Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Abstract—The current proliferation of mobile devices has resulted in a large diversity of hardware specifications, each designed for different services and applications (e.g. cell phones, smart phones, PDAs). At the same time, e-mail... more
    • by 
    •   20  
      Model CheckingProtocol DesignMobile ComputingFormal Analysis
    • by 
    •   20  
      Computer ScienceDistributed ComputingComputer NetworksSystem Management
    • by 
    •   4  
      Information TechnologyData MiningSecurity PolicyCryptographic Protocols
    • by 
    •   4  
      Information TheoryRandom ProcessesCryptographic ProtocolsSynchronisation
Summary form only given. It is well known that despite all of its advantages the digital revolution also leads to large variety of new risks. One principal issue in this context is the growing dependence of our modern information society... more
    • by 
    •   19  
      Computer ScienceInformation SocietyNetwork SecurityAnonymity
    • by 
    •   10  
      Mobile Ad Hoc NetworkAd Hoc NetworksThAd hoc network
We report a quantum interference of nondiffracting beams by using photon pairs generated by spontaneous parametric down-conversion. The photon pairs transmitted by two double annular aperture produce fourth-order interference pattern... more
    • by 
    •   10  
      Quantum OpticsSpontaneous Parametric Down-conversionQuantum MechanicsCryptography
    • by 
    •   4  
      Computer ScienceLocation Based ServicesCryptographic ProtocolsLocation Privacy
    • by 
    •   14  
      Computer ScienceCryptographyAuthenticationProtocols
    • by 
    •   9  
      Cognitive ScienceDistributed ComputingAd Hoc NetworksMobile and Pervasive Computing
    • by 
    •   16  
      Distributed ComputingGraph TheoryComputer NetworksCriminal Investigation
    • by 
    •   12  
      CalculusComputer SecurityCryptographyDistributed System
    • by 
    •   19  
      Computer ScienceDistributed ComputingSignal ProcessingDistributed Algorithms
    • by 
    •   13  
      Distributed ComputingEnvironmental ManagementCryptographySecurity Management
    • by  and +1
    •   6  
      Distributed ComputingDigital SignaturePublic Key InfrastructureCommunication model
    • by 
    •   8  
      CryptographyFrequencyThroughputPublic key cryptography
    • by 
    •   15  
      FPGAField-Programmable Gate ArraysParallel & Distributed ComputingHardware
    • by 
    •   7  
      Computer ScienceProtocolsProtocolPublic key cryptography
    • by 
    •   11  
      Computer SecurityCryptographyWireless networksMobile Computing
International Journal on Cryptography and Information Security ( IJCIS) is an open access peer reviewed journal that focuses on cutting-edge results in applied cryptography andInformation security. It aims to bring together scientists,... more
    • by 
    •   6  
      Mathematics of CryptographyCryptographyQuantum CryptographyFormal Verification of Cryptographic Protocols
11th International Conference on Cryptography and Information Security (CRYPIS 2022) focuses on cutting-edge results in Applied Cryptography and Information security. It aims to bring together scientists, researchers and students to... more
    • by 
    •   20  
      Artificial Immune SystemsTrust ManagementFuzzy SystemsQuantum Cryptography
    • by 
    •   6  
      Quantum CryptographyQuantum Key DistributionKey Agreement ProtocolsError Correction
    • by 
    •   9  
      Distributed ComputingGrid ComputingPublic key cryptographyGrid
We consider the problem of rational secret sharing introduced by Halpern and Teague [1], where the players involved in secret sharing play only if it is to their advantage. This can be characterized in the form of preferences. Players... more
    • by  and +1
    •   20  
      Information SystemsInformation ScienceInformation TechnologyInformation Security
The Hill cipher is a classical symmetric encryption algorithm that succumbs to the know-plaintext attack. Although its vulnerability to cryptanalysis has rendered it unusable in practice, it still serves an important pedagogical role in... more
    • by 
    •   11  
      CryptographyLinear AlgebraCryptanalysisData Security
    • by 
    •   11  
      Data MiningPrivacyCryptographyProtocols
    • by 
    •   8  
      Wireless Sensor NetworksInternet of ThingsAuthenticationHeterogeneity
    • by 
    •   8  
      EngineeringCryptographyState EstimationMathematical Sciences
All Classical cryptographic methods used in our life based on mathematical ideas & computational assumption are actually unsafe, so quantum cryptography is proposed nowadays Quantum key distribution (QKD) promises secure key agreement by... more
    • by 
    •   9  
      Quantum MechanicsQuantum CryptographyQuantum Key DistributionError Correction
    • by  and +1
    •   10  
      Civil EngineeringUbiquitous ComputingGlobal Positioning SystemUniversal Design
Quantum key distribution is a technique that permits the secure distribution of a bit string that is used as key in cryptographic protocols. The security is guaranteed by suitable coding of the information in a quantum property and from... more
    • by 
    •   7  
      MicrowaveQuantum CryptographyQuantum Key DistributionOptical physics
    • by 
    •   12  
      BusinessCryptographyMicrocontrollersHardware
    • by 
    •   5  
      Wireless Adhok Network and Network SecuritySystemSurvey of Current and Future Trends in Security in Wireless NetworksCryptographic Protocols
Internet-enabled wireless devices continue to proliferate and are expected to surpass tradition-al Internet clients in the near future. This has opened up exciting new opportunities in the mobile e-commerce market. However, data secu-rity... more
    • by 
    •   20  
      Computer ScienceDistributed ComputingInternet SecurityCryptography
In the development of 3G devices, all element of multimedia (text image audio and video) are used. To use this information, a channel of high bandwidth and more secured system is required. In this era, network security has become an issue... more
    • by 
    •   14  
      Data MiningMultimediaNetwork SecurityElliptic curves
11 th International Conference on Cryptography and Information Security (CRYPIS 2022) focuses on cutting-edge results in Applied Cryptography and Information security. It aims to bring together scientists, researchers and students to... more
    • by 
    •   11  
      Fuzzy SystemsSecurity ManagementSecurity EngineeringSecure Cloud Computing
    • by 
    •   12  
      MathematicsEngineering ManagementTechnology ManagementSpace Technology
    • by 
    •   16  
      MathematicsQuantum ComputingPhysicsInformation Theory
The GSM network with the greatest worldwide number of users, succumbs to several security vulnerabilities. The short message service (SMS) is one of its superior and well-tried services with a global availability in the GSM networks. The... more
    • by 
    •   13  
      CryptographyProtocolsGSM networkGSM
Mashups have emerged as a Web 2.0 phenomenon, connecting disjoint applications together to provide unified services. However, scalable access control for mashups is difficult. To enable a mashup to gather data from legacy applications and... more
    • by 
    •   7  
      Access ControlDelegationWebMashup
    • by 
    •   9  
      Speaker RecognitionBiometricsAuthenticationSpeech Processing
11thInternational Conference on Cryptography and Information Security (CRYPIS 2022)focuses on cutting-edge results in Applied Cryptography and Information security. It aims to bring together scientists,... more
    • by 
    •   12  
      DesignArchitectureDatabase SystemsSecurity