To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10717

Title

Synchronous Counterfeiting Attacks on self-embedding Watermarking Schemes

Author

Hongjie He, Jiashu Zhang, Hongxia Wang

Citation

Vol. 6  No. 1  pp. 251~257

Keywords

Self-embedding watermarking, Counterfeiting attacks, Vector quantization attack, the offset


Title

Cryptanalysis of Sui et al.'s Second ID-based Key Issuing Protocol without Key Escrow

Author

Hyunjue Kim, Seungjoo Kim, Dongho Won

Citation

Vol. 6  No. 1  pp. 247~250

Keywords

ID-based cryptography, Key escrow problem, Secure key issuing


Title

Cryptanalysis of Simplified Data Encryption Standard via Optimisation Heuristics¢Ó

Author

Nalini N, G Raghavendra Rao

Citation

Vol. 6  No. 1  pp. 240~246

Keywords


Title

A Case Study in Applying IT Security Evaluation on Common Criteria to Development Process of MTOS 7.5

Author

Shim ho Kim

Citation

Vol. 6  No. 1  pp. 234~239

Keywords

IT security evaluation, Common Criteria, Development process, MTOS 7.5


[1] ... [prev] [2661] [2662] [2663] [2664] [2665] [2666] [2667] [2668] [2669] [2670] [next] ... [2680]