Sciweavers

29 search results - page 6 / 6
» ijnsec 2010
Sort
View
IJNSEC
2010
120views more  IJNSEC 2010»
12 years 11 months ago
Secure Group Key Management Scheme for Multicast Networks
This paper proposes a scheme to provide security to dynamic multicast VoIP systems efficiently. Security is usually provided by encrypting the media packets sent from a user to ot...
R. Srinivasan, V. Vaidehi, R. Rajaraman, S. Kanaga...
IJNSEC
2010
151views more  IJNSEC 2010»
12 years 11 months ago
Performance Evaluation of Mobility Speed over MANET Routing Protocols
Ad-hoc networking is a concept in computer communications. Each node participating in the network acts both as host and a router and must therefore is willing to forward packets f...
Yasser Kamal Hassan, Mohamed Hashim Abd El-Aziz, A...
IJNSEC
2010
247views more  IJNSEC 2010»
12 years 11 months ago
Hardware Implementation of Efficient Modified Karatsuba Multiplier Used in Elliptic Curves
The efficiency of the core Galois field arithmetic improves the performance of elliptic curve based public key cryptosystem implementation. This paper describes the design and imp...
Sameh M. Shohdy, Ashraf El-Sisi, Nabil A. Ismail
IJNSEC
2010
163views more  IJNSEC 2010»
12 years 11 months ago
Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types
As the importance and the value of exchanged data over the Internet or other media types are increasing, the search for the best solution to offer the necessary protection against...
Diaa Salama Abdul Minaam, Hatem M. Abdual-Kader, M...