095 / 2 |
Fast Firmware Implementation of RSA-Like Security Protocol for Mobile Devices
|
|
2014-07-01 |
097 / 1 |
Efficient and Secure Protocol in Fair Certified E-Mail Delivery
|
|
2010-08-10 |
089 / 1 |
A Digital Image Copyright Protection Scheme Based on Visual Cryptography
|
|
2016-11-21 |
093 / 1 |
An efficient signcryption scheme with forward secrecy based on elliptic curve
|
|
2016-12-21 |
094 / 1 |
A new efficient authentication protocol for mobile networks
|
|
2016-12-05 |
093 / 2 |
Information Hiding in Lossy Compression Gray Scale Image
|
|
2017-01-13 |
095 / 1 |
A new mobile payment scheme for roaming services
|
|
2014-06-30 |
094 / 2 |
A Wireless-based Authentication and Anonymous Channels for GSM System
|
|
2010-06-16 |
093 / 1 |
A new scheme to protect confidential Images
|
|
2016-12-05 |
094 / 1 |
Key Agreement in Ad Hoc Network
|
|
2017-01-17 |
095 / 1 |
Secure Key Management Scheme for Wireless LAN
|
|
2010-06-16 |
093 / 1 |
Cryptanalysis on stream ciphers for GSM networks
|
|
2017-01-03 |
095 / 2 |
An efficient modulo $P$ multiplication algorithm with moderate factors of P$+1 and $P$-1
|
|
2014-06-30 |
089 / 2 |
Hiding a picture in two pictures
|
|
2017-01-13 |
099 / 2 |
A Short Latency Inter-Domain Handover Authentication Protocol for Wireless Network
|
|
2015-01-07 |
099 / 1 |
An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks
|
|
2015-01-22 |
099 / 1 |
Efficient Electronic Toll Collection Protocol for Intelligent System
|
|
2011-10-01 |
099 / 1 |
Privacy protection on Vehicular Ad hoc NETworks
|
|
2015-02-03 |
087 / 2 |
A Concept of Designing Cheater Identification Methods for Secret Sharing
|
|
2016-11-15 |
086 / 1 |
A simple picture hiding scheme
|
|
2011-10-05 |
085 / 1 |
An efficient cheater identification method for threshold scheme
|
|
2011-10-05 |
087 / 1 |
An improved threshold scheme based on modular arithmetic
|
|
2011-10-05 |
087 / 1 |
An on-line secret sharing scheme for multi-secrets
|
|
2013-12-09 |
081 / 1 |
Master keys for an M3 cryptoscheme
|
|
2012-03-26 |
096 / 1 |
Provably Efficient Authenticated Key Agreement Protocol for Multi-servers
|
|
2024-01-18 |
087 / 1 |
Sharing secret images using shadow codebooks
|
|
2013-12-09 |
087 / 2 |
A concept of designing cheater identification methods for secret sharing
|
|
2016-11-15 |
100 / 2 |
Two-factor authenticated key exchange protocol in the three-party setting
|
|
2013-03-19 |
101 / 1 |
An Identity-Based Secure Distributed Routing Protocol for Wireless Mesh Networks
|
|
2014-06-30 |
103 / 1 |
The Optimal Split Method of Large Integer Multiplication for Smart Low-End Devices on P2P Ubiquitous Networks
|
|
2015-11-19 |
101 / 2 |
A New Two-factor Dynamic ID-based Remote User Authentication Scheme
|
|
2016-12-05 |
080 / 2 |
Cryptographic key assignment scheme for access control in a hierarchy
|
|
2013-06-07 |
102 / 1 |
An Anonymous Distributed Routing Protocol in Mobile Ad-hoc Networks
|
|
2014-09-04 |
103 / 1 |
Anonymous Routing Protocol Based on Weil Pairing for Wireless Mesh Networks
|
|
2016-11-11 |