Browse Papers
From IFORS
Contact Us
English
Remember me
Login
Forgot password?
Keyword: security
Found
180 papers
in total
Date Descending
Date Ascending
Title Descending
Title Ascending
On the design of partial encryption scheme for multimedia content
2013,
Chen Xi
Partial encryption, also named selective encryption, is regarded as a suitable choice...
Secure identity‐based signcryption in the standard model
2013,
Li Fagen
Signcryption is a cryptographic primitive that fulfills both the functions of digital...
Hopf bifurcation in an Internet worm propagation model with time delay in quarantine
2013,
Yao Yu
Internet worm attacks reduce network security and cause economic losses. The use of a...
On weaknesses of the HDCP authentication and key exchange protocol and its repair
2012,
Zhao Jianjie
The high‐bandwidth digital content protection (HDCP) specification developed by...
Differential fault analysis on block cipher SEED
2012,
Jeong Kitae
SEED is a Korean standard block cipher, and it is chosen as a 128‐bit ISO/IEC...
A novel user authentication and privacy preserving scheme with smart cards for wireless communications
2012,
Li Chun-Ta
In recent years, several user authentication schemes with smart cards for wireless...
Improving performance of network covert timing channel through Huffman coding
2012,
Wu Jingzheng
Network covert channel is a mechanism used to transfer covert message violating...
Task‐based behavior detection of illegal codes
2012,
Han Lansheng
Detecting unseen illegal codes is always a challenging task. As the main action to...
Modeling and quantitatively predicting software security based on stochastic Petri nets
2012,
Yang Nianhua
To quantitatively predict software security in the design phase, hierarchical software...
Related key chosen IV attacks on Decim v2 and Decim‐128
2012,
Lin Ding
The Decim v1 is a hardware oriented stream cipher that was proposed by Berbain et al....
Authentication protocol using an identifier in an ad hoc network environment
2012,
Moon Jong Sik
This paper deals with device connections in a trust‐based ad hoc network....
On the number of rotation symmetric functions over GF(p)
2012,
Fu Shaojing
Rotation symmetric functions which are invariant under circular translation of indices...
A research on the investigation method of digital forensics for a VMware Workstation’s virtual machine
2012,
Lee Sangjin
Virtualization is a technology that uses a logical environment to overcome physical...
Securing mobile network prefix provisioning for NEMO based vehicular networks
2012,
Lee Jong-Hyouk
The recently developed mobile network prefix provisioning (MNPP) enables a direct...
BLESS: Object level encryption security for object‐based storage system
2012,
Feng Dan
In Object‐Based Storage System (OBSS) there are hundreds even thousands of...
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks
2012,
Mun Hyeran
User authentication scheme is an important issue for providing secure roaming service...
On‐the‐spot digital investigation by means of LDFS: Live Data Forensic System
2012,
Lee Sangjin
The ever growing capacity of hard drives poses a severe problem to forensic...
AS Alliance based security enhancement for inter‐domain routing protocol
2012,
Chen Kan
The Internet routing system as a complex system is faced with many challenges. Attacks...
Security of electricity supply at the generation level: Problem analysis
2012,
Rodilla P
Since the very beginning of the restructuring process, back in 1982 in Chile, the...
The uniqueness of the energy security, justice, and governance problem
2012,
Goldthau Andreas
This article argues that among all policy fields exhibiting externalities of a global...
European climate–energy security nexus: A model based scenario analysis
2012,
Criqui Patrick
In this research, we provide an overview of the climate‐security nexus in the...
Formal Vulnerability Assessment of a maritime transportation system
2011,
Berle yvind
World trade increasingly relies on longer, larger and more complex supply chains,...
Composite indicators for security of energy supply using ordered weighted averaging
2011,
Rocco S. Claudio M
In this paper we propose to use an aggregation rule derived from the Group Decision...
POCKET: A tool for protecting children's privacy online
2013,
Crossler Robert E
Children's privacy in the online environment has become critical. Use of the Internet...
First Page
4
5
6
7
8
Last Page
Papers per page:
6 Papers
12 Papers
24 Papers
36 Papers
48 Papers