The advanced encryption standard
Cryptologia
Computer security: theory, process and management
Journal of Computing Sciences in Colleges
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Embedding Security in Wireless Embedded Systems
VLSID '03 Proceedings of the 16th International Conference on VLSI Design
Security Requirements for Management Systems Using Mobile Agents
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
Fast Secure Processor for Inhibiting Software Piracy and Tampering
Proceedings of the 36th annual IEEE/ACM International Symposium on Microarchitecture
A Java implemented key collision attack on the data encryption standard (DES)
PPPJ '03 Proceedings of the 2nd international conference on Principles and practice of programming in Java
Robust image authentication using content based compression
Multimedia Systems
Managing information security on a shoestring budget
Annals of cases on information technology
Cryptography and computer security for undergraduates
Proceedings of the 35th SIGCSE technical symposium on Computer science education
Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure
ACM Transactions on Information and System Security (TISSEC)
Lip print recognition for security systems by multi-resolution architecture
Future Generation Computer Systems - Special issue: Modeling and simulation in supercomputing and telecommunications
Security of a Mobile Transaction: A Trust Model
Electronic Commerce Research
Securing Mobile Appliances: New Challenges for the System Designer
DATE '03 Proceedings of the conference on Design, Automation and Test in Europe - Volume 1
Risk Management of Corporate Confidential Information in Digital Form
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
Proceedings of the conference on Design, Automation and Test in Europe - Volume 1
Autonomous mobile agent based fair exchange
Computer Networks: The International Journal of Computer and Telecommunications Networking
Fragile image watermarking using a gradient image for improved localization and security
Pattern Recognition Letters
Improving Memory Encryption Performance in Secure Processors
IEEE Transactions on Computers
Embedding information security curricula in existing programmes
Proceedings of the 1st annual conference on Information security curriculum development
A cryptography course for non-mathematicians
Proceedings of the 1st annual conference on Information security curriculum development
PRISM: A Preventive and Risk-Reducing Integrated Security Management Model Using Security Label
The Journal of Supercomputing
EURASIP Journal on Wireless Communications and Networking
Computational concepts in IT: a new approach to IT mathematics
Proceedings of the 6th conference on Information technology education
DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for Ad Hoc Networks
IEEE Transactions on Dependable and Secure Computing
A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols
IEEE Transactions on Mobile Computing
A proposed curriculum of cryptography courses
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
Personal Health Record Systems and Their Security Protection
Journal of Medical Systems
Journal of Systems and Software
A new authentication protocol for GSM and UMTS networks
MS'06 Proceedings of the 17th IASTED international conference on Modelling and simulation
A dynamic data mining technique for intrusion detection systems
Proceedings of the 43rd annual Southeast regional conference - Volume 2
Security issues in privacy and key management protocols of IEEE 802.16
Proceedings of the 44th annual Southeast regional conference
On-Chip Communication Architectures: System on Chip Interconnect
On-Chip Communication Architectures: System on Chip Interconnect
Computers in Biology and Medicine
Efficient selective encryption for JPEG 2000 images using private initial table
Pattern Recognition
PCA-based web page watermarking
Pattern Recognition
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hashchip: a shared-resource multi-hash function processor architecture on FPGA
Integration, the VLSI Journal - Special issue: Embedded cryptographic hardware
Study of chaos functions for their suitability in generating Message Authentication Codes
Applied Soft Computing
Image Communication
A majority-voting based watermarking scheme for color image tamper detection and recovery
Computer Standards & Interfaces
Key management for content access control in a hierarchy
Computer Networks: The International Journal of Computer and Telecommunications Networking
Creating a Computer Security Curriculum in a Software Engineering Program
ICSE '07 Proceedings of the 29th international conference on Software Engineering
Practical algorithm for data security (PADS) in wireless sensor networks
MobiDE '07 Proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access
Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols
IEEE Transactions on Dependable and Secure Computing
24-hour knowledge factory: Using Internet technology to leverage spatial and temporal separations
ACM Transactions on Internet Technology (TOIT) - Special Issue on the Internet and Outsourcing
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Proceedings of the 9th annual conference on Genetic and evolutionary computation
Access control in user hierarchy based on elliptic curve cryptosystem
Information Sciences: an International Journal
Convertible multi-authenticated encryption scheme
Information Sciences: an International Journal
Hybrid architectures for efficient and secure face authentication in embedded systems
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Architectural support for run-time validation of program data properties
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Configuration and extension of embedded processors to optimize IPSec protocol execution
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Random-bit sequence generation from image data
Image and Vision Computing
Authentication algorithm based on grid environment
ACOS'07 Proceedings of the 6th Conference on WSEAS International Conference on Applied Computer Science - Volume 6
Algorithm of cipher text containing key to produce cipher text transmitted in network security
AIKED'07 Proceedings of the 6th Conference on 6th WSEAS Int. Conf. on Artificial Intelligence, Knowledge Engineering and Data Bases - Volume 6
Information Assurance: Dependability and Security in Networked Systems
Information Assurance: Dependability and Security in Networked Systems
Achieving simultaneous distribution control and privacy protection for Internet media delivery
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Cognitive radio network architecture: part II -- trusted network layer structure
Proceedings of the 2nd international conference on Ubiquitous information management and communication
A secure mobile communication approach based on information hiding
International Journal of Ad Hoc and Ubiquitous Computing
Security mechanisms and vulnerabilities in the IEEE 802.15.3 wireless personal area networks
International Journal of Wireless and Mobile Computing
International Journal of Sensor Networks
Accountability in organisations
International Journal of Information and Computer Security
Slander-resistant forwarding isolation in ad hoc networks
International Journal of Mobile Network Design and Innovation
The implementation of signing e-documents by using the Wireless Identity Module of cellular phones
International Journal of Mobile Communications
A secure remote database backup system
AIKED'06 Proceedings of the 5th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering and Data Bases
Implementation of secure applications in self-reconfigurable systems
Microprocessors & Microsystems
A comparative study of secure electronic transaction mechanisms for e-commerce
AIC'06 Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications
Silence detection in secure P2P VoIP multiconferencing
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
Integrated Computer-Aided Engineering - Artificial Neural Networks
Data transmission encryption and decryption algorithm in network security
SMO'06 Proceedings of the 6th WSEAS International Conference on Simulation, Modelling and Optimization
Design and implementation of remote meter reading and billing system
ICS'05 Proceedings of the 9th WSEAS International Conference on Systems
A new key exchange scheme based on extended Chebyshev polynomials
AMCOS'05 Proceedings of the 4th WSEAS International Conference on Applied Mathematics and Computer Science
Experiments on cryptanalysing block ciphers via evolutionary computation paradigms
EC'06 Proceedings of the 7th WSEAS International Conference on Evolutionary Computing
High-performance JPEG steganography using complementary embedding strategy
Pattern Recognition
Towards a library of composable models to estimate the performance of security solutions
WOSP '08 Proceedings of the 7th international workshop on Software and performance
AAA and mobile networks: security aspects and architectural efficiency
Proceedings of the 3rd international conference on Mobile multimedia communications
EURASIP Journal on Advances in Signal Processing
Fast exponentiation based on common-multiplicand-multiplication and minimal-signed-digit techniques
International Journal of Computer Mathematics
A DNA sticker algorithm for bit-substitution in a block cipher
Journal of Parallel and Distributed Computing
Efficient software architecture for IPSec acceleration using a programmable security processor
Proceedings of the conference on Design, automation and test in Europe
IDEA cryptographic processor in FPGA
Journal of Computational Methods in Sciences and Engineering - Selected papers from the International Conference on Computer Science,Software Engineering, Information Technology, e-Business, and Applications, 2003
New E-Payment Scenarios in an Extended Version of the Traditional Model
ICCSA '08 Proceedings of the international conference on Computational Science and Its Applications, Part II
Enhancing an Integer Challenge-Response Protocol
ICCSA '08 Proceedings of the international conference on Computational Science and Its Applications, Part II
EC-TEL '08 Proceedings of the 3rd European conference on Technology Enhanced Learning: Times of Convergence: Technologies Across Learning Contexts
ICIC '08 Proceedings of the 4th international conference on Intelligent Computing: Advanced Intelligent Computing Theories and Applications - with Aspects of Artificial Intelligence
Textural features extraction for image integrity verification
International Journal of Electronic Security and Digital Forensics
A matricial public key cryptosystem with digital signature
WSEAS Transactions on Mathematics
Energy-efficient relaxed rekeying policies for distributed key management in sensor networks
International Journal of Ad Hoc and Ubiquitous Computing
Designing Secure Protocols for Wireless Sensor Networks
WASA '08 Proceedings of the Third International Conference on Wireless Algorithms, Systems, and Applications
An optimized pseudorandom generator using packed matrices
WSEAS Transactions on Information Science and Applications
Efficient and secure protocol in fair certified E-mail delivery
WSEAS Transactions on Information Science and Applications
Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Cryptanalysis and improvement on a cryptosystem based on a chaotic map
Computers & Mathematics with Applications
The use of digital watermarking for intelligence multimedia document distribution
Journal of Theoretical and Applied Electronic Commerce Research
Distortion-free secret image sharing mechanism using modulus operator
Pattern Recognition
International Journal of Telemedicine and Applications - Special issue on electronic health
IEICE - Transactions on Information and Systems
Proceedings of the International Conference on Advances in Computing, Communication and Control
Analysis and design of a secure key exchange scheme
Information Sciences: an International Journal
Journal of Systems Architecture: the EUROMICRO Journal
Ring signature scheme for ECC-based anonymous signcryption
Computer Standards & Interfaces
Graduate follow up as a vehicle for CSIT curriculum assessment and improvement
Proceedings of the 14th Western Canadian Conference on Computing Education
Hardware-assisted run-time monitoring for secure program execution on embedded processors
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Performance analysis of mobile IP registration protocols
WSEAS Transactions on Computers
Java-Based Mobile-Agent Systems in the Real World: Security Highlights
Proceedings of the 2005 conference on Self-Organization and Autonomic Informatics (I)
Efficient Authorization in Delegation Chains with Strong Non-Repudiation
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
Design of the host guard firewall for network protection
ISP'08 Proceedings of the 7th WSEAS international conference on Information security and privacy
Collusion Detection for Grid Computing
CCGRID '09 Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid
A triangle area based nearest neighbors approach to intrusion detection
Pattern Recognition
Computer Standards & Interfaces
Information Theoretic Security
Foundations and Trends in Communications and Information Theory
Collect and broadcast news in security
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
On supporting anonymity in a BAN biometric framework
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
A distributed framework for passive worm detection and throttling in P2P networks
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Using probabilistic argumentation for key validation in public-key cryptography
International Journal of Approximate Reasoning
Logic programming for combinatorial problems
Artificial Intelligence Review
Efficient key management scheme for hierarchical access control in mobile agents
WSEAS TRANSACTIONS on COMMUNICATIONS
Development of a new cryptographic construct using palmprint-based fuzzy vault
EURASIP Journal on Advances in Signal Processing - Special issue on recent advances in biometric systems: a signal processing perspective
Integrating fingerprint verification into the smart card-based healthcare information system
EURASIP Journal on Advances in Signal Processing - Special issue on recent advances in biometric systems: a signal processing perspective
Secure access of smart cards using elliptic curve cryptosystems
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A secure and robust hash-based scheme for image authentication
Signal Processing
Progressive sharing for a secret image
Journal of Systems and Software
Implementation of AES encoder using active-HDL
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
HSI'03 Proceedings of the 2nd international conference on Human.society@internet
Impact of embedding scenarios on the smart card-based fingerprint verification
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Certificate and authority application based on grid environment
KES'07/WIRN'07 Proceedings of the 11th international conference, KES 2007 and XVII Italian workshop on neural networks conference on Knowledge-based intelligent information and engineering systems: Part III
IEEE Transactions on Information Forensics and Security
Power efficient hardware architecture of SHA-1 algorithm for trusted mobile computing
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Secure and efficient handover schemes for WiMAX over EPON networks
CISST'10 Proceedings of the 4th WSEAS international conference on Circuits, systems, signal and telecommunications
Computers & Mathematics with Applications
A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations
Computer Standards & Interfaces
Efficient compression of encrypted grayscale images
IEEE Transactions on Image Processing
Improving individual identification in security check with an EEG based biometric solution
BI'10 Proceedings of the 2010 international conference on Brain informatics
A general power model of differential power analysis attacks to static logic circuits
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Verification of stored security data in computer system
ACIIDS'10 Proceedings of the Second international conference on Intelligent information and database systems: Part I
Public key cryptographic system using mandelbrot sets
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Lightweight mutual authentication protocol for securing RFID applications
International Journal of Internet Technology and Secured Transactions
ACRI'10 Proceedings of the 9th international conference on Cellular automata for research and industry
IEEE Transactions on Neural Networks
Petri nets-based models for basic authentication procedure
COMATIA'10 Proceedings of the 2010 international conference on Communication and management in technological innovation and academic globalization
On the development of adaptive and self-dependent secure routing for wireless sensor networks
Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
A review of digital signatures and status in India
ICAI'05/MCBC'05/AMTA'05/MCBE'05 Proceedings of the 6th WSEAS international conference on Automation & information, and 6th WSEAS international conference on mathematics and computers in biology and chemistry, and 6th WSEAS international conference on acoustics and music: theory and applications, and 6th WSEAS international conference on Mathematics and computers in business and economics
Elliptic curve cryptography: survey and its security applications
ACAI '11 Proceedings of the International Conference on Advances in Computing and Artificial Intelligence
Journal of Medical Systems
Cryptanalysis of simplified-DES using computational intelligence
WSEAS Transactions on Computers
Design of an ultra high speed AES processor for next generation IT security
Computers and Electrical Engineering
Capacity planning for scalable fingerprint authentication
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
Signature amortization using multiple connected chains
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
A reputation-based system for confidentiality modeling in peer-to-peer networks
iTrust'06 Proceedings of the 4th international conference on Trust Management
Evaluation of audio streaming in secure wireless access network
PCI'05 Proceedings of the 10th Panhellenic conference on Advances in Informatics
Design and implementation of crypto co-processor and its application to security systems
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Workload dispatch planning for real-time fingerprint authentication on a sensor-client-server model
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
GridCrypt: high performance symmetric key cryptography using enterprise grids
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
An asynchronous covert channel using spam
Computers & Mathematics with Applications
Partial group session key agreement scheme for mobile agents in e-commerce environment
PRIMA'06 Proceedings of the 9th Pacific Rim international conference on Agent Computing and Multi-Agent Systems
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
A practical scheme of merging multiple public key infrastructures in e-commerce
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Design and implementation of an SSL component based on CBD
AsiaSim'04 Proceedings of the Third Asian simulation conference on Systems Modeling and Simulation: theory and applications
A reversible watermark scheme combined with hash function and lossless compression
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
A new steganography scheme in the domain of side-match vector quantization
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Summarizing Phenotype Evolution Patterns from Report Cases
Journal of Medical Systems
Automatic generation of conflict-free IPsec policies
FORTE'05 Proceedings of the 25th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems
ACSAC'05 Proceedings of the 10th Asia-Pacific conference on Advances in Computer Systems Architecture
Encryption and program realization of information resources in DRM
WISE'06 Proceedings of the 7th international conference on Web Information Systems
Low power AES hardware architecture for radio frequency identification
IWSEC'06 Proceedings of the 1st international conference on Security
Buffer occupancy feedback security control and changing encryption keys to protect MOD services
PSIVT'06 Proceedings of the First Pacific Rim conference on Advances in Image and Video Technology
A key reshuffling scheme for wireless sensor networks
ICISS'05 Proceedings of the First international conference on Information Systems Security
Modifications of SHA-0 to prevent attacks
ICISS'05 Proceedings of the First international conference on Information Systems Security
A Password-Based User Authentication Scheme for the Integrated EPR Information System
Journal of Medical Systems
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
International Journal of Network Management
Improving the performance of query by Sketch using parallel techniques
Proceedings of the 3rd International Conference on Information and Communication Systems
Modular arithmetic and fast algorithm designed for modern computer security applications
ACIIDS'12 Proceedings of the 4th Asian conference on Intelligent Information and Database Systems - Volume Part III
Computing the modular inverses is as simple as computing the GCDs
Finite Fields and Their Applications
The Enhancement of Security in Healthcare Information Systems
Journal of Medical Systems
Mobile Agent Application and Integration in Electronic Anamnesis System
Journal of Medical Systems
Information Sciences: an International Journal
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
Journal of Network and Computer Applications
A novel AES-256 implementation on FPGA using co-processor based architecture
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
INVISIOS: A Lightweight, Minimally Intrusive Secure Execution Environment
ACM Transactions on Embedded Computing Systems (TECS)
A novel k-out-of-n oblivious transfer protocol from bilinear pairing
Advances in Multimedia - Special issue on Web Services in Multimedia Communication
Secure Dynamic Access Control Scheme of PHR in Cloud Computing
Journal of Medical Systems
Fine tuning the advanced encryption standard (AES)
Proceedings of the Fifth International Conference on Security of Information and Networks
Secure dynamic network reprogramming using supplementary hash in wireless sensor networks
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
Implementation of Least Significant Bit Steganography and statistical steganalysis
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
ZigBee security using identity-based cryptography
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm
Future Generation Computer Systems
POCKET: A tool for protecting children's privacy online
Decision Support Systems
Information Systems and e-Business Management
Secure Transmission of Mobile Agent in Dynamic Distributed Environments
Wireless Personal Communications: An International Journal
Implementation of data privacy between nodes using AES in wireless ad hoc networks
Proceedings of the second ACM MobiHoc workshop on Airborne networks and communications
An enhanced NPA protocol for secure communications in GSM network
International Journal of Security and Networks
An approach for designing neural cryptography
ISNN'13 Proceedings of the 10th international conference on Advances in Neural Networks - Volume Part I
Arbitrated quantum signature of classical messages without using authenticated classical channels
Quantum Information Processing
A secure file sharing service for distributed computing environments
The Journal of Supercomputing
A secure effective key management scheme for dynamic access control in a large leaf class hierarchy
Information Sciences: an International Journal
Hi-index | 0.00 |
From the Publisher:Stallings has provided a state-of-the-art text covering the basic issues and principles and surveying cryptographic and network security techniques. The later part of the book deals with the real-world practice of network security: practical applications that have been implemented and are in use to provide network security. This book is intended for both an academic and a professional audience.