Digital Library


Search: "[ author: P ]" (307)

  1. Attack and Correction: How to Design a Secure and Efficient Mix Network
    Kun Peng
    Vol. 8, No. 1, pp. 175-190, Mar. 2012
    10.3745/JIPS.2012.8.1.175
    Keywords: Mix Network, Correction

  2. An Efficient Block Cipher Implementation on Many-Core Graphics Processing Units

  3. Performance Study of genus 3 Hyperelliptic Curve Cryptosystem

  4. An Improved Fast and Secure Hash Algorithm

  5. A Dual Modeling Method for a Real-Time Palpation Simulator

  6. Optimal Software Release Using Time and Cost Benefits via Fuzzy Multi-Criteria and Fault Tolerance

  7. Indoor Link Quality Comparison of IEEE 802.11a Channels in a Multi-radio Mesh Network Testbed

  8. Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1(m) Traffic

  9. Efficient Proof of Vote Validity Without Honest-Verifier Assumption in Homomorphic E-Voting
    Kun Peng
    Vol. 7, No. 3, pp. 549-560, Sep. 2011
    10.3745/JIPS.2011.7.3.549
    Keywords: Efficient Proof, E-Voting

  10. Integrated Software Quality Evaluation: A Fuzzy Multi-Criteria Approach