To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10822

Title

A Hybrid Approach to Key Predistribution for Ubiquitous Sensor Network

Author

Jong Sou Park, Mohammed Golam Sadi, Dong Seong Kim

Citation

Vol. 6  No. 1  pp. 258~264

Keywords

Key predistribution, Ubiquitous sensor network, Information security, symmetric key


Title

Synchronous Counterfeiting Attacks on self-embedding Watermarking Schemes

Author

Hongjie He, Jiashu Zhang, Hongxia Wang

Citation

Vol. 6  No. 1  pp. 251~257

Keywords

Self-embedding watermarking, Counterfeiting attacks, Vector quantization attack, the offset


Title

Cryptanalysis of Sui et al.'s Second ID-based Key Issuing Protocol without Key Escrow

Author

Hyunjue Kim, Seungjoo Kim, Dongho Won

Citation

Vol. 6  No. 1  pp. 247~250

Keywords

ID-based cryptography, Key escrow problem, Secure key issuing


Title

Cryptanalysis of Simplified Data Encryption Standard via Optimisation Heuristics¢Ó

Author

Nalini N, G Raghavendra Rao

Citation

Vol. 6  No. 1  pp. 240~246

Keywords


[1] ... [prev] [2691] [2692] [2693] [2694] [2695] [2696] [2697] [2698] [2699] [2700] [next] ... [2706]