Special issue of computers and mathematics with applications on “Advances in cryptography, security and applications for future computer science” (Englisch)
- Neue Suche nach: Park, Jong Hyuk
- Neue Suche nach: Hussain, Sajid
- Neue Suche nach: Wang, Guilin
- Neue Suche nach: Mu, Yi
- Neue Suche nach: Park, Jong Hyuk
- Neue Suche nach: Hussain, Sajid
- Neue Suche nach: Wang, Guilin
- Neue Suche nach: Mu, Yi
In:
Computers and Mathematics with Applications
;
60
, 2
;
175
;
2010
-
ISSN:
- Aufsatz (Zeitschrift) / Elektronische Ressource
-
Titel:Special issue of computers and mathematics with applications on “Advances in cryptography, security and applications for future computer science”
-
Beteiligte:Park, Jong Hyuk ( Autor:in ) / Hussain, Sajid ( Autor:in ) / Wang, Guilin ( Autor:in ) / Mu, Yi ( Autor:in )
-
Erschienen in:Computers and Mathematics with Applications ; 60, 2 ; 175
-
Verlag:
- Neue Suche nach: Elsevier Ltd
-
Erscheinungsdatum:05.04.2010
-
Format / Umfang:1 pages
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Datenquelle:
Inhaltsverzeichnis – Band 60, Ausgabe 2
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 175
-
Special issue of computers and mathematics with applications on “Advances in cryptography, security and applications for future computer science”Park, Jong Hyuk / Hussain, Sajid / Wang, Guilin / Mu, Yi et al. | 2010
- 176
-
A universal access control method based on host identifiers for Future InternetWang, Hongchao / Zhang, Hongke / Chang, Chi-Yuan / Chao, Han-Chieh et al. | 2010
- 187
-
Security middleware approaches and issues for ubiquitous applicationsAl-Jaroodi, Jameela / Jawhar, Imad / Al-Dhaheri, Alyaziyah / Al-Abdouli, Fatmah / Mohamed, Nader et al. | 2010
- 198
-
Realization of Call-Back Authentication (CBA) for secure web to cellular phone SMS communicationKhan, Zeeshan Shafi / Rashid, Khalid / Muhaya, Fahad Bin / Qutbuddin / Rahim, Aneel et al. | 2010
- 209
-
A scale based trust model for multi-context environmentsAgudo, Isaac / Fernandez-Gago, Carmen / Lopez, Javier et al. | 2010
- 217
-
Revisiting WiMAX MBS securityKambourakis, Georgios / Konstantinou, Elisavet / Gritzalis, Stefanos et al. | 2010
- 224
-
The incentive secure mechanism based on quality of service in P2P networkLiu, Yuhua / Li, Yuling / Xiong, Naixue / Park, Jong Hyuk / Lee, Yang Sun et al. | 2010
- 234
-
An inter-domain authentication scheme for pervasive computing environmentYao, Lin / Wang, Lei / Kong, Xiangwei / Wu, Guowei / Xia, Feng et al. | 2010
- 245
-
Kerberos based authentication for inter-domain roaming in wireless heterogeneous networkShrestha, Anish Prasad / Choi, Dong-You / Kwon, Goo Rak / Han, Seung-Jo et al. | 2010
- 256
-
A guest-transparent file integrity monitoring method in virtualization environmentJin, Hai / Xiang, Guofu / Zou, Deqing / Zhao, Feng / Li, Min / Yu, Chen et al. | 2010
- 267
-
The use of mathematical linguistic methods in creating secret sharing threshold algorithmsOgiela, Marek R. / Ogiela, Urszula et al. | 2010
- 272
-
On the security of metering schemeLin, Huang / Cao, Zhenfu et al. | 2010
- 276
-
A digital signature with multiple subliminal channels and its applicationsLin, Dai-Rui / Wang, Chih-I / Zhang, Zhi-Kai / Guan, D.J. et al. | 2010
- 285
-
Provably secure randomized blind signature scheme based on bilinear pairingFan, Chun-I / Sun, Wei-Zhe / Huang, Vincent Shi-Ming et al. | 2010
- 294
-
An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networksMisra, Sudip / Venkata Krishna, P. / Isaac Abraham, Kiran / Sasikumar, Navin / Fredun, S. et al. | 2010
- 307
-
IEEE 802.11 user fingerprinting and its applications for intrusion detectionTakahashi, Daisuke / Xiao, Yang / Zhang, Yan / Chatzimisios, Periklis / Chen, Hsiao-Hwa et al. | 2010
- 319
-
Improved modification direction methodsKim, H.J. / Kim, C. / Choi, Y. / Wang, S. / Zhang, X. et al. | 2010
- 326
-
Chaos-based secure satellite imagery cryptosystemUsama, Muhammad / Khan, Muhammad Khurram / Alghathbar, Khaled / Lee, Changhoon et al. | 2010
- 338
-
An integrated parallel GNFS algorithm for integer factorization based on Linbox Montgomery block Lanczos method over GF(2)Yang, Laurence T. / Xu, Li / Yeo, Sang-Soo / Hussain, Sajid et al. | 2010
- 347
-
DES with any reduced masked rounds is not secure against side-channel attacksKim, Jongsung / Lee, Yuseop / Lee, Sangjin et al. | 2010
- 355
-
A new bit-serial multiplier over using irreducible trinomialsChang, Nam Su / Kim, Tae Hyun / Kim, Chang Han / Han, Dong-Guk / Lim, Jongin et al. | 2010
- 362
-
Chosen ciphertext secure authenticated group communication using identity-based signcryptionHur, Junbeom / Park, Chanil / Yoon, Hyunsoo et al. | 2010
- iii
-
Editorial Board| 2010