To search, Click below search items.
All Published Papers Search Service
Title
Authentication Transmission Overhead Between Entities in Mobile Networks
Author
Ja¡¯afer AL-Saraireh, Sufian Yousef
Vol. 6 No. 3 pp. 150-154
Keywords
AuC, Authentication, UMTS, Authentication Vector.
Breaking Predictive-Coding-Based Steganography and Modification for Enhanced Security
Guangjie Liu, Yuewei Dai, Zhiquan Wang
Vol. 6 No. 3 pp. 144-149
Steganalysis, Steganography, Information Security, Predictive Coding
A Modified Version of the Vigenere Algorithm
Phillip I Wilson, Mario Garcia
Vol. 6 No. 3 pp. 140-143
Cryptography, Vigenere, Cypher.
Project Pervasive Association: Toward Acquiring Situations in Sensor Networked Environments
Takeshi Okadome, Takashi Hattori, Kaoru Hiramatsu, Yutaka Yanagisawa
Vol. 6 No. 3 pp. 134-139
real-world semantics, sensor network, situation