To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10626

Title

A Hybrid Approach to Key Predistribution for Ubiquitous Sensor Network

Author

Jong Sou Park, Mohammed Golam Sadi, Dong Seong Kim

Citation

Vol. 6  No. 1  pp. 258~264

Keywords

Key predistribution, Ubiquitous sensor network, Information security, symmetric key


Title

Synchronous Counterfeiting Attacks on self-embedding Watermarking Schemes

Author

Hongjie He, Jiashu Zhang, Hongxia Wang

Citation

Vol. 6  No. 1  pp. 251~257

Keywords

Self-embedding watermarking, Counterfeiting attacks, Vector quantization attack, the offset


Title

Cryptanalysis of Sui et al.'s Second ID-based Key Issuing Protocol without Key Escrow

Author

Hyunjue Kim, Seungjoo Kim, Dongho Won

Citation

Vol. 6  No. 1  pp. 247~250

Keywords

ID-based cryptography, Key escrow problem, Secure key issuing


Title

Cryptanalysis of Simplified Data Encryption Standard via Optimisation Heuristics¢Ó

Author

Nalini N, G Raghavendra Rao

Citation

Vol. 6  No. 1  pp. 240~246

Keywords


[1] ... [prev] [2641] [2642] [2643] [2644] [2645] [2646] [2647] [2648] [2649] [2650] [next] ... [2657]