A low-rate distributed denial of service (DDoS) attack has the ability to obscure its tra c because it is very similar to legitimate tra c. It can easily evade current detection m...
Arindom Ain, Monowar H. Bhuyan, Dhruba K. Bhattach...
Biometric authentication has been getting widespread attention over the past decade with growing demands in automated secured personal identification and has been employed in div...
We show that a recently proposed password authentication scheme based on geometric hashing has several security weaknesses, and that the use of this scheme should be avoided in pr...
In a (t, n) secret sharing scheme (SS), the secret is shared among n shareholders in such a way that (a) with t or more than t shares can recover the secret, and (b) with fewer th...
Cyber attack has become a major concern over the past few years. While the technical capability to attack has declined, hacking tools - both simple and comprehensive - are themsel...
Deris Stiawan, Mohd Yazid Idris, Abdul Hanan Abdul...
In this paper, we proposed a novel blind digital image copyright protection scheme based on Steerable pyramid transform (SPT) and visual cryptography (VC). Unlike traditional wate...
Azz El Arab El Hossaini, Mohamed El Aroussi, Khadi...
The emerging Multimedia Social Network (MSN) provides much more conveniences for the transmission and sharing of multimedia digital contents. However, the scenario on the distribu...
In cloud computing environment, resources are accessed by multiple members. Resources may be considered as VM, CPU, Storage etc. Group key management required when multiple member...