Sciweavers

IJNSEC
2006
71views more  IJNSEC 2006»
13 years 11 months ago
Joint Sparse Form of Window Three for Koblitz Curve
The joint sparse form (JSF) for the non-adjacent form (NAF) representation of two large integers a and b, was proposed by Solinas. Then Ciet extended it to the -JSF for the -NAF r...
Yong Ding, Kwok-Wo Wong, Yu-Min Wang
IJNSEC
2006
67views more  IJNSEC 2006»
13 years 11 months ago
A Time-stamping Proxy Signature Scheme Using Time-stamping Service
In current proxy signature schemes, an original signer delegates her signing capability to a proxy signer, and then the proxy signer can sign messages on behalf of the original si...
Eric Jui-Lin Lu, Cheng-Jian Huang
IJNSEC
2006
112views more  IJNSEC 2006»
13 years 11 months ago
An Access Control System with Time-constraint Using Support Vector Machines
Access control is an important issue in information security. It is a necessary mechanism for protecting data in a computer system. In this paper, we apply support vector machines...
Chin-Chen Chang, Iuon-Chang Lin, Chia-Te Liao
IJNSEC
2006
115views more  IJNSEC 2006»
13 years 11 months ago
Reversible Watermarking: Current Status and Key Issues
Over the past few years a number of research papers about reversible watermarks has been produced. Reversible watermarking is a novel category of watermarking schemes. It not only...
Jen-Bang Feng, Iuon-Chang Lin, Chwei-Shyong Tsai, ...
IJNSEC
2006
80views more  IJNSEC 2006»
13 years 11 months ago
Authenticated Access to Reserved Network Resources
Enhanced network services often involve preferential allocation of resources such as transmission capacity ("bandwidth") and buffer space to packets belonging to certain...
Kenneth L. Calvert, Srinivasan Venkatraman, Jim Gr...
IJNSEC
2006
113views more  IJNSEC 2006»
13 years 11 months ago
Cryptanalysis of Park's Authentication Protocol in Wireless Mobile Communication Systems
In 2004, C. Park proposed an authentication protocol to provide user anonymity and untraceability in wireless mobile communication systems. The real user identities are hidden and...
Alberto Peinado Domínguez
IJNSEC
2006
94views more  IJNSEC 2006»
13 years 11 months ago
A Binary Redundant Scalar Point Multiplication in Secure Elliptic Curve Cryptosystems
The main back-bone operation in elliptic curve cryptosystems is scalar point multiplication. The most frequently used method implementing the scalar point multiplication which is ...
Sangook Moon
IJNSEC
2006
61views more  IJNSEC 2006»
13 years 11 months ago
Is There a Shortage of Primes for Cryptography?
Cryptographic algorithms often prescribe the use of primes whose length in bits is a power of 2. Recently, we proved that for m > 1, there is no prime number with 2m significan...
Samuel S. Wagstaff Jr.
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 11 months ago
Personality Trait Based Simulation Model of the E-mail System
Within the area of criminal and terrorist social network analysis, there is little research being done on analysing the communication behavior of criminal and terrorist groups. In...
Mark Jyn-Huey Lim, Michael Negnevitsky, Jacky Hart...
IJNSEC
2006
96views more  IJNSEC 2006»
13 years 11 months ago
Off-line Password Guessing Attack on an Efficient Key Agreement Protocol for Secure Authentication
In 2004, Kim, Huh, Hwang and Lee proposed an efficient key agreement protocol for secure authentication. In this paper, we shall show that their proposed protocol cannot resist th...
Rongxing Lu, Zhenfu Cao