Securing peer-to-peer mobile communications using public key cryptography: New security strategy
暂无分享,去创建一个
A. A. Zaidan | B. B. Zaidan | Miss Laiha Mat Kiah | Sameer Hasan Albakri | Gazi Mahabubul Alam | G. M. Alam | M. L. M. Kiah | B. Zaidan | A. Zaidan
[1] 黒沢 馨,et al. Low exponent attack against elliptic curve RSA , 1995 .
[2] Marko Hassinen,et al. Secure SMS messaging using Quasigroup encryption and Java SMS API , 2003, SPLST.
[3] Eli Biham,et al. Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication , 2003, CRYPTO.
[4] Dake He,et al. Study on NTRU Decryption Failures , 2005, Third International Conference on Information Technology and Applications (ICITA'05).
[5] M. Hassinen,et al. Java based Public Key Infrastructure for SMS Messaging , 2006, 2006 2nd International Conference on Information & Communication Technologies.
[6] Narasimham Challa,et al. Performance Analysis of Public key Cryptographic Systems RSA and NTRU , 2007 .
[7] Yu-Fang Chung,et al. ID-based digital signature scheme on the elliptic curve cryptosystem , 2007, Comput. Stand. Interfaces.
[8] Vivek Kapoor,et al. Elliptic curve cryptography , 2008, UBIQ.
[9] Mohsen Toorani,et al. SSMS - A secure SMS messaging protocol for the m-payment systems , 2008, 2008 IEEE Symposium on Computers and Communications.
[10] Shuping Liu,et al. Building secure user-to-user messaging in mobile telecommunication networks , 2008, 2008 Wireless Telecommunications Symposium.
[11] Tai-Hoon Kim,et al. Crossed Crypto-Scheme in WPA PSK Mode , 2009, 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security.
[12] Rong Chen,et al. Research on NTRU Algorithm for Mobile Java Security , 2009, 2009 International Conference on Scalable Computing and Communications; Eighth International Conference on Embedded Computing.
[13] Chengxiang Tan,et al. A High Security Framework for SMS , 2009, 2009 2nd International Conference on Biomedical Engineering and Informatics.
[14] B. B. Zaidan,et al. A new hybrid module for skin detector using fuzzy inference system structure and explicit rules , 2010 .
[15] Bilal Bahaa Zaidan,et al. Impact of spam advertisement through e-mail: A study to assess the influence of the anti-spam on the e-mail marketing , 2010 .
[16] Olusegun Folorunso,et al. Improving e-payment security using Elliptic Curve Cryptosystem , 2010, Electron. Commer. Res..
[17] A. A. Zaidan,et al. StegoMos: a secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem , 2010 .
[18] A. A. Zaidan,et al. A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm , 2010 .
[19] V. S. Shankar Sriram,et al. Multiplication Based Elliptic Curve Encryption Scheme with Optimized Scalar Multiplication (MECES) , 2010 .
[20] Frederik Vercauteren,et al. Speed Records for NTRU , 2010, CT-RSA.
[21] Abdullah Gani. Novel approach for high (secure and rate) data hidden within triplex space for executable file , 2010 .
[22] B. B. Zaidan,et al. Secure Topology for Electronic Medical Record Transmissions , 2010 .
[23] A. A. Zaidan,et al. Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem , 2010 .
[24] Miss Laiha Mat Kiah. Suitability of SOAP Protocol in Securing Transmissions of EMR Database , 2010 .
[25] Hamid A. Jalab,et al. Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance , 2010 .
[26] Abdul Monem S. Rahma,et al. A New Attack on NTRU Public Key Cryptosystem Depend on Using Public Key and Public Information , 2010 .
[27] Zarinah Mohd Kasirun,et al. On the accuracy of hiding information metrics: counterfeit protection for education and important certificates , 2010 .
[28] A. A. Zaidan,et al. SSME architecture design in reserving parking problems in Malaysia , 2010 .
[29] B. B. Zaidan,et al. A novel hybrid module of skin detector using grouping histogram technique for Bayesian method and segment adjacent-nested technique for neural network , 2010 .
[30] Othman Omran Khalifa,et al. Suitability of using symmetric key to secure multimedia data: an overview, , 2010 .
[31] A. A. Zaidan,et al. Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: analytical study , 2010 .
[32] A. A. Zaidan,et al. Increase reliability for skin detector using backprobgation neural network and heuristic rules based on YCbCr , 2010 .
[33] B. B. Zaidan,et al. Spam influence on business and economy: Theoretical and experimental studies for textual anti-spam filtering using mature document processingand naive Bayesian classifier , 2011 .