Attacks to Cryptography Protocols of Wireless Industrial Communication Systems
Author(s): Tomas Ondrasina | Maria Franekova

Safety Evalution of Cryptography Modules within Safety Related Control Systems for Railway Applications
Author(s): Maria Franekova | Marek Vyrostko

A Hyper Modern Cryptography Algorithm to Improved Data Security: HMCA
Author(s): Vishwa Gupta | Gajendra Singh | Ravindra Gupta

A NEW VARIANT OF SUBSET-SUM CRYPTOSYSTEM OVER RSA
Author(s): Sonal Sharma | Saroj Hiranwal | Prashant Sharma

A New Approach for Finding the various Optimal Variable Ordering to Generate the Binary Decision Diagrams 'BDD' of a Computer Communication Network
Author(s): G.Naga Lakshmi | B.Ravi Kumar | Ch.Suneetha | A.Chandra Sekhar

A Cryptographic Scheme of Finite Fields using Logical Operators
Author(s): G.Naga Lakshmi | B.Ravi Kumar | Ch.Suneetha | A.Chandra Sekhar

Realization of a Novel Reversible SCG Gate and its Application for Designing Parallel Adder/Subtractor and Match Logic
Author(s): Diganta Sengupta | Mahamuda Sultana | Atal Chaudhuri

TextIndependent Speaker Recognition for Low SNR Environments with Encryption
Author(s): Aman Chadha | Divya Jyoti | M. Mani Roja

Secure Mechanism for DYMO Routing Protocol by using Elliptic Curve Cryptography in Mobil Adhoc Networks
Author(s): Rayala Upendar Rao | Daranasi Veeraiah

Safety Measures using Probability Symmetric Curve Cryptography
Author(s): W. R. Sam Emmanuel | C. Suyambulingom

An Efficient and Secured AOMDV Routing Protocol with Shamir's Secret Sharing Scheme
Author(s): Lt.Dr. S. Santhosh Baboo | C. Chandrasekar

A Block Cipher Using Graph Structures and Logical XOR Operation
Author(s): CH. Suneetha | D. Sravan Kumar | A.Chandra sekhar

Performance Analysis of Signaling Cost on EapTls Authentication Protocol Based on Cryptography
Author(s): R.Narmadha | Dr.S.Malarkan | Dr.C.Ramesh

Genetic Algorithm solution for Cryptanalysis of Knapsack Cipher with Knapsack Sequence of Size 16
Author(s): Dr. R. Geetha Ramani | Lakshmi Balasubramanian

Secure Key Transport in Symmetric Cryptographic Protocols using some Elliptic Curves over finite fields
Author(s): Ch. Suneetha | D. Sravana Kumar | A. Chandrasekhar | K. Vanitha

DNA Computing based Elliptic Curve Cryptography
Author(s): P. Vijayakumar | V. Vijayalakshmi | G. Zayaraz

Design of Reversible Sequential Circuit Using Reversible Logic Synthesis
Author(s): Md. Belayet Ali | Md. Mosharof Hossin | Md. Eneyat Ullah

Significant Storage on Sensor Storage Space, Energy Consumption and Better Security Based on Routing in Hybrid Sensor Networks
Author(s): K.Nageswara rao | D. Rajya Lakshmi | T. Venkateswara rao

A PROPORTIONAL ANALYSIS ON CRYPTOGRAPHY TECHNIQUES, FUNCTIONS AND RELATIVE PERFORMANCE ISSUES
Author(s): Dr. S. N. Panda

A Comparitive Study of Cryptosystems with Elliptic Curve Cryptography using Digital Signature
Author(s): Shipra Shukla | Dharmendra Lal Gupta | Anil Kumar Malviya

Halftone based Secret Sharing Visual Cryptographic Scheme for Color Image using Bit Analysis
Author(s): Pavan Kumar Gupta | Naveen Hemrajani | Savita Shiwani | Ruchi Davey

Efficient Implementation of Dynamic Routing With Security Considerations
Author(s): UMADEVI DURVASULA | A KIRAN KUMAR2

SWMPT: Securing Wireless Mesh Networks Protocol Based on Ticket Authentication
Author(s): Rushdi A. Hamamreh | Anas M. Melhem

CRYPTOGRAPHIC PROTOCOLS USING ELLIPTIC CURVE OVER FINITE FIELDS
Author(s): D. SRAVANA KUMAR | CH. SUNEETHA | A.CHANDRASEKHAR

A Robust Three-Way Authentication System using Modified Random Grid based Reversible Style Visual Cryptography
Author(s): B. Padhmavathi | P. Nirmal Kumar | M. A. Dorai Rangaswamy

ENCRYPTIONS OF DATA STREAMS USING PAULI SPIN ½ MATRICES AND FINITE STATE MACHINE
Author(s): B. Krishna Gandhi | A. Chandra Sekhar | S. Sri lakshmi

FPGA Based Secure System Design-an Overview
Author(s): Gurjit Singh Walia | Gajraj Kuldeep | Rajiv Kapoor | A K Sharma | Navneet Gaba

Secret Key Agreement Over Multipath Channels Exploiting a Variable-Directional Antenna
Author(s): Valery Korzhik | Viktor Yakovlev | Yuri Kovajkin | Guillermo Morales-Luna

Enhanced Visual Cryptography Using color Error diffusion and Digital Watermarking
Author(s): Tripta Deendayal | Ch.Sunitha

Public Key Cryptosystem Technique Elliptic Curve Cryptography with Generator g for Image Encryption
Author(s): Vinod Kumar Yadav | Dr. A.K. Malviya | D.L. Gupta | Satyendra Singh | Ganesh Chandra

A P2P Approach for Efficient Certificate Revocation in MANET
Author(s): Suresh Babu Tumula | K.R.R.Mohana Rao

Visual cryptography for color images by dithering techniques
Author(s): Lakshmi Priya Tadiboyna | M. Deena Babu

Improving data integrity and performance of cryptographic log structured file systems
Author(s): Genti Daci | Megi Shyle

Attacks to Cryptography Protocols of Wireless Industrial Communication Systems
Author(s): Tomas Ondrasina | Maria Franekova

Safety Evalution of Cryptography Modules within Safety Related Control Systems for Railway Applications
Author(s): Maria Franekova | Marek Vyrostko

An Innovative Kind Of Security Protocol Using Fusion Encryption In Virtual Private Networking
Author(s): M.Sreedevi | R. Seshadri

Traffic And Security Using Randomized Dispersive Routes In Heterogeneous Sensor Network
Author(s): P.Karunakaran | C.Venkatesh

Encryption Of Data Using Elliptic Curve Over Finite Fields
Author(s): D. Sravana Kumar | CH. Suneetha | A. ChandrasekhAR

On Some Security Issues in Pervasive Computing - Light Weight Cryptography
Author(s): Rukma Rekha N | PrasadBabu M.S

Using Virtual Security Lab in Teaching Cryptography
Author(s): Salma M. Gaffer | Daniyal M. Alghazzawi

Development of Electronic Passport Scheme for Cryptographic Security and Face, Fingerprint Biometrics using ASP.Net
Author(s): V.K. NARENDIRA KUMAR | B. SRINIVASAN

A Bit Level Session Based Encryption Technique to Enhance Information Security
Author(s): Manas Paul | Jyotsna Kumar Mandal

Random Image Steganography and Steganalysis: Present Status and Future Directions
Author(s): Rengarajan Amirtharajan | Jiaohua Qin | John Bosco Balaguru Rayappan

Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGA
Author(s): Sundararaman Rajagopalan | Rengarajan Amirtharajan | Har Narayan Upadhyay | John Bosco Balaguru Rayappan

A New Approach for Improving Data Security using Iterative Blowfish Algorithm
Author(s): G. Manikandan | N. Sairam | M. Kamarasan

A Hybrid Approach for Security Enhancement by Compressed Crypto-Stegno Scheme
Author(s): G. Manikandan | N. Sairam | M. Kamarasan

An Effective Technique For Data Security in Modern Cryptosystem
Author(s): Dilbag Singh | Ajit Singh

Applications of Public Key Watermarking for Authentication of Job-Card in MGNREGA
Author(s): Sirsendu Sarbavidya | Sunil Karforma

IMPLEMENTATION OF THE TRIPLE-DES BLOCK CIPHER USING VHDL
Author(s): Sai Praveen Venigalla | M. Nagesh Babu | Srinivas Boddu | G. Santhi Swaroop Vemana

Segment Based Visual Cryptography For Key Distribution
Author(s): Sesha Pallavi Indrakanti | Avadhani P S

Energy Efficient PKI Secure Key Management Technique in Wireless Sensor Network Using DHA & ECC
Author(s): Mohd. Rizwan beg | Shish Ahmad

Practical Approach For Improving Security in Wireless Mesh Network Through ECC and Two Way Authentication Scheme
Author(s): Avinash P. Wadhe | N.A.Chavhan

Real time Video Streaming using Novel approach
Author(s): Mukesh Kumar | Jain Akash | B.A.Khivsara | Magar Padmakar | Baphana Abliasaha

An improved approach for Extended Visual Cryptography Scheme for Colour Images
Author(s): Bhandare Shital | Jhade Manoj | Jadhav Angarika

A Novel Approach for Iris Encryption
Author(s): Shrinivasrao B. Kulkarni | Ravindra S. Hegadi | Umakant P. Kulkarni

Desing and Implementation of Distributed Security using Onion Routing
Author(s): Ashish T. Bhole | Savita H. Lambole

Enhanced Novel Security Scheme for Wireless Adhoc Networks: ENSS
Author(s): Prasad Patil | Rinku Shah | Kajal Jewani

Light interference detection on-chip by integrated SNSPD counters
Author(s): Paul Cavalier | Jean-Claude Villégier | Philippe Feautrier | Christophe Constancias | Alain Morand

Learning the Related Mathematics to Cryptography by Interactive Way
Author(s): Mohamed Salim Trigui | Daniyal M. Alghazzawi

Hardware Implementation of Mix Column Step in AES
Author(s): Pratap Kumar Dakua | Manoranjan Pradhan | Subba Rao Polamuri

An Approach for SMS Security using Authentication Functions
Author(s): Neetesh Saxena | Narendra S. Chaudhari

A New Security Protocol for Mobile Ad Hoc Networks
Author(s): K. Sahadevaiah | Prasad Reddy P.V.G.D. | G. Narsimha

Proactive Secret Sharing Scheme for Mobile Ad-hoc Networks
Author(s): Chauhan Gargi K | H. M. Diwanji

Achieving Identity-Based Cryptography in a Personal Digital Assistant Device
Author(s): L. Martínez-Ramos | L. López-García | F. Rodríguez-Henríquez

A Cryptographic Algorithm based onBilinear Transformation
Author(s): Phani krishna kishore M | Venugopal IVS

Secure Biometric Key Generation Scheme for Cryptography using Combined Biometric Features of Fingerprint and Iris
Author(s): Mr.P.Balakumar | Dr.R.Venkatesan

A Novel Approach for Cheating Prevention through Visual Cryptographic Analysis
Author(s): Morampudi Naresh kumar | Datrika Srinivas Rao | D.Sravanthi

Cyclic Combination Method For Digital Image Steganography With Uniform Distribution Of Message
Author(s): Rajkumar Yadav | Ravi Saini | Kamaldeep

Efficient Detection of Sybil attack Based on Cryptography in Vanet
Author(s): Mina Rahbari | Mohammad Ali Jabreil Jamali

Programmable Cellular Automata Based Efficient Parallel AES Encryption Algorithm
Author(s): Debasis Das | Rajiv Misra

Implimentation of Cryptographic Algorithm for GSM and UMTS Systems.
Author(s): Alpesh R. Sankaliya | V.Mishra | Abhilash Mandloi

Enhanced Nested Video Watermarking Using Wavelets and Geometric Warping
Author(s): T.Jayamalar | V. Radha

A Novel Processor Architecture for Pairing Based Cryptography Applications
Author(s): Ravi Kumar. K | K. Bhavya Deepthi | K. Gowtham | T. Yamini

Dynamic Routing with Security Considerations
Author(s): G. Murali | D. Pavan | V.V. Rajesh Reddy | P. Bharath kumar

Secure Data Aggregation in Wireless Sensor Networks: State of the art and future works
Author(s): Merad Boudia Omar Rafik | Feham Mohammed

Confidential Deterministic Quantum Communication Using Three Quantum States
Author(s): Piotr ZAWADZKI

Error Filtering Schemes for Color Images in Visual Cryptography
Author(s): Shiny Malar F.R | Jeya Kumar M.K

Crytosystem for Computer security using Iris patterns and Hetro correlators
Author(s): R. Bremananth | Ahmad Sharieh

Accelerating Solution Proposal of AES Using a Graphic Processor
Author(s): TOMOIAGA, R. D. | STRATULAT, M.

A Framework for Security-Enhanced Peer-to-Peer Applications in Mobile Cellular Networks
Author(s): Shuping Liu | Shushan Zhao | Weirong Jiang

Double-Moduli Gaussian Encryption/Decryption with Primary Residues and Secret Controls
Author(s): Boris S. Verkhovsky

Algorithms for Integer Factorization Based on Counting Solutions of Various Modular Equations
Author(s): Boris S. Verkhovsky

Algorithms for Integer Factorization Based on Counting Solutions of Various Modular Equation
Author(s): Boris S. Verkhovsky

Extension of a port knocking client-server architecture with NTP synchronization
Author(s): Traian Andrei Popeea

Secure Multiparty Computation between Distrusted Networks Terminals
Author(s): Cheung S-CS | Nguyen Thinh

Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing
Author(s): Erkin Zekeriya | Piva Alessandro | Katzenbeisser Stefan | Lagendijk RL | Shokrollahi Jamshid | Neven Gregory | Barni Mauro

Modular Inverse Algorithms Without Multiplications for Cryptographic Applications
Author(s): Hars Laszlo

A survey on biometric cryptosystems and cancelable biometrics
Author(s): Rathgeb Christian | Uhl Andreas

A Survey of Watermarking Algorithms for Image Authentication
Author(s): Rey Christian | Dugelay Jean-Luc

A DSP Based POD Implementation for High Speed Multimedia Communications
Author(s): Zhang Chang Nian | Li Hua | Zhang Nuannuan | Xie Jiesheng

Digital Watermarks Enabling E-Commerce Strategies: Conditional and User Specific Access to Services and Resources
Author(s): Dittmann Jana | Steinebach Martin | Wohlmacher Petra | Ackermann Ralf

Efficient Key Agreements in Dynamic Multicast Height Balanced Tree for Secure Multicast Communications in Ad Hoc Networks
Author(s): Lin Hua-Yi | Chiang Tzu-Chiang

A survey and taxonomy of distributed certificate authorities in mobile ad hoc networks
Author(s): Masdari Mohammad | Jabbehdari Sam | Ahmadi Mohammad | Hashemi Seyyed | Bagherzadeh Jamshid | Khadem-Zadeh Ahmad

In Situ Key Establishment in Large-Scale Sensor Networks
Author(s): Xiang Yingchang | Liu Fang | Cheng Xiuzhen | Chen Dechang | Du DavidHC

Tree Based Protocol for Key Management in Wireless Sensor Networks
Author(s): Messai M-L | Aliouat M | Seba H

Cryptanalysis of the Two-Dimensional Circulation Encryption Algorithm
Author(s): De Cannière Christophe | Lano Joseph | Preneel Bart

A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection
Author(s): Ahmed Fawad | Sattar Farook | Siyal Mohammed Yakoob | Yu Dan

A Simple Message-Encryption Scheme based on Amino-acid Protein Sequence
Author(s): Nirmala.V | Uppe.Nanaji

Authentication and Virus Detection Enhancement for Client and Server Applications
Author(s): Ghossoon. M. W. Al-Saadoon

Analysis on DNA based Cryptography to Secure Data Transmission
Author(s): S.Jeevidha | Dr.M.S.Saleem Basha | Dr.P.Dhavachelvan

A Cipher Design using the Combined Effect of Arithmetic and Logic Operations with Substitutions and Transposition Techniques
Author(s): S.G.Srikantaswamy | Prof. H. D. Phaneendra

Design and Implementation of an Electronic Identification Card
Author(s): J. Flores‐Escalante | J. Pérez‐Díaz | R. Gómez‐Cárdenas

DPA Attacks Simulator against Cryptography System on Algorithm Design Phase
Author(s): Masaya Yoshikawa | Toshiya Asai

Enhancing Confidentiality of Private Communication through Dual Compression
Author(s): Kristipati Sudharshana Reddy | Munwar Sk | Rajesh Bhakthavatsalam

Generation of a pool of variable size symmetric keys through Image
Author(s): Prerna Garg | Deepak Garg

AN ANALYSIS OF THE DESIGN FACTORS AFFECTING THE PERFORMANCE OF CRYPTOSYSTEMS
Author(s): S.G.Srikantaswamy | Prof. H.D.Phaneendra

Security Enhancement in Elliptic Key Cryptography Using Character Based Method
Author(s): Arun Kumar Gandhi | S.S.Tyagi

Crypto Key Generation Based on Signature Biometric Using Gabor Features Selection
Author(s): AL-MAHADEEN Bassam | AL-TARAWNEH Mokhled

Biometry, the safe key
Author(s): María Fraile-Hurtado | Miguel Herrero-Langreo | Pilar Menéndez-Miguel | Valerio Delgado-Villanueva

Security Threats and its Countermeasures in Wireless Sensor Networks: An Overview
Author(s): S.V.Annlin Jeba | B. Paramasivan | D.Usha

Comparative study of Arithmetic and Huffman Compression Techniques for Enhancing Security and Effective Bandwidth Utilization in the Context of ECC for Text
Author(s): O.Srinivasa Rao | Prof.S.Pallam Setty

Cryptographic Scheme for Digital Signals using Finite State Machines
Author(s): B.Krishna Gandhi | Dr.A.Chandra Sekhar | S.Srilakshmi

Ergodic Matrix and Hybrid-key Based Image Cryptosystem
Author(s): Xiaoyi Zhou | Jixin Ma | Wencai Du | Yongzhe Zhao

A PKI-based Track and Trace Network for Cross-boundary Container Security
Author(s): S.L. Ting | W.H. Ip | W.H.K. Lam | E.W.T. Ngai

Secure Clustering and Symmetric Key Establishment in Heterogeneous Wireless Sensor Networks
Author(s): Azarderskhsh Reza | Reyhani-Masoleh Arash
