Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2 3 4 5
Pages
|
Viewing 21-30 of 44 total results
BibTeX bibliography cryptography2010.bib
The watermarks are shown to be robust against attacks such as uniform affine transformations (scaling, rotation, and translation), cropping, reordering, and noise addition. ... group communication using identity-based signcryption", journal = j ... authentication scheme using smart cards", journal = j-J-SYST-SOFTW, volume = "83 ......
The Design of Rijndael | Guide books
Jana S, Maji A and Pal R (2019) A novel SPN-based video steganographic scheme using Sudoku puzzle for secured data hiding, Innovations in Systems and Software Engineering, 15:1, (65-73), Online publication date: 1-Mar-2019.
https://dl.acm.org/doi/10.5555/560131
Average Rating (0 votes)
研究業績 - 古川研究室 / 九...
Hiroaki Togashi, "Wireless Backhaul-based Sensor Network and its Applications," 5th Asian Workshop on Smart Sensor System (AWSSS 2017), Jeju. Korea, Mar. 2017. Hiroaki Togashi, Ryuta Abe, Junpei Shimamura and Hiroshi Furukawa, "Network-based pedestrian tracking system utilizing densely placed wireless access points," The 11th International ...
Welcome to Connect Journals
Web-based-secure online nonchoice –based examination system (wones) using cryptography R. Sheshadri, T. C. Reddy and N. A. Kumar Vol.15(2012) - No.06 - December
كلية الهندسة, ج...
A Secured Smart Card Using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES " Ehab M. Mohamed, Yassin. M. Y. Hasan, and Hiroshi Furukawa " CSC International Journal of Computer Science and Security, vol.4, No.1, pp.9-22, 2010
1 0
A Secured Smart Card Using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES " Ehab M. Mohamed, Yassin. M. Y. Hasan, and Hiroshi Furukawa " CSC International Journal of Computer Science and Security, vol.4, No.1, pp.9-22, 2010
1 0 http://www.aun.edu.eg/faculty_engineering/arabic/dept_elec/researches.php?page=93&Dept_Code=0202 www.aun.edu.eg/faculty_engineering/arabic/dept_elec/researches.php?page=9...
<span class="highlight">A Secured Smart Card Using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES</span> &amp;quot; Ehab M. Mohamed, Yassin. M. Y. Hasan, and Hiroshi Furukawa &amp;quot; CSC International Journal of Computer Science and Security, vol.4, No.1, pp.9-22, 2010
BibTeX bibliography cryptography2000.bib
%%% -*-BibTeX-*- %%% ===== %%% BibTeX-file{ %%% author = &quot;Nelson H. F. Beebe&quot;, %%% version = &quot;3.331&quot;, %%% date = &quot;23 July 2020&quot;, %%% time = &quot;12:53:01 MDT ...
International Journal of Scientific Research in Computer ...
The end user receive the monitored data by means of GPRS, a wireless communication device. This paper presents the design and implementation of real time monitoring using GPRS between FPGA based embedded system and Android smart phones. This system offers a maximum performance, minimum power and 24 hours real time remote monitoring for tele health.
ijsrcseit.com/rssdoc/V2I2.xml
Average Rating (0 votes)
Cryptographic Hardware and Embedded Systems - MAFIADOC.COM
The ByteSub transformation is the s-box of the Rijndael algorithm and operates on each of the State bytes independently. The s-box is constructed by finding the multiplicative inverse of each byte in GF(28). An affine transformation is then applied, which involves multiplying the result by a matrix and adding to the hexadecimal number ‘63’.
Handbook of Applied Cryptography | Guide books
Chang C, Cheng T and Hsueh W (2016) A robust and efficient dynamic identity-based multi-server authentication scheme using smart cards, International Journal of Communication Systems, 29:2, (290-306), Online publication date: 25-Jan-2016.
US Patent for System and method for determining contingent ...
A system and method providing for communication and resolution of utility functions between participants, wherein the utility function is evaluated based on local information at the recipient to determine a cost value thereof. A user interface having express representation of both information elements, and associated reliability of the information.
1 2 3 4 5
Pages
|