To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10750

Title

A Hybrid Approach to Key Predistribution for Ubiquitous Sensor Network

Author

Jong Sou Park, Mohammed Golam Sadi, Dong Seong Kim

Citation

Vol. 6  No. 1  pp. 258~264

Keywords

Key predistribution, Ubiquitous sensor network, Information security, symmetric key


Title

Synchronous Counterfeiting Attacks on self-embedding Watermarking Schemes

Author

Hongjie He, Jiashu Zhang, Hongxia Wang

Citation

Vol. 6  No. 1  pp. 251~257

Keywords

Self-embedding watermarking, Counterfeiting attacks, Vector quantization attack, the offset


Title

Cryptanalysis of Sui et al.'s Second ID-based Key Issuing Protocol without Key Escrow

Author

Hyunjue Kim, Seungjoo Kim, Dongho Won

Citation

Vol. 6  No. 1  pp. 247~250

Keywords

ID-based cryptography, Key escrow problem, Secure key issuing


Title

Cryptanalysis of Simplified Data Encryption Standard via Optimisation Heuristics¢Ó

Author

Nalini N, G Raghavendra Rao

Citation

Vol. 6  No. 1  pp. 240~246

Keywords


[1] ... [prev] [2671] [2672] [2673] [2674] [2675] [2676] [2677] [2678] [2679] [2680] [next] ... [2688]