption Standard via Optimisation Heuristics¢Ó
Nalini N, G Raghavendra Rao
Vol. 6 No. 1 pp. 240~246