Skip to main content
Secure communication is very important in computer networks and authentication is one of the most eminent preconditions. However, common authentication schemes are not applicable in ad hoc networks because public key infrastructures with... more
    • by  and +1
    •   12  
      Public Key InfrastructureAccess ControlMobile Ad Hoc NetworkAd hoc network
The tremendous advances in wireless networks, mobile computing, and sensor networks, along with the rapid growth of small, portable and powerful computing devices, offers more and more opportunities for pervasive computing and... more
    • by 
    •   20  
      Ubiquitous ComputingData ManagementSoftware ArchitectureSemantic Web
Presently, mobile handheld device has successfully replaced traditional telephone to become the most popular wireless communication tools. Mobile Short Message Service (SMS) and Multimedia Message Service (MMS) fulfill almost all the user... more
    • by 
    •   10  
      Computer SciencePublic Key InfrastructureEncryptionSMS
A peer-to-peer database management system(P2PDBMS) is a collection of autonomous data sources, called peers. In this system each peer augments a conventional database management system with an inter-operability layer (i.e.... more
    • by 
    •   7  
      Pairing-based cryptographyDATABASE MANAGEMENT SYSTEMPeer to PeerData Exchange
Internet was designed for network services without any intention for secure communication. Exponential growth of internet and its users have developed an era of global competition and rivalry. Denial of service attack by multiple nodes is... more
    • by 
    •   18  
      Computer ScienceDistributed ComputingSecurityDistributed Denial of Service Attack
This paper discusses the concept of a virtual digital forensic laboratory, which incorporates networked examination and storage machines, secure communications, multi-factor authentication, role-based access control, and case management... more
    • by 
    •   10  
      Digital ForensicsVirtual LaboratoryCase ManagementAsset Management
All-optical digital circuits based on loop memories are demonstrated. These circuits are a variable optical buffer, an optical random access memory, an optical shift register, and an optical linear feedback shift register. Buffers are... more
    • by 
    •   13  
      Quantum PhysicsDigital CircuitsCommunication SystemPerformance Improvement
Secure communication in distributed systems is notoriously hard to achieve due to the variety of attacks an adversary can mount, based on message interception, modification, redirection, eavesdropping or, even more subtly, on traffic... more
    • by 
    •   12  
      CalculusComputer SecurityCryptographyDistributed System
This paper presents the Koreasat 5 secure communication system that has been design and developed by Alcatel Alenia Space -Italy (AAS-I) for Agency for Defense Development -South Korea.
    • by 
    •   4  
      South KoreaSystem DesignDesign and DevelopmentSecure Communication
Presently, mobile handheld device has successfully replaced traditional telephone to become the most popular wireless communication tools. Mobile Short Message Service (SMS) and Multimedia Message Service (MMS) fulfill almost all the user... more
    • by 
    •   7  
      Public Key InfrastructureHandheld Device UseSecure CommunicationUser Requirements
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not... more
    • by 
    •   8  
      Quantum PhysicsInformation TheoryQuantum CryptographyQuantum Key Distribution
    • by 
    •   17  
      Computer ScienceDistributed ComputingA Priori KnowledgeCommon Knowledge
Security services based on cryptographic mechanisms assume keys to be distributed prior to secure communications. The secure management of these keys is one of the most critical elements when integrating cryptographic functions into a... more
    • by 
    •   13  
      Distributed ComputingEnvironmental ManagementCryptographySecurity Management
Auf den letzten Seiten ihrer Studie Political Community and the North Atlantic Area (1969) geben die Autoren um Karl W. Deutsch ihrer Hoffnung Ausdruck, die NATO werde in Zukunft mehr sein als ein rein militärisches Bündnis. Über die... more
    • by 
    •   3  
      Political communicationNorth AtlanticSecure Communication
Two-way identity authentication is the basis of secure communication in a distributed application environment. A trusted third party (TTP) is needed while PKI is not applicable, and the design of authentication protocols with TTP is a... more
    • by 
    •   3  
      Secure CommunicationTrusted Third PartyAuthentication Protocol
In this paper, a new hyperchaotic system is presented by adding a nonlinear controller to the three-dimensional autonomous chaotic system. The generated hyperchaotic system undergoes hyperchaos, chaos, and some different periodic orbits... more
    • by 
    •   11  
      EngineeringMechanical EngineeringApplied MathematicsMathematical Sciences
This paper introduces a new 3-D quadratic autonomous system, which can generate two coexisting single-wing chaotic attractors and a pair of diagonal double-wing chaotic attractors. More importantly, the system can generate a fourwing... more
    • by 
    •   6  
      EngineeringMathematical SciencesSpectral analysisAutonomic System
Security has become paramount in modern software services as more and more security breaches emerge, impacting final users and organizations alike. Trends like the Microservice Architecture bring new security challenges related to... more
    • by 
    •   3  
      Information SecuritySecure CommunicationMicroservices
Modern industrial communication networks are increasingly based on open protocols and platforms that are also used in the office IT and Internet environment. This reuse facilitates development and deployment of highly connected systems,... more
    • by 
    •   15  
      Biomedical EngineeringAccess ControlIndustrial AutomationCommunication System
Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received little attention. We present a suite of security protocols optimized... more
    • by 
    •   18  
      Distributed ComputingInformation TechnologyInformation SecurityMobile Ad Hoc Networks
History indicates that the security community commonly takes a divide-and-conquer approach to battling malware threats: identify the essential and inalienable components of an attack, then develop detection and prevention techniques that... more
    • by 
    •   7  
      PolymorphismNatural languageSecure CommunicationBuffer Overflow
It has been recently investigated that the jerk dynamical systems are the simplest ever systems, which possess variety of dynamical behaviors including chaotic motion. Interestingly, the jerk dynamical systems also describe various... more
    • by 
    •   16  
      IonosphereElectrical Circuit TheoryFixed Point TheoryProfitability
This paper reports development of a framework for carrying out secure communication in Hindi with the added facility of conversion of the text into Romanized English form and subsequently into its SMS code before encryption and... more
    • by  and +1
    •   4  
      Translation StudiesHindiRomanizationSecure Communication
This paper presents an efficient identity-based key exchange protocol based on the difficulty of computing a Elliptic Curve Discrete Logarithm Problem. As compared with the previously proposed protocols, it has better performance in terms... more
    • by 
    •   4  
      Secure CommunicationKey ExchangeAuthenticated Key ExchangeDiscrete Logarithm
Coupling of distributed computer resources connected by a high speed network to one virtual computer is the basic idea of a metacomputer. Access to the metacomputer should be provided by an intuitive graphical user interface (GUI),... more
    • by 
    •   10  
      Information SystemsDistributed ComputingGraphic User Interface DesignWorld Wide Web
In this paper, a new type of generalized Q-S ͑lag, anticipated, and complete͒ time-varying synchronization is defined. Adaptive Q-S ͑lag, anticipated, and complete͒ time-varying synchronization and parameters identification of uncertain... more
    • by 
    •   24  
      Applied MathematicsFuzzy LogicNonlinear dynamicsAdaptive Control
Transportation networks are high-value targets for terrorists and criminals. They are widely accessible, visible, attract intense media attention, and have a significant degree of government ownership. Since the 9/11 terrorist attack in... more
    • by 
    •   8  
      Civil EngineeringRisk assessmentTransportation SecurityQualitative Analysis
... Fasee Ullah, Masood Ahmad, Masood Habib, Jawad Muhammad Department of Computer Sciences City ... One of the early encouraging steps towards sensor network architecture is Polastre et al. ... Aim of this protocol to solve different key... more
    • by 
    •   17  
      SensorWireless Sensor NetworksPower ManagementSecurity in routing protocols
There is a need to quantify system properties methodically. Dependability and security models have evolved nearly independently. Therefore, it is crucial to develop a classification of dependability and security models which can meet the... more
    • by 
    •   8  
      Case StudyState SpaceBayesian hierarchical modelSecure Communication
1 Associate Professor of International Relations at the Hebrew University of Jerusalem. He is the author of numerous articles and books, including The Power Ideology (University of California Press, 1987), Progress in Postwar... more
    • by 
    •   4  
      Applied EthicsPolitical ScienceResearch AgendaSecure Communication
The emergence of the Internet as a trusted medium for commerce and communication has made cryptography an essential component of modern information systems. Cryptography provides the mechanisms necessary to implement accountability,... more
    • by 
    •   5  
      Performance AnalysisHigh performanceSecure CommunicationSystem performance
Under the sole assumption that Alice and Bob are connected by a classical authentic communication channel, secret communication-and thus also the generation of a secret key-is impossible . This changes dramatically when quantum mechanics... more
    • by  and +1
    •   10  
      Quantum InformationOptical CommunicationInformation theoretic securityQuantum Information Theory
South America’s security agenda demands the simultaneous management of domestic crises, interstate conflicts and transnational threats. Though located at different systemic levels (national, international, transnational), the three... more
    • by 
    •   6  
      Political PartiesSouth AmericaMultilevel SecuritySecure Communication
Near Future on-board Telemetry, Tracking and Command (TT&C) equipment for secure communications will likely adopt Frequency Hopping (FH) instead of Direct Sequence (DS) Spread Spectrum (SS) techniques. As far as TT&C systems will have to... more
    • by 
    •   9  
      Channel CodingSatellite CommunicationTelemetrySystem Analysis
Synchronization of chaotic systems is important because it might be useful in some type of private communications. In this paper, the phenomenon of Chaos that produced in the case of autonomous New Lorenz-like attractor circuit, have been... more
    • by 
    •   10  
      Mathematical BiologySynchronizationMathematical ModellingEncryption
Presently, mobile handheld device has successfully replaced traditional telephone to become the most popular wireless communication tools. Mobile Short Message Service (SMS) and Multimedia Message Service (MMS) fulfill almost all the user... more
    • by 
    •   12  
      Computer SciencePublic Key InfrastructureCryptographyHandheld Device Use
It has been recently investigated that the jerk dynamical systems are the simplest ever systems, which possess variety of dynamical behaviors including chaotic motion. Interestingly, the jerk dynamical systems also describe various... more
    • by 
    •   17  
      IonosphereElectrical Circuit TheoryProfitabilityStability Analysis
advantageously only if the property of chaotic systems is suitably exploited. Chaos communication has been studied for only a little more than a decade while traditional communication schemes have been developed for nearly a century. The... more
    • by 
    •   4  
      Number TheoryDigital CommunicationChaotic SystemSecure Communication
In recent years, a large amount of work on chaos-based cryptosystems have been published. However many of the proposed schemes fail to explain or do not possess a number of features that are fundamentally important to all kind of... more
    • by 
    •   8  
      Mechanical EngineeringApplied MathematicsCryptographyKey Management
In recent years, a large amount of work on chaos-based cryptosystems have been published. However many of the proposed schemes fail to explain or do not possess a number of features that are fundamentally important to all kind of... more
    • by 
    •   8  
      Mechanical EngineeringApplied MathematicsCryptographyKey Management
Security of information has become a major issue during the last decades. New algorithms based on chaotic maps were suggested for protection of different types of multimedia data, especially digital images and videos in this period.... more
    • by 
    •   7  
      EngineeringComputational ComplexityMathematical SciencesChaotic Dynamics
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we suspected a replay attack was possible on the protocol. To... more
    • by 
    •   20  
      Software EngineeringModel CheckingNetworkingData Structure
The combination of physics, mathematics, and computer science in quantum computing has developed from a visionary idea to one of the most fascinating and promising areas of quantum mechanics in the past two decades. Research in the field... more
    • by 
    •   17  
      Quantum ComputingQuantum PhysicsQuantum InformationQuantum Mechanics
We perform a systematic analysis of a system consisting of a two-stage Colpitts oscillator. This well-known chaotic oscillator is a modification of the standard Colpitts oscillator obtained by adding an extra transistor and a capacitor to... more
    • by 
    •   11  
      EngineeringNonlinear dynamicsMathematical SciencesOscillations
This paper describes an experimental approach to determine the correlation between port scans and attacks. Discussions in the security community often state that port scans should be considered as precursors to an attack. However, very... more
    • by 
    •   5  
      Data CollectionExperimental EvaluationSecure CommunicationData Consistency
We present a security analysis of the complete TLS protocol in the Universal Composable security framework. This analysis evaluates the composition of key exchange functionalities realized by the TLS handshake with the message... more
    • by  and +1
    •   5  
      Provable SecuritySecurity AnalysisSecure CommunicationChannel model
    • by 
    •   4  
      Security and PrivacySecure CommunicationRfid SecurityRfid Tag
Visible Light Communication (VLC) is a blooming research area which uses visible light spectrum as the communication channel. Exponential growth of Light Emitting Diodes (LEDs) deployment as a light source is encouraged to use for... more
    • by 
    •   3  
      Location Based ServicesVisible Light CommunicationSecure Communication
    • by 
    •   12  
      Public Key InfrastructureVehicle DynamicsPerformance AnalysisPerformance Evaluation
Abstruct-A circuit implementation of the chaotic Lorenz system is described. The chaotic behavior of the circuit closely matches the results predicted by numerical experiments. Using the concept of synchronized chaotic systems (SCS's),... more
    • by 
    •   17  
      Signal ProcessingSynchronizationModulationState Estimation