HCTR was proposed by Wang, Feng and Wu in 2005. It is a mode of operation which provides a tweakable strong pseudorandom permutation. Though HCTR is quite an efficient mode, the au...
Various researches have proposed multiple protocols within 802.11 security to protect and authenticate access to wireless LAN. This paper presents the first implementation of EAP-...
The increase popularity of multimedia application especially in image processing places a great demand on efficient data storage and transmission techniques. Network communication ...
In this article, we propose a new construction of probabilistic collusion-secure fingerprint codes against up to three pirates and give a theoretical security evaluation. Our pira...
It is well understood that Mobile Ad Hoc Networks (MANETs) are extremely susceptible to a variety of attacks, and traditional security mechanisms do not work well. Many security sc...