Linked e-resources

Details

Intro; Preface; Acknowledgments; Contents; About the Authors; Tamper Detection Using Fragile Image Watermarking Based on Chaotic System; 1 Introduction; 2 Background; 2.1 Least Significant Bit: LSB Method; 2.2 Arnold Cat Map; 2.3 Logistics Maps; 3 Related Work; 4 Proposed Work; 4.1 Embedding Algorithm; 4.2 Extraction Algorithm; Experimental Result; Imperceptibility; Robustness; Comparative Analysis; 5 Conclusion; References; Cryptanalysis and Improvement of a User Authentication Scheme for SIP; 1 Introduction; 2 Preliminaries; 3 Review of Lu et al.'s Scheme; 3.1 Registration

3.2 Mutual Authentication and Key Agreement3.3 Password Change Phase; 4 Weaknesses of Lu et al.'s Scheme; 4.1 Insider Attack; 4.2 User Anonymity; 5 Proposed Scheme; 5.1 Registration; 5.2 Mutual Authentication and Key Agreement; 5.3 Password Change Phase; 6 Mutual Authentication of Our Scheme Using BAN-Logic; 7 Security Analysis; 7.1 Anonymity; 7.2 Insider Attack; 7.3 Mutual Authentication; 7.4 Masquerade Attack; 7.5 Verifier Attack; 7.6 Perfect Forward Secrecy; 7.7 Replay Attack; 8 Performance Analysis; 8.1 Security Features; 8.2 Computational Cost; 9 Conclusion; References

Security Against Vampire Attack in ADHOC Wireless Sensor Network: Detection and Prevention Techniques1 Introduction; 2 Related Surveys; 3 Existing Techniques; 4 Conclusion and Future Work; References; Securing Fuzzy Commitment Scheme Against Decodability Attack-Based Cross-Matching; 1 Introduction; 2 Fuzzy Commitment Scheme; 3 Cross-Matching Attacks; 3.1 Exhaustive Search Attack; 3.2 Decodability Attack; 4 Preventing Decodability Attack-Based Cross-Matching; 4.1 Case 1: Both Hash Value and Auxiliary Data Is Available; 4.2 Case 2: Only Auxiliary Data Is Available; 5 Conclusions and Future Work

Analysing, Designing, Implementation and Coding E-Commerce Through UX1 Introduction; 2 Vision and UX Scope; 3 *-6pt; 4 Methodology; 5 Results; 6 Conclusion; References; Performance Evaluation of GAER Over Various Crossover Techniques in Opportunistic Networks; 1 Introduction; 2 Related Work and Motivation; 3 Various Crossover Techniques; 3.1 One-Point Crossover; 3.2 Two-Point Crossover; 3.3 Uniform Crossover; 3.4 Random Permuting Crossover; 4 Tabular Illustration; 5 Simulation Setup; 6 Results and Analysis; 6.1 Performance Comparison at Different Number of Nodes

Browse Subjects

Show more subjects...

Statistics

from
to
Export