Sciweavers

83 search results - page 13 / 17
» ijnsec 2008
Sort
View
IJNSEC
2008
103views more  IJNSEC 2008»
13 years 6 months ago
On Cipher Design Based on Switchable Controlled Operations
This paper concerns the problem of reducing the implementation cost of the switchable data-dependent operations (SDDOs) that are a new cryptographic primitive oriented to the desi...
Nikolay A. Moldovyan
IJNSEC
2008
135views more  IJNSEC 2008»
13 years 6 months ago
Software Implementations of Elliptic Curve Cryptography
Elliptic Curve Cryptography (ECC) is a promising alternative for public-key algorithms in resource-constrained systems because it provides a similar level of security with much sh...
Zhijie Jerry Shi, Hai Yun
IJNSEC
2008
145views more  IJNSEC 2008»
13 years 6 months ago
Efficient User Authentication and Key Agreement with User Privacy Protection
Using smart cards, remote user authentication and key agreement can be simplified, flexible, and efficient for creating a secure distributed computers environment. Addition to use...
Wen-Shenq Juang, Jing-Lin Wu
IJNSEC
2008
72views more  IJNSEC 2008»
13 years 6 months ago
Bandwidth-Conserving Multicast VoIP Teleconference System
Teleconferencing is an essential feature in any business telephone system. A teleconference allows associates to engage in a group discussion by conducting a virtual meeting while...
Teck-Kuen Chua, David C. Pheanis
IJNSEC
2008
107views more  IJNSEC 2008»
13 years 6 months ago
Short Designated Verifier Signature Scheme and Its Identity-based Variant
The notion of strong designated verifier signature was put forth by Jakobsson, Sako and Impagliazzo in 1996, but the formal definition was defined recently by Saeednia, Kremer and...
Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang