December 2013, Volume 3, Number 4 |
| A Pairing-Free Identity Based Tripartite Signcryption Scheme[Pdf] Hassan M. Elkamchouchi1, Eman F. Abou Elkheir2 and Yasmine Abouelseoud1, 1Alexandria University, Egypt and 2Kafr El-Sheikh University, Egypt |
| A New Attack on RSA With a Composed Decryption Exponent[Pdf] Abderrahmane Nitaj1 and Mohamed Ould Douh1,2, 1Universite de Caen, France and 2Universite des Sciences, Mauritania |
An Improvement to the Set Protocol Based on Signcryption [Pdf]
Hassan M. Elkamchouchi1, Eman F. Abu Elkhair2 and Yasmine Abouelseoud1, 1Alexandria University,Egypt, 2Kafr El-Sheikh University, Egypt.
An Encryption Algorithm to Evaluate Performance of V2V Communication in Vanet[Pdf]
Manpreet Kaur1, Rajni1 and Parminder Singh2, 1S.B.S.S.T.C, Ferozepur, 2Chandigarh Group of Colleges, Landran.
A New Method for Preserving Privacy in Data Publishing Against Attribute and Identity Disclosure Risk[Pdf]
R.Mahesh and T.Meyyappan, Alagappa University, India
Secure Image Transfer in The Domain Transform DFT[Pdf]
Rakotondraina Tahina Ezechiel and Rakotomalala Mamy Alain, University of Antananarivo, Madagascar
Hardware Implementation of Algorithm for Cryptanalysis[Pdf]
Harshali Zodpe1, Prakash Wani2, Rakesh Mehta3, 1Maharashtra Institute of Technology,ndia, 2College of Engineering, Pune, India and 3Mechatronics Test Equipments (I) Pvt. Ltd.,India
A Secure Color Image Steganography in Transform Domain[Pdf]
Hemalatha S, U Dinesh Acharya, Renuka A, Priya R. Kamath, Manipal University, India
Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Cryptography [Pdf]
Sangram Ray and G. P. Biswas, Indian School of Mines, India