Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 6, Issue 3January 2016
Publisher:
  • Inderscience Publishers
  • World Trade Center Bldg, 29, route de Pre-Bois, Case Postale 896
  • Geneva 15
  • Switzerland
ISSN:1748-569X
EISSN:1748-5703
Skip Table Of Content Section
article
Building a common encryption scrambler to protect paid broadcast services

Conditional access systems CAS are used in paid broadcasting services to ensure that only authorised users can access the protected content. It is therefore a crucial technology in developing paid broadcasting services. In a conventional paid ...

article
On the security of a strong provably secure identity-based encryption scheme without bilinear pairing

The identity-based encryption scheme enables a sender to generate the ciphertext using a receiver's identity and system's parameters. Because of its convenience, the identity-based encryption scheme has been widely used in many practical applications. ...

article
A decision tree-based rule formation with combined PSO-GA algorithm for intrusion detection system

Intrusion detection is the method of analysing and monitoring the actions in the internet to recognise the ciphers of security issues. Nowadays, the existing intrusion detection algorithms concentrate on the issues of feature selection, because some of ...

article
Efficient implementation of power analysis attack resistant advanced encryption standard algorithm on side-channel attack standard evaluation board

This paper presents a practical smart card implementation of advanced encryption standard AES-128 algorithm combined with a simple yet effective masking scheme to protect it against first-order power analysis attacks in both time and frequency domain. ...

article
An improvement of a elliptic curve digital signature algorithm

The elliptic curve digital signature algorithm ECDSA is the first successful algorithm based on elliptic curve and it is elliptic curve analogue of digital signature algorithm DSA. The security of this algorithm relies on intractability of elliptic ...

article
Encrypted similarity search feasible of keyword index search schemes

Encrypting information has been regarded as one of the most substantial approaches to protect users' sensitive information in radically changing current and future computing environments, especially for cloud datacentre whose server manager cannot be ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.