Sciweavers

14824 search results - page 2776 / 2965
» Security - Introduction
Sort
View
IJNSEC
2011
110views more  IJNSEC 2011»
14 years 6 months ago
An Anonymous Auction Protocol Based on GDH Assumption
The popularization and conveniences of Internet have changed traditional auction transactions into electronic auction via Internet. In 2006, Chang and Chang proposed an anonymous ...
Fuw-Yi Yang, Cai-Ming Liao
IJNSEC
2011
167views more  IJNSEC 2011»
14 years 6 months ago
New Real Time Multicast Authentication Protocol
Multicast gives professional large-scale content distribution by providing an efficient transport mechanism for one-to-many and many-to-many communications. There is a number of s...
Riham Abdellatif, Heba Kamal Aslan, Salwa H. Elram...
JCS
2011
87views more  JCS 2011»
14 years 6 months ago
Practical eavesdropping and skimming attacks on high-frequency RFID tokens
RFID systems often use near-field magnetic coupling to implement communication channels. The advertised operational range of these channels is less than 10 cm and therefore sever...
Gerhard P. Hancke
JSAC
2011
159views more  JSAC 2011»
14 years 6 months ago
An Anti-Jamming Stochastic Game for Cognitive Radio Networks
—Various spectrum management schemes have been proposed in recent years to improve the spectrum utilization in cognitive radio networks. However, few of them have considered the ...
Beibei Wang, Yongle Wu, K. J. Ray Liu, T. Charles ...
TIM
2011
172views more  TIM 2011»
14 years 6 months ago
Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores
—High-resolution automated fingerprint recognition systems (AFRSs) offer higher security because they are able to make use of level-3 features, such as pores, that are not avail...
David Zhang, Feng Liu, Qijun Zhao, Guangming Lu, N...
« Prev « First page 2776 / 2965 Last » Next »