To search, Click below search items.
All Published Papers Search Service
Title
Algorithm for RNA Pseudoknots Prediction
Author
Hengwu li, Daming Zhu
Vol. 6 No. 1 pp. 265~272
Keywords
RNA secondary structure, dynamic programming, thermodynamics, NP-complete
A Hybrid Approach to Key Predistribution for Ubiquitous Sensor Network
Jong Sou Park, Mohammed Golam Sadi, Dong Seong Kim
Vol. 6 No. 1 pp. 258~264
Key predistribution, Ubiquitous sensor network, Information security, symmetric key
Synchronous Counterfeiting Attacks on self-embedding Watermarking Schemes
Hongjie He, Jiashu Zhang, Hongxia Wang
Vol. 6 No. 1 pp. 251~257
Self-embedding watermarking, Counterfeiting attacks, Vector quantization attack, the offset
Cryptanalysis of Sui et al.'s Second ID-based Key Issuing Protocol without Key Escrow
Hyunjue Kim, Seungjoo Kim, Dongho Won
Vol. 6 No. 1 pp. 247~250
ID-based cryptography, Key escrow problem, Secure key issuing