Sciweavers

IJNSEC
2008
90views more  IJNSEC 2008»
13 years 11 months ago
Trace Representations and Multi-rate Constructions of Two Classes of Generalized Cyclotomic Sequences
In this paper, two classes of generalized cyclotomic sequences of period pq are reconstructed by means of multirate parallel combinations of binary Legendre sequences which are cl...
Tongjiang Yan, Xiaoni Du, Shuqing Li, Guozhen Xiao
IJNSEC
2008
132views more  IJNSEC 2008»
13 years 11 months ago
Optimal Energy-Delay Routing Protocol with Trust Levels for Wireless Ad Hoc Networks
This paper presents the Trust Level Routing (TLR) protocol, an extension of the optimized energy-delay routing (OEDR) protocol, focusing on the integrity, reliability and survivab...
Eyad Taqieddin, S. Jagannathan, Ann Miller
IJNSEC
2008
145views more  IJNSEC 2008»
13 years 11 months ago
Efficient User Authentication and Key Agreement with User Privacy Protection
Using smart cards, remote user authentication and key agreement can be simplified, flexible, and efficient for creating a secure distributed computers environment. Addition to use...
Wen-Shenq Juang, Jing-Lin Wu
IJNSEC
2008
119views more  IJNSEC 2008»
13 years 11 months ago
Customizing Cellular Message Encryption Algorithm
This paper observes the cryptanalysis of the Telecommunications Industry Association's Cellular Message Encryption Algorithm (CMEA). The CMEA has been widely used for wireles...
Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury
IJNSEC
2008
160views more  IJNSEC 2008»
13 years 11 months ago
Authenticated Reliable and Semi-reliable Communication in Wireless Sensor Networks
Secure communication in wireless ad hoc sensor networks is a major research concern in the networking community. Especially the few available resources in terms of processing powe...
Falko Dressler
IJNSEC
2008
91views more  IJNSEC 2008»
13 years 11 months ago
A Weakness in Authenticated Encryption Schemes Based on Tseng et al.'s Schemes
Tseng et al. have introduced in 2003 an authenticated encryption scheme by using self-certified public keys. Based on this scheme several authors have proposed new signature schem...
Luis Hernández Encinas, Ángel Mart&i...
IJNSEC
2008
96views more  IJNSEC 2008»
13 years 11 months ago
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks
In flow-based mix networks, flow correlation attacks have been proposed earlier and have been shown empirically to seriously degrade mix-based anonymous communication systems. In ...
Ye Zhu, Xinwen Fu, Riccardo Bettati
IJNSEC
2008
129views more  IJNSEC 2008»
13 years 11 months ago
Repairing Efficient Threshold Group Signature Scheme
To enhance the efficiency of threshold group signature schemes, Yu and Chen, recently, proposed an efficient threshold group signature scheme. By using elliptic curves, the propos...
Zuhua Shao
IJNSEC
2008
164views more  IJNSEC 2008»
13 years 11 months ago
Secure Real-Time Streaming Protocol (RTSP) for Hierarchical Proxy Caching
Proxies are commonly used to cache objects, especially multimedia objects, so that clients can enjoy better quality-of-service (QoS) guarantees such as smaller startup latency and...
Yeung Siu Fung, John C. S. Lui, David K. Y. Yau
IJNSEC
2008
201views more  IJNSEC 2008»
13 years 11 months ago
Detecting and Preventing IP-spoofed Distributed DoS Attacks
In this paper, we explore mechanisms for defending against Distributed Denial of Service (DDoS) attacks, have become one of the major threats to the operation of the Internet toda...
Yao Chen, Shantanu Das, Pulak Dhar, Abdulmotaleb E...