Sciweavers

110 search results - page 8 / 22
» ijnsec 2006
Sort
View
IJNSEC
2007
82views more  IJNSEC 2007»
14 years 9 months ago
On Software Implementation of Fast DDP-based Ciphers
Data-dependent (DD) permutations (DDP) are discussed as a cryptographic primitive for the design of fast hardware, firmware, and software encryption systems. DDP can be performed...
Nikolay A. Moldovyan, Peter A. Moldovyanu, Douglas...
IJNSEC
2007
121views more  IJNSEC 2007»
14 years 9 months ago
Injecting Heterogeneity Through Protocol Randomization
In this paper, we argue that heterogeneity should be an important principle in design and use of cryptographic protocols. We use automated formal analysis tools to randomly genera...
Li Zhuang, J. D. Tygar, Rachna Dhamija
IJNSEC
2007
154views more  IJNSEC 2007»
14 years 9 months ago
Integrity of mobile agents: a new approach
The recent developments in the mobile technology (mobile phones, middleware) created a need for new methods of protecting the code transmitted through the network. The oldest and ...
Aneta Zwierko, Zbigniew Kotulski
IJNSEC
2007
145views more  IJNSEC 2007»
14 years 9 months ago
Authenticated Group Key Agreement Protocols for Ad hoc Wireless Networks
The lack of fixed infrastructure, both physical and organizational, and the highly dynamic nature of ad hoc networks, presents a major challenge in providing secure, authenticate...
Ahmed Abdel-Hafez, Ali Miri, Luis Orozco-Barbosa
IJNSEC
2007
127views more  IJNSEC 2007»
14 years 9 months ago
A Web-based Multilayer Access Control Model for Multimedia Applications in MPEG-7
This paper presents a Criterion-Based Role-Based Access Control model in which secure permissions (SP), secure operations (SOp), secure objects (SOb), and secure users (SU) are in...
Leon Pan