Papers

With Tag: Cryptography

Can't find what you are looking for? Add a listing here
Sort By
(0)

Enhancing security in E-health services using agent

Dharmendra Sharma, Rossilawati Sulaiman
2011 | 10.1109/ICEEI.2011.6021580

none

(0)

Human Machine Interaction: The Special Role for Human Unconscious Emotional Information Processing

Kenneth Hugdahl, Mariano Bosch, M W M L Van Den Noort
2005 | 10.1007/11573548_77

none

(0)

Digital image watermarking: an overview

Ioannis Pitas, Nikos Nikolaidis
1999 | 10.1109/MMCS.1999.779111

none

(0)

SOAP-based Secure Conversation and Collaboration

Andreas Schaad, Mohammad Ashiqur Rahaman
2007 | 10.1109/ICWS.2007.167

none

(0)

Information Security of Remote File Transfers with Mobile Devices

Sami Noponen, Kaarina Karppinen
2008 | 10.1109/COMPSAC.2008.128

none

(0)

Agent Protection Based on the Use of Cryptographic Hardware

Antonio Munoz, Antonio Mana, Marioli Montenegro, Rajesh Harjani
2009 | 10.1109/COMPSAC.2009.152

none

(0)

ELALPS: A Framework to Eliminate Location Anonymizer from Location Privacy Systems

Chowdhury S Hasan, Sheikh Iqbal Ahamed, M Nonjur
2009 | 10.1109/COMPSAC.2009.12

none

(0)

On security enhancement of long-term private key for the tripartite authenticated key agreement protocol

Katsuhiro Nakamura, Masahiro Nomura
2008 | 10.1109/ISITA.2008.4895437

none

(0)

Algorithm for DNSSEC Trusted Key Rollover

David Fort, Gilles Guette, Bernard Cousin
2005 | 10.1007/978-3-540-30582-8_71

none

(0)

Perfect Classified Channel retaining DC balance for high-throughput communication

Kouichi Inoue, Hiroaki Nishi, Hiroki Matsuoka
2008 | 10.1109/ISITA.2008.4895602

none

(0)

Efficient ID-based key agreement protocol under the DLDH assumption without random oracles

Daisuke Moriyama, Hiroshi Doi
2008 | 10.1109/ISITA.2008.4895433

none

(0)

Honeypot based unauthorized data access detection in MapReduce systems

Latifur Khan, Bhavani Thuraisingham, Murat Kantarcioglu, Huseyin Ulusoy
2015 | 10.1109/ISI.2015.7165951

none

(0)

A sequence cipher producing method based on two-layer ranking Multi-Objective Evolutionary Algorithm

Zhangxin Chen, Wensheng Zhang, Kangshun Li, Weifeng Pan
2008 | 10.1109/CEC.2008.4630794

none

(0)

Sensor Network Traffic-Adaptive Key Management Scheme

M Venkatesh, S S Patil
2009 | 10.1109/ARTCom.2009.180

none

(0)

An Efficient ID-Based Proxy Ring Signature Scheme

Li Daxing, Wu Lei
2009 | 10.1109/CMC.2009.133

none

(0)

Short paper: a new identity-based DH key-agreement protocol for wireless sensor networks based on the Arazi-Qi scheme

Isabelle Hang, Markus Ullmann, Christian Wieschebrink
2011 | 10.1145/1998412.1998436

none

(0)

CAIRN: Dedicated Integer Factoring Devices

Tetsuya Izu, Jun Kogure, Takeshi Shimoyama
2010 | 10.1109/NBiS.2010.60

none

(0)

Medical Image Watermarking with Tamper Detection and Recovery

Fauzi, Zain
2006 | 10.1109/IEMBS.2006.260767

none

(0)

Physical layer security for wireless sensor networks

Jinho Choi, Jeongseok Ha, Hyoungsuk Jeon
2013 | 10.1109/PIMRC.2013.6666094

none

(0)

A Trust Based Framework for Secure Data Aggregation in Wireless Sensor Networks

Sajal K Das, Yonghe Liu, Wei Zhang
2006 | 10.1109/SAHCN.2006.288409

none

Can't find what you are looking for? Add a paper here