Search Word(s) in Title, Keywords, Authors, and Abstract: RSA

CLB-ECC: Certificateless Blind Signature Using ECC
Sanjeet Kumar Nayak, Sujata Mohanty and Banshidhar Majhi
Page: 970~986, Vol. 13, No.4, 2017

Keywords: Authentication, Blind Signature, Certificateless Cryptography, Elliptic Curve Cryptography, E-cash
Show / Hide Abstract

Combination of Classifiers Decisions for Multilingual Speaker Identification
B. G. Nagaraja and H. S. Jayanna
Page: 928~940, Vol. 13, No.4, 2017

Keywords: Classifier Combination, Cross-lingual, Monolingual, Multilingual, Speaker Identification
Show / Hide Abstract

A Hybrid Bacterial Foraging Optimization Algorithm and a Radial Basic Function Network for Image Classification
Yasmina Teldja Amghar and Hadria Fizazi
Page: 215~235, Vol. 13, No.2, 2017

Keywords: Bacterial Foraging Optimization Algorithm, Hybrid, Image Classification, Radial Basic Function
Show / Hide Abstract

Dorsal Hand Vein Identification Based on Binary Particle Swarm Optimization
Sarah Hachemi Benziane and Abdelkader Benyettou
Page: 268~283, Vol. 13, No.2, 2017

Keywords: Biometrics, BPSO, GPU, Hand Vein, Identification, OTSU
Show / Hide Abstract

Discrete Wavelet Transform and a Singular Value Decomposition Technique for Watermarking Based on an Adaptive Fuzzy Inference System
Salima Lalani and D. D. Doye
Page: 340~347, Vol. 13, No.2, 2017

Keywords: DWT, Fuzzy, SVD, Watermarking
Show / Hide Abstract

Analysis of Warrant Attacks on Some Threshold Proxy Signature Schemes
Samaneh Mashhadi
Page: 249~262, Vol. 12, No.2, 2016

Keywords: Non-repudiation, Proxy Signature Scheme, Signature Scheme, Threshold Proxy Signature, Unforgeability
Show / Hide Abstract

An Experimental Implementation of a Cross-Layer Approach for Improving TCP Performance over Cognitive Radio Networks
Sang-Seon Byun
Page: 73~82, Vol. 12, No.1, 2016

Keywords: Cognitive Radio Networks, Congestion Control, TCP, USRP
Show / Hide Abstract

GMM-Based Maghreb Dialect IdentificationSystem
Lachachi Nour-Eddine and Adla Abdelkader
Page: 22~38, Vol. 11, No.1, 2015

Keywords: Core-Set, Gaussian Mixture Models (GMM), Kernel Methods, Minimal Enclosing Ball (MEB), Quadratic Programming (QP), Support Vector Machines (SVMs), Universal Background Model (UBM)
Show / Hide Abstract

Spatial Interpolation of Meteorologic Variables in Vietnam using the Kriging Method
Xuan Thanh Nguyen, Ba Tung Nguyen, Khac Phong Do, Quang Hung Bui, Thi Nhat Thanh Nguyen, Van Quynh Vuong and Thanh Ha Le
Page: 134~147, Vol. 11, No.1, 2015

Keywords: Interpolation, Meteorologic Variables, Kriging
Show / Hide Abstract

Spatial Interpolation and Assimilation Methods for Satellite and Ground Meteorological Data in Vietnam
Khac Phong Do, Ba Tung Nguyen, Xuan Thanh Nguyen, Quang Hung Bui, Nguyen Le Tran, Thi Nhat Thanh Nguyen, Van Quynh Vuong, Huy Lai Nguyen and Thanh Ha Le
Page: 556~572, Vol. 11, No.4, 2015

Keywords: Assimilation, Interpolation, Meteorological Variables, Kriging, Vietnam
Show / Hide Abstract

Performance Study of genus 3 Hyperelliptic Curve Cryptosystem
Daya Gupta, Asok De and Kakali Chatterjee
Page: 145~158, Vol. 8, No.1, 2012
Keywords: Hyperelliptic Curve Cryptosystem(HECC), Secure Hyperelliptic Curve, Hyperelliptic Curve Deffie-Hellman(HECDH), Hyperelliptic Curve Digital Signature Algorithm (HECDSA)
Show / Hide Abstract

Efficient and General PVSS Based on ElGamal Encryption
Kun Peng
Page: 375~388, Vol. 8, No.2, 2012
Keywords: ElGamal, PVSS
Show / Hide Abstract

A Strong Designated Verifiable DL Based Signcryption Scheme
Sujata Mohanty and Banshidhar Majhi
Page: 567~574, Vol. 8, No.4, 2012
Keywords: Designated Verifiable, Discrete Logarithm Problem, Chosen Ciphertext Attack, Nonrepudiation
Show / Hide Abstract

Ensuring Anonymity for LBSs in Smartphone Environment
Mohammed Alzaabi, Chan Yeob Yeun and Thomas Anthony Martin
Page: 121~136, Vol. 7, No.1, 2011
Keywords: Location Based Services, Anonymity, Location Information
Show / Hide Abstract

Design of Cryptographic Hardware Architecture for Mobile Computing
Mooseop Kim, Youngsae Kim and Hyunsook Cho
Page: 187~196, Vol. 5, No.4, 2009
Keywords: Trusted Computing, MTM, Cryptographic circuit, RSA, HASH, Mobile Computing
Show / Hide Abstract

A Universal Model for Policy-Based Access Control-enabled Ubiquitous Computing
Yixin Jing, Jinhyung Kim and Dongwon Jeong
Page: 28~33, Vol. 2, No.1, 2006
Keywords: Access control, Ubiquitous computing, Task computing, Context-awareness
Show / Hide Abstract

Outage Performance of Selective Dual-Hop MIMO Relaying with OSTBC and Transmit Antenna Selection in Rayleigh Fading Channels
In-Ho Lee, Hyun-Ho Choi and Howon Lee
Page: 0~0, Vol. 0, No.0, 0
Keywords: Dual-Hop Relaying, Orthogonal Space-Time Block Code, Outage Probability, Rayleigh Fading, Transmit Antenna Selection
Show / Hide Abstract