Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Security of the consumer’s data over internet is the major problem in present time. In this paper we have analyzed blind signature schemes based on RSA and with taking advantage of elliptic curve cryptography to achieve the security... more
    • by 
    •   6  
      Computer ScienceSecurityDigital SignatureECC
    • by 
    •   7  
      Computer ScienceImage ProcessingEncryptionECC
Enhancing concrete by adding different types of suitable materials is a very attractive field within concrete research society. The use of waste tires was introduced into concrete to reduce its brittle nature and its loading toughness.... more
    • by 
    •   4  
      RecyclingECCCrumb RubberCivil Engineering Applications
In today's period of the invasive figuring, the Internet has turned into the principle method of information correspondence. In such a situation, giving security to information turns into a mind boggling assignment. In Elliptic bend... more
    • by 
    •   4  
      Elliptic curvesECCAttacksDiffie-Hellman-DSA
Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three... more
    • by 
    •   13  
      Computer NetworksPerformanceCryptographyECDSA
    • by 
    •   2  
      CryptographyECC
This paper proposes a method for designing a new ultra wide band (UWB) multiple-input multiple-output (MIMO) antenna with two and four elements. First we presented an ultra-wide band antenna we studied these performances. Then, we studied... more
    • by 
    •   6  
      ECCMetamaterialIsolationDiversity gain
Mobile payment system is defined as mobile money transfer and mobile wallet. It is also defined as an electronic payment method. Moreover, Mobile payment has been generated to be an attractive alternative for the traditional payments... more
    • by 
    •   4  
      Computer ScienceCryptographyECCSteganography and Cryptography
    • by 
    •   2  
      CryptographyECC
Currently protection codes are essential to memory cells using to maintain a good reliability, various error detection and error correction methods can be used but to avoid corruption data Error correction code (ECC) are mostly widely... more
    • by 
    •   5  
      ERTECCSecDMC
    • by 
    •   7  
      Computer ScienceAuthenticationWsnECC
a day's information technology is a part of day to day's life. Everybody wants to store data in soft format in a central place so that it can be accessed any point of time. When a remote user tries accessing it through an... more
    • by 
    •   5  
      Computer ScienceCryptographyECCComputer Applications
In today's period of the invasive figuring, the Internet has turned into the principle method of information correspondence. In such a situation, giving security to information turns into a mind boggling assignment. In Elliptic bend... more
    • by 
    •   4  
      Elliptic curvesECCAttacksDiffie-Hellman-DSA
Concrete with adequately soaring compressive strength has been in use for building skyscrapers, pavements, two-dimensional elements like plates and slab-decks, threedimensional solid masses like retaining walls and dams. However, majority... more
    • by 
    •   5  
      ECCFly AshESEMStrain Hardening
    • by 
    •   3  
      ECCDICOMWater Marking
    • by 
    •   3  
      ECCSigncryptionIJMER
    • by 
    •   10  
      Information SecuritySecurityComputer SecurityCryptography
To protect user privacy in profile-based PWS, propose a PWS framework called UPS that can adaptively generalize profiles by queries while respecting user specified privacy requirements. It has to consider two contradicting effects during... more
    • by 
    •   6  
      CryptographyECCElliptic Curve CryptographyPws
Many problems associated with the use of normal weight concrete have been solved with the development of structural ultra-lightweight engineered cementitious composite (SULWECC) that has the capability to exhibit strain-hardening behavior... more
    • by 
    •   10  
      Civil EngineeringArchitectureMonte CarloReliability
Enhancing concrete by adding dif erent types of suitable materials is a very attractive field within concrete research society. The use of waste tires was introduced into concrete to reduce its brittle nature and its loading toughness.... more
    • by 
    •   5  
      RecyclingECCCrumb RubberCivil Engineering Applications
    • by 
    •   9  
      Computer ScienceImage ProcessingInformation SecurityCryptography
    • by 
    •   7  
      Civil EngineeringStructural EngineeringFRPECC
The wide use of vehicular ad hoc networks (VANETs) in the last decade has led many researchers to find efficient and reliable methods to obtain the desired benefits and offer services, such as healthcare and traffic management. However,... more
    • by 
    •   6  
      AuthenticationVANETsECCInsider attacks
a day's information technology is a part of day to day's life. Everybody wants to store data in soft format in a central place so that it can be accessed any point of time. When a remote user tries accessing it through an... more
    • by 
    •   5  
      Computer ScienceCryptographyECCComputer Applications
This paper proposes a method for designing a new ultra wide band (UWB) multiple-input multiple-output (MIMO) antenna with two and four elements. First we presented an ultra-wide band antenna we studied these performances. Then, we studied... more
    • by 
    •   8  
      Computer ScienceECCMetamaterialIsolation
In this paper, the problem of robust fractional-order observer (RFO) design in time and frequency domains for disturbed fractional-order system is investigated. The main results include the formulation of robust observer design problems... more
    • by 
    •   14  
      Fractional Differential EquationsFractional Order Control SystemsFractional calculus and its applicationsLinear Matrix Inequalities
Smart Governance is the process of utilizing modern technology to create a transparent and sustainable environment for citizens and the government. Intelligence through smart governance is utilized to upgrade decision making through a... more
    • by 
    •   3  
      BigdataECCRegional Transport Office
    • by 
    •   5  
      AuthenticationVanet SecurityECCEecc
A recent development in the adhoc network is a vehicular network called VANET (Vehicular Adhoc Network). Intelligent Transportation System is the Intelligent application of VANET. Due to open nature of VANET attacker can launch various... more
    • by 
    •   5  
      AuthenticationVanet SecurityECCEecc
    • by 
    •   5  
      CryptographyECCMulticastKey Management
    • by 
    •   6  
      Digital SignatureEncryptionECCMD5
    • by 
    •   7  
      Digital SignatureEncryptionNetworkingECC
    • by 
    •   4  
      DSPECCDBNSTBNS