Web
Education
BibTeX bibliography cryptography2010.bib
The watermarks are shown to be robust against attacks such as uniform affine transformations (scaling, rotation, and translation), cropping, reordering, and noise addition. ... group communication using identity-based signcryption", journal = j ... authentication scheme using smart cards", journal = j-J-SYST-SOFTW, volume = "83 ......
The Design of Rijndael | Guide books
Jana S, Maji A and Pal R (2019) A novel SPN-based video steganographic scheme using Sudoku puzzle for secured data hiding, Innovations in Systems and Software Engineering, 15:1, (65-73), Online publication date: 1-Mar-2019.
研究業績 - 古川研究室 / 九...
Hiroaki Togashi, "Wireless Backhaul-based Sensor Network and its Applications," 5th Asian Workshop on Smart Sensor System (AWSSS 2017), Jeju. Korea, Mar. 2017. Hiroaki Togashi, Ryuta Abe, Junpei Shimamura and Hiroshi Furukawa, "Network-based pedestrian tracking system utilizing densely placed wireless access points," The 11th International ...
Welcome to Connect Journals
Web-based-secure online nonchoice –based examination system (wones) using cryptography R. Sheshadri, T. C. Reddy and N. A. Kumar Vol.15(2012) - No.06 - December
كلية الهندسة, ج...
A Secured Smart Card Using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES " Ehab M. Mohamed, Yassin. M. Y. Hasan, and Hiroshi Furukawa " CSC International Journal of Computer Science and Security, vol.4, No.1, pp.9-22, 2010
1
0
A Secured Smart Card Using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES " Ehab M. Mohamed, Yassin. M. Y. Hasan, and Hiroshi Furukawa " CSC International Journal of Computer Science and Security, vol.4, No.1, pp.9-22, 2010
1
0
http://www.aun.edu.eg/faculty_engineering/arabic/dept_elec/researches.php?page=93&Dept_Code=0202
www.aun.edu.eg/faculty_engineering/arabic/dept_elec/researches.php?page=9...
<span class="highlight">A Secured Smart Card Using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES</span> &quot; Ehab M. Mohamed, Yassin. M. Y. Hasan, and Hiroshi Furukawa &quot; CSC International Journal of Computer Science and Security, vol.4, No.1, pp.9-22, 2010
BibTeX bibliography cryptography2000.bib
%%% -*-BibTeX-*- %%% ===== %%% BibTeX-file{ %%% author = "Nelson H. F. Beebe", %%% version = "3.331", %%% date = "23 July 2020", %%% time = "12:53:01 MDT ...
International Journal of Scientific Research in Computer ...
The end user receive the monitored data by means of GPRS, a wireless communication device. This paper presents the design and implementation of real time monitoring using GPRS between FPGA based embedded system and Android smart phones. This system offers a maximum performance, minimum power and 24 hours real time remote monitoring for tele health.
Cryptographic Hardware and Embedded Systems - MAFIADOC.COM
The ByteSub transformation is the s-box of the Rijndael algorithm and operates on each of the State bytes independently. The s-box is constructed by finding the multiplicative inverse of each byte in GF(28). An affine transformation is then applied, which involves multiplying the result by a matrix and adding to the hexadecimal number ‘63’.
Handbook of Applied Cryptography | Guide books
Chang C, Cheng T and Hsueh W (2016) A robust and efficient dynamic identity-based multi-server authentication scheme using smart cards, International Journal of Communication Systems, 29:2, (290-306), Online publication date: 25-Jan-2016.
US Patent for System and method for determining contingent ...
A system and method providing for communication and resolution of utility functions between participants, wherein the utility function is evaluated based on local information at the recipient to determine a cost value thereof. A user interface having express representation of both information elements, and associated reliability of the information.
|
iSEEK provides users with a Favorites library that allows them easy access to their most-used websites from any computer. If you have an iSEEK account, the content you just selected can be added to your Favorites page to be revisited any time you want.
If you would like to join the iSEEK community, click the "Register" button below to create your free iSEEK account. The resource you have selected will be added to your new Favorites library after you sign in for the first time.
If you already have an iSEEK account, click the button below to sign in and add the resource to your Favorites library.