Search Word(s) in Title, Keywords, Authors, and Abstract: Encryption

Selective Encryption Algorithm Using Hybrid Transform for GIS Vector Map
Bang Nguyen Van, Suk-Hwan Lee and Ki-Ryong Kwon
Page: 68~82, Vol. 13, No.1, 2017

Keywords: Chaotic Map, GIS Vector Map, Selective Encryption, Vector Map Security
Show / Hide Abstract

Query with SUM Aggregate Function on Encrypted Floating-Point Numbers in Cloud
Taipeng Zhu, Xianxia Zou and Jiuhui Pan
Page: 573~589, Vol. 13, No.3, 2017

Keywords: Coding Scheme, DoubleListTree, Encryption, Floating-Point Numbers, Summation
Show / Hide Abstract

A Novel Approach for Integrating Security in Business Rules Modeling Using Agents and an Encryption Algorithm
Nawal Sad Houari and Noria Taghezout
Page: 688~710, Vol. 12, No.4, 2016

Keywords: Business Rules (BR), Business Rules Management System (BRMS), Encryption Algorithms, Security Agent
Show / Hide Abstract

Genetic Symmetric Key Generation for IDEA
Nandini Malhotra and Geeta Nagpal
Page: 239~247, Vol. 11, No.2, 2015

Keywords: Crossover, IDEA, Genetic Algorithm, Mutation, Symmetric Key Generation
Show / Hide Abstract

Counter Chain: A New Block Cipher Mode of Operation
Aly Mohamed El-Semary and Mohamed Mostafa A. Azim
Page: 266~279, Vol. 11, No.2, 2015

Keywords: Authentication, Block Cipher Mode, Confidentiality, Counter Mode, Counter Chain
Show / Hide Abstract

Improving the Diffusion of the Stream Cipher Salsa20 by Employing a Chaotic Logistic Map
Mishal Almazrooie, Azman Samsudin and Manmeet Mahinderjit Singh
Page: 310~324, Vol. 11, No.2, 2015

Keywords: Chaos Theory, Cryptography, Differential Attacks, Hash Function, Logistic Map, Salsa20, Stream Cipher
Show / Hide Abstract

Cooperation-Aware VANET Clouds: Providing Secure Cloud Services to Vehicular Ad Hoc Networks
Rasheed Hussain and Heekuck Oh
Page: 103~118, Vol. 10, No.1, 2014
Keywords: VANET Clouds, Security, Privacy, Traffic Information, Data Dissemination, Cloud Computing
Show / Hide Abstract

Optical Image Encryption and Decryption Considering Wireless Communication Channels
Myungjin Cho and In-Ho Lee
Page: 215~222, Vol. 10, No.2, 2014
Keywords: Optical Encryption and Decryption, Wireless Communication Channels
Show / Hide Abstract

Modified Multi-Chaotic Systems that are Based on Pixel Shuffle for Image Encryption
Om Prakash Verma, Munazza Nizam and Musheer Ahmad
Page: 271~286, Vol. 9, No.2, 2013
Keywords: Chaotic Systems, Number of Pixel Change Rate, Unified Average Changed Intensity, Correlation Coefficient, Entropy
Show / Hide Abstract

A Secure Index Management Scheme for Providing Data Sharing in Cloud Storage
Sun-Ho Lee and Im-Yeong Lee
Page: 287~300, Vol. 9, No.2, 2013
Keywords: Searchable Encryption, Proxy Re-Encryption, Index Management, Cloud Computing, Cloud Storage
Show / Hide Abstract

A New Approach for Information Security using an Improved Steganography Technique
Mamta Juneja and Parvinder Singh Sandhu
Page: 405~424, Vol. 9, No.3, 2013
Keywords: Adaptive LSB Steganography, AES; Hybrid Feature Detection, Random Pixel Embeddin g, Steganography, Two Component based LSB Steganography
Show / Hide Abstract

Hardware Software Co-Simulation of the Multiple Image Encryption Technique Using the Xilinx System Generator
Panduranga H T, Dr. Naveen Kumar S K and Sharath Kumar H S
Page: 499~510, Vol. 9, No.3, 2013
Keywords: Image Encryption, Latin Square
Show / Hide Abstract

An Efficient Block Cipher Implementation on Many-Core Graphics Processing Units
Sangpil Lee, Deokho Kim, Jaeyoung Yi and Won Woo Ro
Page: 159~174, Vol. 8, No.1, 2012
Keywords: General-Purpose Computation on a Graphics Processing Unit, SEED Block Cipher, Parallelism, Multi-Core Processors
Show / Hide Abstract

Efficient and General PVSS Based on ElGamal Encryption
Kun Peng
Page: 375~388, Vol. 8, No.2, 2012
Keywords: ElGamal, PVSS
Show / Hide Abstract

Providing Efficient Secured Mobile IPv6 by SAG and Robust Header Compression
Tin-Yu Wu, Han-Chieh Chao and Chi-Hsiang Lo
Page: 117~130, Vol. 5, No.3, 2009
10.3745/JIPS.2009.5.3. 117
Keywords: SAG, RoHC, MIPv6, Handoff Latency, Early Binding Update
Show / Hide Abstract

A Delegation Model based on Agent in Distributed Systems
Kyu Il Kim, Joo Chang Lee, Won Gil Choi, Eun Ju Lee and Ung Mo Kim
Page: 82~88, Vol. 3, No.2, 2007
Keywords: XACML, SAML, Agent
Show / Hide Abstract

An Improved Secure Semi-fragile Watermarking Based on LBP and Arnold Transform
Heng Zhang, Chengyou Wang and Xiao Zhou
Page: 0~0, Vol. 0, No.0, 0
Keywords: Digital Image Watermarking, Semi-fragile Watermarking, False Detection, Local Binary Pattern (LBP), Arnold Transform
Show / Hide Abstract