Hur, Junbeom; Park, Chanil; Yoon, Hyunsoo Chosen ciphertext secure authenticated group communication using identity-based signcryption. (English) Zbl 1198.94151 Comput. Math. Appl. 60, No. 2, 362-375 (2010). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Chang, Nam Su; Kim, Tae Hyun; Kim, Chang Han; Han, Dong-Guk; Lim, Jongin A new bit-serial multiplier over \(GF(pm)\) using irreducible trinomials. (English) Zbl 1198.94086 Comput. Math. Appl. 60, No. 2, 355-361 (2010). MSC: 94A60 11T71 × Cite Format Result Cite Review PDF Full Text: DOI
Kim, Jongsung; Lee, Yuseop; Lee, Sangjin DES with any reduced masked rounds is not secure against side-channel attacks. (English) Zbl 1198.94102 Comput. Math. Appl. 60, No. 2, 347-354 (2010). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Yang, Laurence T.; Xu, Li; Yeo, Sang-Soo; Hussain, Sajid An integrated parallel GNFS algorithm for integer factorization based on linbox montgomery block Lanczos method over \(GF(2)\). (English) Zbl 1198.94134 Comput. Math. Appl. 60, No. 2, 338-346 (2010). MSC: 94A60 11Y05 × Cite Format Result Cite Review PDF Full Text: DOI
Usama, Muhammad; Khan, Muhammad Khurram; Alghathbar, Khaled; Lee, Changhoon Chaos-based secure satellite imagery cryptosystem. (English) Zbl 1198.94037 Comput. Math. Appl. 60, No. 2, 326-337 (2010). MSC: 94A08 94A60 37D45 37N35 × Cite Format Result Cite Review PDF Full Text: DOI
Kim, H. J.; Kim, C.; Choi, Y.; Wang, S.; Zhang, X. Improved modification direction methods. (English) Zbl 1198.94029 Comput. Math. Appl. 60, No. 2, 319-325 (2010). MSC: 94A08 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Takahashi, Daisuke; Xiao, Yang; Zhang, Yan; Chatzimisios, Periklis; Chen, Hsiao-Hwa IEEE 802.11 user fingerprinting and its applications for intrusion detection. (English) Zbl 1198.94164 Comput. Math. Appl. 60, No. 2, 307-318 (2010). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Misra, Sudip; Krishna, P. Venkata; Abraham, Kiran Isaac; Sasikumar, Navin; Fredun, S. An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks. (English) Zbl 1198.68098 Comput. Math. Appl. 60, No. 2, 294-306 (2010). MSC: 68M12 68T05 × Cite Format Result Cite Review PDF Full Text: DOI
Fan, Chun-I; Sun, Wei-Zhe; Huang, Vincent Shi-Ming Provably secure randomized blind signature scheme based on bilinear pairing. (English) Zbl 1198.94148 Comput. Math. Appl. 60, No. 2, 285-293 (2010). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Lin, Dai-Rui; Wang, Chih-I; Zhang, Zhi-Kai; Guan, D. J. A digital signature with multiple subliminal channels and its applications. (English) Zbl 1198.94156 Comput. Math. Appl. 60, No. 2, 276-284 (2010). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Ogiela, Marek R.; Ogiela, Urszula The use of mathematical linguistic methods in creating secret sharing threshold algorithms. (English) Zbl 1198.94160 Comput. Math. Appl. 60, No. 2, 267-271 (2010). MSC: 94A62 68T50 × Cite Format Result Cite Review PDF Full Text: DOI
Shrestha, Anish Prasad; Choi, Dong-You; Kwon, Goo Rak; Han, Seung-Jo Kerberos based authentication for inter-domain roaming in wireless heterogeneous network. (English) Zbl 1198.94162 Comput. Math. Appl. 60, No. 2, 245-255 (2010). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Yao, Lin; Wang, Lei; Kong, Xiangwei; Wu, Guowei; Xia, Feng An inter-domain authentication scheme for pervasive computing environment. (English) Zbl 1198.94168 Comput. Math. Appl. 60, No. 2, 234-244 (2010). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Liu, Yuhua; Li, Yuling; Xiong, Naixue; Park, Jong Hyuk; Lee, Yang Sun The incentive secure mechanism based on quality of service in P2P network. (English) Zbl 1198.94157 Comput. Math. Appl. 60, No. 2, 224-233 (2010). MSC: 94A62 90B18 × Cite Format Result Cite Review PDF Full Text: DOI
Agudo, Isaac; Fernandez-Gago, Carmen; Lopez, Javier A scale based trust model for multi-context environments. (English) Zbl 1198.94143 Comput. Math. Appl. 60, No. 2, 209-216 (2010). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Wang, Hongchao; Zhang, Hongke; Chang, Chi-Yuan; Chao, Han-Chieh A universal access control method based on host identifiers for Future Internet. (English) Zbl 1198.94166 Comput. Math. Appl. 60, No. 2, 176-186 (2010). MSC: 94A62 68M11 × Cite Format Result Cite Review PDF Full Text: DOI
Park, Jong Hyuk (ed.); Hussain, Sajid (ed.); Wang, Guilin (ed.); Mu, Yi (ed.) Special issue: Advances in cryptography, security and applications for future computer science. Selected papers based on the presentations at the 2009 FTRG international workshop ACSA 2009, Jeju, Korea, December 11-12, 2009. (English) Zbl 1205.94016 Comput. Math. Appl. 60, No. 2, 175-375 (2010). MSC: 94-06 94A60 68-06 68P25 00B25 × Cite Format Result Cite Review PDF