Search Word(s) in Title, Keywords, Authors, and Abstract: Message

CLB-ECC: Certificateless Blind Signature Using ECC
Sanjeet Kumar Nayak, Sujata Mohanty and Banshidhar Majhi
Page: 970~986, Vol. 13, No.4, 2017
10.3745/JIPS.03.0029

Keywords: Authentication, Blind Signature, Certificateless Cryptography, Elliptic Curve Cryptography, E-cash
Show / Hide Abstract

Efficient Implementation of the MQTT Protocol for Embedded Systems
Olivier Deschambault, Abdelouahed Gherbi and Christian Le?gare?
Page: 26~39, Vol. 13, No.1, 2017
10.3745/JIPS.04.0028

Keywords: Embedded Systems, Internet of Things, Message Queue Telemetry Transport, Quality of Service
Show / Hide Abstract

Copyright Protection for Digital Image by Watermarking Technique
Suhad A. Ali, Majid Jabbar Jawad and Mohammed Abdullah Naser
Page: 599~617, Vol. 13, No.3, 2017
10.3745/JIPS.03.0074

Keywords: Digital Watermarking, Discrete Cosine Transform (DCT), Normalized Correlation (NC), PSNR
Show / Hide Abstract

HESnW: History Encounters-Based Spray-and-Wait Routing Protocol for Delay Tolerant Networks
Shunyi Gan, Jipeng Zhou and Kaimin Wei
Page: 618~629, Vol. 13, No.3, 2017
10.3745/JIPS.03.0075

Keywords: Delivery Cost, DTNs, History Node, Multiple Probability, Spray-and-Wait
Show / Hide Abstract

Audio Data Hiding Based on Sample Value Modification Using Modulus Function
Mohammed Hatem Ali Al-Hooti, Supeno Djanali and Tohari Ahmad
Page: 525~537, Vol. 12, No.3, 2016
10.3745/JIPS.03.0054

Keywords: Audio, Data Hiding, Modulus Function, Information Security, Network Security
Show / Hide Abstract

Genetic Symmetric Key Generation for IDEA
Nandini Malhotra and Geeta Nagpal
Page: 239~247, Vol. 11, No.2, 2015
10.3745/JIPS.03.0017

Keywords: Crossover, IDEA, Genetic Algorithm, Mutation, Symmetric Key Generation
Show / Hide Abstract

An Enhanced Message Priority Mechanism in IEEE 802.11p Based Vehicular Networks
Chang Liu, Sang-Hwa Chung, Han-You Jeong and Ik-Joo Jung
Page: 465~482, Vol. 11, No.3, 2015
10.3745/JIPS.03.0027

Keywords: Contention Window, IEEE 802.11p, MAC Layer, Message Priority, Vehicular Network
Show / Hide Abstract

A Token Based Protocol for Mutual Exclusion in Mobile Ad Hoc Networks
Bharti Sharma, Ravinder Singh Bhatia and Awadhesh Kumar Singh
Page: 36~54, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.036
Keywords: MANET, Inter-Cluster, Intra-Cluster, Mutual Exclusion, Token Ring
Show / Hide Abstract

Cooperation-Aware VANET Clouds: Providing Secure Cloud Services to Vehicular Ad Hoc Networks
Rasheed Hussain and Heekuck Oh
Page: 103~118, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.103
Keywords: VANET Clouds, Security, Privacy, Traffic Information, Data Dissemination, Cloud Computing
Show / Hide Abstract

Multifactor Authentication Using a QR Code and a One-Time Password
Jyoti Malik, Dhiraj Girdhar, Ratna Dahiya and G. Sainarayanan
Page: 483~490, Vol. 10, No.3, 2014
10.3745/JIPS.02.0005
Keywords: Authentication, One-Time Password, Personal Assurance Message, Quick Response Code
Show / Hide Abstract

On the Minimization of Crosstalk Conflicts in a Destination Based Modified Omega Network
Ved Prakash Bhardwaj and Nitin
Page: 301~314, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.301
Keywords: Optical Multistage Interconnection Network, Crosstalk, Time Domain Approach, Omega Network, Destination Based Modified Omega Network, Crosstalk Free Modified Omega Network
Show / Hide Abstract

A Network-Based Handover Scheme in HIP-Based Mobile Networks
Moneeb Gohar and Seok-Joo Koh
Page: 651~659, Vol. 9, No.4, 2013
10.3745/JIPS.2013.9.4.651
Keywords: HIP, network-based, handover, simulations
Show / Hide Abstract

Performance Study of genus 3 Hyperelliptic Curve Cryptosystem
Daya Gupta, Asok De and Kakali Chatterjee
Page: 145~158, Vol. 8, No.1, 2012
10.3745/JIPS.2012.8.1.145
Keywords: Hyperelliptic Curve Cryptosystem(HECC), Secure Hyperelliptic Curve, Hyperelliptic Curve Deffie-Hellman(HECDH), Hyperelliptic Curve Digital Signature Algorithm (HECDSA)
Show / Hide Abstract

Designing an Efficient and Secure Credit Cardbased Payment System with Web Services Based on the ANSI X9.59-2006
Chi Po Cheong, Simon Fong, Pouwan Lei, Chris Chatwin and Rupert Young
Page: 495~520, Vol. 8, No.3, 2012
10.3745/JIPS.2012.8.3.495
Keywords: Payment Protocols, Electronic Commerce, SET, X9.59, Web Services
Show / Hide Abstract

A Strong Designated Verifiable DL Based Signcryption Scheme
Sujata Mohanty and Banshidhar Majhi
Page: 567~574, Vol. 8, No.4, 2012
10.3745/JIPS.2012.8.4.567
Keywords: Designated Verifiable, Discrete Logarithm Problem, Chosen Ciphertext Attack, Nonrepudiation
Show / Hide Abstract

A Clustering Protocol with Mode Selection for Wireless Sensor Network
Aries Kusdaryono and Kyung Oh Lee
Page: 29~42, Vol. 7, No.1, 2011
10.3745/JIPS.2011.7.1.029
Keywords: Ad Hoc Network, Wireless Sensor Networks, Clustering, Routing Protocol
Show / Hide Abstract

Generic Constructions for Strong Designated Verifier Signature
Deng-Guo Feng, Jing Xu and Wei-Dong Chen
Page: 159~172, Vol. 7, No.1, 2011
10.3745/JIPS.2011.7.1.159
Keywords: Strong Designated Verifier Signature, Ring Signature, Deniable Authenticated Key Exchange, Provable security
Show / Hide Abstract

An Efficient Broadcast Technique for Vehicular Networks
Ai Hua Ho, Yao H. Ho, Kien A. Hua, Roy Villafane and Han-Chieh Chao
Page: 221~240, Vol. 7, No.2, 2011
10.3745/JIPS.2011.7.2.221
Keywords: V2V Communication Protocols, Vehicular Network, Ad Hoc Network, Broadcast, Broadcasting Storm, Routing
Show / Hide Abstract

Privacy-Aware Adaptable Web Services Using Petri Nets
You-Jin Song and Jae-Geol Yim
Page: 19~24, Vol. 5, No.1, 2009
10.3745/JIPS.2009.5.1.019
Keywords: Privacy, Web Service, Petri Net, Context Framework
Show / Hide Abstract

Spatial Query Processing Based on Minimum Bounding in Wireless Sensor Networks
Sun Ok Yang and SungSuk Kim
Page: 229~236, Vol. 5, No.4, 2009
10.3745/JIPS.2009.5.4.229
Keywords: Notification Message, Parent Selection Message, Spatial Query Process, Minimum Bounding Area
Show / Hide Abstract

Eager Data Transfer Mechanism for Reducing Communication Latency in User-Level Network Protocols
Chulho Won, Ben Lee, Kyoung Park and Myung-Joon Kim
Page: 133~144, Vol. 4, No.4, 2008
10.3745/JIPS.2008.4.4.133
Keywords: Data Transfer, Cache Coherence, User-Level, Low-Latency, Network Protocols, Message, VIA
Show / Hide Abstract

Secure Key Management Protocol in the Wireless Sensor Network
Yoon-Su Jeong and Sang-Ho Lee
Page: 48~51, Vol. 2, No.1, 2006
None
Keywords: Cluster, Key Management Protocol, WSN
Show / Hide Abstract

Digital Controller of a Diesel Generator using an Embedded System
Kwang Seon Ahn
Page: 143~146, Vol. 2, No.3, 2006
None
Keywords: Diesel Generator, Embedded Controller, Remote Control
Show / Hide Abstract

A Cluster-Based Energy-Efficient Routing Protocol without Location Information for Sensor Networks
Giljae Lee, Jonguk Kong, Minsun Lee and Okhwan Byeon
Page: 49~54, Vol. 1, No.1, 2005
None
Keywords: Wireless sensor networks, ubiquitous sensor networks, cluster-based routing protocol, energy-efficient routing
Show / Hide Abstract

The Comparison of RBS and TDP for the Sensor Networks Synchronization
Hyojung Lee, Byungchul Kim and Youngmi Kwon
Page: 70~74, Vol. 1, No.1, 2005
None
Keywords: Sensor Network, RBS, TDP, Time Synchronization
Show / Hide Abstract

IDMMAC: Interference Aware Distributed Multi-Channel MAC Protocol for WSAN
Jagadeesh Kakarla, Banshidhar Majhi and Ramesh Babu Battula
Page: 0~0, Vol. 0, No.0, 0
10.3745/JIPS.03.0038
Keywords: Actor, BCH, IDMMAC, Interference, Multichannel, PRR
Show / Hide Abstract

An Improved Secure Semi-fragile Watermarking Based on LBP and Arnold Transform
Heng Zhang, Chengyou Wang and Xiao Zhou
Page: 0~0, Vol. 0, No.0, 0
10.3745/JIPS.02.0063
Keywords: Digital Image Watermarking, Semi-fragile Watermarking, False Detection, Local Binary Pattern (LBP), Arnold Transform
Show / Hide Abstract