Journal: Mathematical and Computer Modelling

Found 566 papers in total
Applications of two‐dimensional triangular functions for solving nonlinear class of mixed Volterra–Fredholm integral equations
2012,
An efficient numerical method is proposed for solving nonlinear mixed type...
A photographic forensic case study: Myths, principles and techniques
2012,
This paper introduces new approaches for photography forensic techniques. The first...
Adaptively secure identity‐based broadcast encryption with constant size private keys and ciphertexts from the subgroups
2012,
The main challenge in building efficient broadcast systems is to encrypt messages with...
On weaknesses of the HDCP authentication and key exchange protocol and its repair
2012,
The high‐bandwidth digital content protection (HDCP) specification developed by...
Differential fault analysis on block cipher SEED
2012,
SEED is a Korean standard block cipher, and it is chosen as a 128‐bit ISO/IEC...
A novel user authentication and privacy preserving scheme with smart cards for wireless communications
2012,
In recent years, several user authentication schemes with smart cards for wireless...
A scalable and privacy‐preserving child‐care and safety service in a ubiquitous computing environment
2012,
Recently, the technologies for child care and safety have been developing rapidly,...
A novel method for SQL injection attack detection based on removing SQL query attribute values
2012,
SQL injection or SQL insertion attack is a code injection technique that exploits a...
Improving performance of network covert timing channel through Huffman coding
2012,
Network covert channel is a mechanism used to transfer covert message violating...
Task‐based behavior detection of illegal codes
2012,
Detecting unseen illegal codes is always a challenging task. As the main action to...
Mining constraints in role‐based access control
2012,
Constraints are an important aspect of role‐based access control (RBAC) and...
A new construction of the server‐aided verification signature scheme
2012,
Low‐power devices tend to have a feature in common: limited computational...
Modeling and quantitatively predicting software security based on stochastic Petri nets
2012,
To quantitatively predict software security in the design phase, hierarchical software...
Authenticated public key broadcast encryption scheme secure against insiders’ attack
2012,
Broadcast encryption schemes have been studied in the past decades. Recently,...
Related key chosen IV attacks on Decim v2 and Decim‐128
2012,
The Decim v1 is a hardware oriented stream cipher that was proposed by Berbain et al....
Authentication protocol using an identifier in an ad hoc network environment
2012,
This paper deals with device connections in a trust‐based ad hoc network....
On the number of rotation symmetric functions over GF(p)
2012,
Rotation symmetric functions which are invariant under circular translation of indices...
A research on the investigation method of digital forensics for a VMware Workstation’s virtual machine
2012,
Virtualization is a technology that uses a logical environment to overcome physical...
Securing mobile network prefix provisioning for NEMO based vehicular networks
2012,
The recently developed mobile network prefix provisioning (MNPP) enables a direct...
BLESS: Object level encryption security for object‐based storage system
2012,
In Object‐Based Storage System (OBSS) there are hundreds even thousands of...
A new multistage approach to detect subtle DDoS attacks
2012,
Detection of distributed denial of service (DDoS) attacks has been a challenging...
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks
2012,
User authentication scheme is an important issue for providing secure roaming service...
On‐the‐spot digital investigation by means of LDFS: Live Data Forensic System
2012,
The ever growing capacity of hard drives poses a severe problem to forensic...
AS Alliance based security enhancement for inter‐domain routing protocol
2012,
The Internet routing system as a complex system is faced with many challenges. Attacks...
Papers per page: