COMPUTER SCIENCE & ENGINEERING BIBLIOGRAPHY

Home

December 2013, Volume 3, Number 4

A Pairing-Free Identity Based Tripartite Signcryption Scheme[Pdf]
Hassan M. Elkamchouchi1, Eman F. Abou Elkheir2 and Yasmine Abouelseoud1, 1Alexandria University, Egypt and 2Kafr El-Sheikh University, Egypt
A New Attack on RSA With a Composed Decryption Exponent[Pdf]
Abderrahmane Nitaj1 and Mohamed Ould Douh1,2, 1Universite de Caen, France and 2Universite des Sciences, Mauritania

September 2013, Volume 3, Number 3

Performance Analysis of Sha-2 and Sha-3 Finalists[Pdf]
Ram Krishna Dahal1, Jagdish Bhatta1 and Tanka Nath Dhamala2, 1Tribhuvan University, Nepal and 2University of Kaiserslautern, Germany A Secure Block Permutation Image Steganography Algorithm[Pdf]
Hussein Al-Bahadili, University of Petra, Jordan Blind and Robust Images Watermarking Based on Wavelet and Edge Insertion[Pdf]
Henri Bruno Razafindradina1 and Attoumani Mohamed Karim2, 1Higher Institute of Technology, Diego Suarez - Madagascar and 2Comoros ICT Regulation Authority, Comoros Elliptic Curve Cryptography in Securing Networks by Mobile Authentication[Pdf]
Manoj Prabhakar, Anna University, India

June 2013, Volume 3, Number 2

An Improvement to the Set Protocol Based on Signcryption [Pdf]
Hassan M. Elkamchouchi1, Eman F. Abu Elkhair2 and Yasmine Abouelseoud1, 1Alexandria University,Egypt, 2Kafr El-Sheikh University, Egypt.

An Encryption Algorithm to Evaluate Performance of V2V Communication in Vanet[Pdf]
Manpreet Kaur1, Rajni1 and Parminder Singh2, 1S.B.S.S.T.C, Ferozepur, 2Chandigarh Group of Colleges, Landran.

A New Method for Preserving Privacy in Data Publishing Against Attribute and Identity Disclosure Risk[Pdf]
R.Mahesh and T.Meyyappan, Alagappa University, India

March 2013, Volume 3, Number 1

Secure Image Transfer in The Domain Transform DFT[Pdf]
Rakotondraina Tahina Ezechiel and Rakotomalala Mamy Alain, University of Antananarivo, Madagascar

Hardware Implementation of Algorithm for Cryptanalysis[Pdf]
Harshali Zodpe1, Prakash Wani2, Rakesh Mehta3, 1Maharashtra Institute of Technology,ndia, 2College of Engineering, Pune, India and 3Mechatronics Test Equipments (I) Pvt. Ltd.,India

A Secure Color Image Steganography in Transform Domain[Pdf]
Hemalatha S, U Dinesh Acharya, Renuka A, Priya R. Kamath, Manipal University, India

Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Cryptography [Pdf]
Sangram Ray and G. P. Biswas, Indian School of Mines, India

 

 

 

Copyright 2010 AIRCC. All rights reserved.

Maintained by NnN