Sciweavers

42
Voted
IJNSEC
2016
50views more  IJNSEC 2016»
10 years 1 months ago
A Quantitative and Qualitative Analysis-based Security Risk Assessment for Multimedia Social Networks
The emerging Multimedia Social Network (MSN) provides much more conveniences for the transmission and sharing of multimedia digital contents. However, the scenario on the distribu...
Zhiyong Zhang, Lijun Yang, Hanman Li, Fei Xiang
56
Voted
IJNSEC
2016
48views more  IJNSEC 2016»
10 years 1 months ago
Key Trees Combining Algorithm for Overlapping Resource Access Members
In cloud computing environment, resources are accessed by multiple members. Resources may be considered as VM, CPU, Storage etc. Group key management required when multiple member...
Amar Buchade, Rajesh Ingle
IJMMS
2016
44views more  IJMMS 2016»
10 years 1 months ago
Categorization of seismic sources by auditory display: A blind test
15 Recordings of the Earth’s surface oscillation as a function of time (seismograms) can be sonified by compressing time so that most of the signal’s frequency spectrum falls ...
Arthur Paté, Lapo Boschi, Jean-Loïc Le...
IJMI
2016
61views more  IJMI 2016»
10 years 1 months ago
Effects of eHealth for patients and informal caregivers confronted with cancer: A meta-review
Vina N. Slev, Patriek Mistiaen, H. Roeline W. Pasm...
37
Voted
IJISEC
2016
46views more  IJISEC 2016»
10 years 1 months ago
Link-time smart card code hardening
This paper presents a feasibility study to protect smart card software against fault-injection attacks by means of link-time code rewriting. This approach avoids the drawbacks of s...
Ronald De Keulenaer, Jonas Maebe, Koen De Bosscher...
38
Voted
IJISEC
2016
67views more  IJISEC 2016»
10 years 1 months ago
On selection of samples in algebraic attacks and a new technique to find hidden low degree equations
The best way of selecting samples in algebraic attacks against block ciphers is not well explored and understood. We introduce a simple strategy for selecting the plaintexts and de...
Petr Susil, Pouyan Sepehrdad, Serge Vaudenay, Nico...
39
Voted
IJISEC
2016
49views more  IJISEC 2016»
10 years 1 months ago
Sakai-Ohgishi-Kasahara identity-based non-interactive key exchange revisited and more
Identity-based non-interactive key exchange (IB-NIKE) is a powerful but a bit overlooked primitive in identity-based cryptography. While identity-based encryption and signature ha...
Yu Chen, Qiong Huang, Zongyang Zhang
IJIS
2016
59views more  IJIS 2016»
10 years 1 months ago
Need for Data Processing Naturally Leads to Fuzzy Logic (and Neural Networks): Fuzzy Beyond Experts and Beyond Probabilities
Fuzzy techniques have been originally designed to describe imprecise (“fuzzy”) expert knowledge. Somewhat surprisingly, fuzzy techniques have also been successfully used in si...
Vladik Kreinovich, Hung T. Nguyen, Songsak Sriboon...