Keyword: security

Found 180 papers in total
On the design of partial encryption scheme for multimedia content
2013,
Partial encryption, also named selective encryption, is regarded as a suitable choice...
Secure identity‐based signcryption in the standard model
2013,
Signcryption is a cryptographic primitive that fulfills both the functions of digital...
Hopf bifurcation in an Internet worm propagation model with time delay in quarantine
2013,
Internet worm attacks reduce network security and cause economic losses. The use of a...
On weaknesses of the HDCP authentication and key exchange protocol and its repair
2012,
The high‐bandwidth digital content protection (HDCP) specification developed by...
Differential fault analysis on block cipher SEED
2012,
SEED is a Korean standard block cipher, and it is chosen as a 128‐bit ISO/IEC...
A novel user authentication and privacy preserving scheme with smart cards for wireless communications
2012,
In recent years, several user authentication schemes with smart cards for wireless...
Improving performance of network covert timing channel through Huffman coding
2012,
Network covert channel is a mechanism used to transfer covert message violating...
Task‐based behavior detection of illegal codes
2012,
Detecting unseen illegal codes is always a challenging task. As the main action to...
Modeling and quantitatively predicting software security based on stochastic Petri nets
2012,
To quantitatively predict software security in the design phase, hierarchical software...
Related key chosen IV attacks on Decim v2 and Decim‐128
2012,
The Decim v1 is a hardware oriented stream cipher that was proposed by Berbain et al....
Authentication protocol using an identifier in an ad hoc network environment
2012,
This paper deals with device connections in a trust‐based ad hoc network....
On the number of rotation symmetric functions over GF(p)
2012,
Rotation symmetric functions which are invariant under circular translation of indices...
A research on the investigation method of digital forensics for a VMware Workstation’s virtual machine
2012,
Virtualization is a technology that uses a logical environment to overcome physical...
Securing mobile network prefix provisioning for NEMO based vehicular networks
2012,
The recently developed mobile network prefix provisioning (MNPP) enables a direct...
BLESS: Object level encryption security for object‐based storage system
2012,
In Object‐Based Storage System (OBSS) there are hundreds even thousands of...
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks
2012,
User authentication scheme is an important issue for providing secure roaming service...
On‐the‐spot digital investigation by means of LDFS: Live Data Forensic System
2012,
The ever growing capacity of hard drives poses a severe problem to forensic...
AS Alliance based security enhancement for inter‐domain routing protocol
2012,
The Internet routing system as a complex system is faced with many challenges. Attacks...
Security of electricity supply at the generation level: Problem analysis
2012,
Since the very beginning of the restructuring process, back in 1982 in Chile, the...
The uniqueness of the energy security, justice, and governance problem
2012,
This article argues that among all policy fields exhibiting externalities of a global...
European climate–energy security nexus: A model based scenario analysis
2012,
In this research, we provide an overview of the climate‐security nexus in the...
Formal Vulnerability Assessment of a maritime transportation system
2011,
World trade increasingly relies on longer, larger and more complex supply chains,...
Composite indicators for security of energy supply using ordered weighted averaging
2011,
In this paper we propose to use an aggregation rule derived from the Group Decision...
POCKET: A tool for protecting children's privacy online
2013,
Children's privacy in the online environment has become critical. Use of the Internet...
Papers per page: