Export Citations
Building a common encryption scrambler to protect paid broadcast services
Conditional access systems CAS are used in paid broadcasting services to ensure that only authorised users can access the protected content. It is therefore a crucial technology in developing paid broadcasting services. In a conventional paid ...
On the security of a strong provably secure identity-based encryption scheme without bilinear pairing
The identity-based encryption scheme enables a sender to generate the ciphertext using a receiver's identity and system's parameters. Because of its convenience, the identity-based encryption scheme has been widely used in many practical applications. ...
A decision tree-based rule formation with combined PSO-GA algorithm for intrusion detection system
Intrusion detection is the method of analysing and monitoring the actions in the internet to recognise the ciphers of security issues. Nowadays, the existing intrusion detection algorithms concentrate on the issues of feature selection, because some of ...
Efficient implementation of power analysis attack resistant advanced encryption standard algorithm on side-channel attack standard evaluation board
This paper presents a practical smart card implementation of advanced encryption standard AES-128 algorithm combined with a simple yet effective masking scheme to protect it against first-order power analysis attacks in both time and frequency domain. ...
An improvement of a elliptic curve digital signature algorithm
The elliptic curve digital signature algorithm ECDSA is the first successful algorithm based on elliptic curve and it is elliptic curve analogue of digital signature algorithm DSA. The security of this algorithm relies on intractability of elliptic ...
Encrypted similarity search feasible of keyword index search schemes
Encrypting information has been regarded as one of the most substantial approaches to protect users' sensitive information in radically changing current and future computing environments, especially for cloud datacentre whose server manager cannot be ...