Teaching cryptography to undergraduate students in small liberal art schools
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Block cipher based on reversible cellular automata
New Generation Computing - Evolutionary computation
A Sublinear Time Randomized Algorithm for Coset Enumeration in the Black Box Model
COCOON '08 Proceedings of the 14th annual international conference on Computing and Combinatorics
Biometric user verification using haptics and fuzzy logic
MM '08 Proceedings of the 16th ACM international conference on Multimedia
A Relay-Transmission of the RFID Tag ID over the Wireless and TCP/IP with a Security Agent
KES-AMSTA '07 Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
A Comparison of DCT and DWT Block Based Watermarking on Medical Image Quality
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Weighted Threshold Secret Image Sharing
PSIVT '09 Proceedings of the 3rd Pacific Rim Symposium on Advances in Image and Video Technology
Image copyright protection with forward error correction
Expert Systems with Applications: An International Journal
An algorithm based mesh check-sum fault tolerant scheme for stream ciphers
International Journal of Communication Networks and Distributed Systems
A new cryptographic algorithm for the real time applications
ISP'08 Proceedings of the 7th WSEAS international conference on Information security and privacy
A mesh check-sum ABFT scheme for stream ciphers
International Journal of Communication Networks and Distributed Systems
Knapsack based ECC for digital signature authentication
International Journal of Communication Networks and Distributed Systems
Proceedings of the 22nd Annual Symposium on Integrated Circuits and System Design: Chip on the Dunes
Fault-Tolerant Architecture for Peer to Peer Network Management Systems
NEW2AN '09 and ruSMART '09 Proceedings of the 9th International Conference on Smart Spaces and Next Generation Wired/Wireless Networking and Second Conference on Smart Spaces
Hill cipher modification based on eigenvalues HCM-EE
Proceedings of the 2nd international conference on Security of information and networks
A hybrid multi-application authentication and authorization model using Multi-Agent System and PKI
AsiaCSN '07 Proceedings of the Fourth IASTED Asian Conference on Communication Systems and Networks
Efficient implementation for MD5-RC4 encryption using GPU with CUDA
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
Information security underlying transparent computing: Impacts, visions and challenges
Web Intelligence and Agent Systems
Dynamic cryptography algorithm for real-time applications DCA-RTA
ASMCSS'09 Proceedings of the 3rd International Conference on Applied Mathematics, Simulation, Modelling, Circuits, Systems and Signals
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
A new data streaming method for locating hosts with large connection degree
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
An effective crypto-biometric system for secure email in wireless environment
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
CLUSMA: a mobile agent based clustering middleware for wireless sensor networks
Proceedings of the 7th International Conference on Frontiers of Information Technology
Efficient proxy signcryption scheme with provable CCA and CMA security
Computers & Mathematics with Applications
A TRNG exploiting multi-source physical data
Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
Design of a secure packet processor
Proceedings of the 6th ACM/IEEE Symposium on Architectures for Networking and Communications Systems
Ontology and algorithms for the dependable configuration of information systems
International Journal of Critical Computer-Based Systems
Secure electronic bills of lading: blind counts and digital signatures
Electronic Commerce Research
On the performance of a distributed key management scheme in heterogeneous wireless sensor networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Multi-channel key agreement using encrypted public key exchange
Proceedings of the 15th international conference on Security protocols
Symmetric encryption and XML encryption patterns
Proceedings of the 16th Conference on Pattern Languages of Programs
Main types of attacks in wireless sensor networks
SSIP '09/MIV'09 Proceedings of the 9th WSEAS international conference on signal, speech and image processing, and 9th WSEAS international conference on Multimedia, internet & video technologies
Image encryption and authentication by orthonormal transform with CRC
Proceedings of the 2011 International Conference on Communication, Computing & Security
Cellular automata encryption method: description, evaluation and tests
ISPACT'10 Proceedings of the 9th WSEAS international conference on Advances in e-activities, information security and privacy
Prime factorization using square root approximation
Computers & Mathematics with Applications
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution
ACM Transactions on Information and System Security (TISSEC)
Bullet-proof verification (BPV) method to detect black hole attack in mobile ad hoc networks
UIC'11 Proceedings of the 8th international conference on Ubiquitous intelligence and computing
Security concerns for web services and applications
ASIAN'05 Proceedings of the 10th Asian Computing Science conference on Advances in computer science: data management on the web
Key agreement protocols based on the center weighted jacket matrix as a symmetric co-cyclic matrix
MRCS'06 Proceedings of the 2006 international conference on Multimedia Content Representation, Classification and Security
Controlling data dissemination
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
Pairing-based strong designated verifier proxy signature scheme with low cost
Security and Communication Networks
Redactable Signatures for Signed CDA Documents
Journal of Medical Systems
A Secure Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
Simulation of anti-relay attack schemes for RFID ETC system
Proceedings of the 15th Communications and Networking Simulation Symposium
Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
Information Sciences: an International Journal
Identity anonymization and secure data storage using group signature in private cloud
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Hardware-software co-design of AES on FPGA
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Proceedings of the CUBE International Information Technology Conference
Modular data hiding for improved web-portal security
Proceedings of the 13th International Conference on Computer Systems and Technologies
A Secure Integrated Medical Information System
Journal of Medical Systems
Secure Communication of Medical Information Using Mobile Agents
Journal of Medical Systems
An improved discrete logarithm-based multisignature scheme
Security and Communication Networks
Architecture of multi-OLT PON systems and its bandwidth allocation algorithms
Photonic Network Communications
Cryptography with fast point multiplication by using ASCII codes and its implementation
International Journal of Communication Networks and Distributed Systems
RF authenticated reconfiguration-based access control protection scheme for SRAM-based FPGA IP cores
International Journal of Electronic Security and Digital Forensics
Multimedia Tools and Applications
Non-Interactive Authenticated Key Agreement over the Mobile Communication Network
Mobile Networks and Applications
High-performance capabilities for 1-hop containment of network attacks
IEEE/ACM Transactions on Networking (TON)
A Secure Ambulance Communication Protocol for VANET
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |