Browse Papers
From IFORS
Contact Us
English
Remember me
Login
Forgot password?
Journal: Mathematical and Computer Modelling
Found
566 papers
in total
Date Descending
Date Ascending
Title Descending
Title Ascending
Applications of two‐dimensional triangular functions for solving nonlinear class of mixed Volterra–Fredholm integral equations
2012,
Maleknejad K
An efficient numerical method is proposed for solving nonlinear mixed type...
A photographic forensic case study: Myths, principles and techniques
2012,
Kim Hyoung Joong
This paper introduces new approaches for photography forensic techniques. The first...
Adaptively secure identity‐based broadcast encryption with constant size private keys and ciphertexts from the subgroups
2012,
Hu Yupu
The main challenge in building efficient broadcast systems is to encrypt messages with...
On weaknesses of the HDCP authentication and key exchange protocol and its repair
2012,
Zhao Jianjie
The high‐bandwidth digital content protection (HDCP) specification developed by...
Differential fault analysis on block cipher SEED
2012,
Jeong Kitae
SEED is a Korean standard block cipher, and it is chosen as a 128‐bit ISO/IEC...
A novel user authentication and privacy preserving scheme with smart cards for wireless communications
2012,
Li Chun-Ta
In recent years, several user authentication schemes with smart cards for wireless...
A scalable and privacy‐preserving child‐care and safety service in a ubiquitous computing environment
2012,
Kim Jangseong
Recently, the technologies for child care and safety have been developing rapidly,...
A novel method for SQL injection attack detection based on removing SQL query attribute values
2012,
Moon Jongsub
SQL injection or SQL insertion attack is a code injection technique that exploits a...
Improving performance of network covert timing channel through Huffman coding
2012,
Wu Jingzheng
Network covert channel is a mechanism used to transfer covert message violating...
Task‐based behavior detection of illegal codes
2012,
Han Lansheng
Detecting unseen illegal codes is always a challenging task. As the main action to...
Mining constraints in role‐based access control
2012,
Wang Wei
Constraints are an important aspect of role‐based access control (RBAC) and...
A new construction of the server‐aided verification signature scheme
2012,
Wang Zhiwei
Low‐power devices tend to have a feature in common: limited computational...
Modeling and quantitatively predicting software security based on stochastic Petri nets
2012,
Yang Nianhua
To quantitatively predict software security in the design phase, hierarchical software...
Authenticated public key broadcast encryption scheme secure against insiders’ attack
2012,
Park Chanil
Broadcast encryption schemes have been studied in the past decades. Recently,...
Related key chosen IV attacks on Decim v2 and Decim‐128
2012,
Lin Ding
The Decim v1 is a hardware oriented stream cipher that was proposed by Berbain et al....
Authentication protocol using an identifier in an ad hoc network environment
2012,
Moon Jong Sik
This paper deals with device connections in a trust‐based ad hoc network....
On the number of rotation symmetric functions over GF(p)
2012,
Fu Shaojing
Rotation symmetric functions which are invariant under circular translation of indices...
A research on the investigation method of digital forensics for a VMware Workstation’s virtual machine
2012,
Lee Sangjin
Virtualization is a technology that uses a logical environment to overcome physical...
Securing mobile network prefix provisioning for NEMO based vehicular networks
2012,
Lee Jong-Hyouk
The recently developed mobile network prefix provisioning (MNPP) enables a direct...
BLESS: Object level encryption security for object‐based storage system
2012,
Feng Dan
In Object‐Based Storage System (OBSS) there are hundreds even thousands of...
A new multistage approach to detect subtle DDoS attacks
2012,
Wang Xiaofeng
Detection of distributed denial of service (DDoS) attacks has been a challenging...
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks
2012,
Mun Hyeran
User authentication scheme is an important issue for providing secure roaming service...
On‐the‐spot digital investigation by means of LDFS: Live Data Forensic System
2012,
Lee Sangjin
The ever growing capacity of hard drives poses a severe problem to forensic...
AS Alliance based security enhancement for inter‐domain routing protocol
2012,
Chen Kan
The Internet routing system as a complex system is faced with many challenges. Attacks...
First Page
4
5
6
7
8
Last Page
Papers per page:
6 Papers
12 Papers
24 Papers
36 Papers
48 Papers