Search Results

You are looking at 1 - 10 of 7,856 items for :

Clear All
Open access

R. Seetha and R. Saravanan

References 1. Judge, P., M. Ammar. Security Issues and Solutions in Multicast Content Distribution: A Survey. – Network, IEEE, Vol. 17 , 2003, pp. 30-36. 2. Challal, Y., H. Seba. Group Key Management Protocols: A Novel Taxonomy. – Enformatika, International Journal of Information Technology, Vol. 2 , 2005. 3. Bibo, J., H. Xiulin. A Survey of Group Key Management. – In: Computer Science and Software Engineering, 2008 International Conference on, 2008, pp. 994-1002. 4. Rafaeli, S., D. Hutchison. A Survey of Key Management for Secure Group

Open access

Sigurd Eskeland

References [1] DIFFIE, W.-HELLMAN, M.: New directions in cryptography, IEEE Trans. Inform. Theory 22 (1976), 644-654. [2] INGEMARSSON, I.-TANG, D.-WONG, C.: A conference key distribution system, IEEE Trans. Inform. Theory 28 (1982), 714-720. [3] BURMESTER, M.-DESMEDT, Y.: A secure and efficient conference key distribution system, in: Advances in Cryptology-EUROCRYPT ’94 (A. De Santis, ed.), Workshop on the Theory and Appl. of Cryptographic Techniques, Perugia, Italy, 1994, Lecture Notes in Comput. Sci., Vol. 950

Open access

Jianhong Chen, Kun Yu, Yu Long and Kefei Chen

References 1. Chen, J., Y. Long, K. Chen, G. J. Hook. Attribute-Based Key-Insulated Signature and Its Applications. – Information Sciences, Vol. 275 , 2014, pp. 57-67. 2. Dodis, Y., J. Katz, S. Xu, M. Yung. Key-Insulated Public-Key Cryptosystem. – In: Proc. of 21th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt), 28 April-2 May 2002. 3. Dodis, J. K., S. Xu, M. Yung. Key-Insulated Public-Key Cryptosystem. – In: Proc. of 9th International Conference on Theory and Practice in Public-Key

Open access

Sian K. Jones

References [1] C. Bennett, G. Brassard, S. Breidbart, and S. Wiesner.“Quantum cryptography, or unforgeable subway tokens”, in D. Chaum, R. Rivest, and A. Sherman, editors, Advances in Cryptology, 267-275, Springer US, 1983. [2] C. H. Bennett and G. Brassard.“Quantum cryptography: Public key distribution and coin tossing”, IEEE International Conference on Computers, Systems, and Signal Processing, p. 175, Bangalore, 1984. [3] C. Chang, Y. Chou, and T. D. Kieu.“An information hiding scheme using Sudoku”, ICICIC

Open access

Nik Unger and Ian Goldberg

References [1] Masayuki Abe, Miyako Ohkubo, and Koutarou Suzuki. 1-out-of- n Signatures from a Variety of Keys. In International Conference on the Theory and Application of Cryptology and Information Security , pages 415–432. Springer, 2002. [2] Ben Adida, Susan Hohenberger, and Ronald L Rivest. Ad-Hoc-Group Signatures from Hijacked Keypairs. In in DIMACS Workshop on Theft in E-Commerce , 2005. [3] Chris Alexander and Ian Goldberg. Improved User Authentication in Off-The-Record Messaging. In Workshop on Privacy in the Electronic Society

Open access

Orly Carvache-Franco, Glenda Gutiérrez Candela and Elsie Zerda Barreno

Arts. UK. Mulgan, G., Tucker, S., Ali, R., & Sanders, B. (2007). Social innovation: what it is, why it matters and how it can be accelerated. Neumeier, S. (2017). Social innovation in rural development: identifying the key factors of success. The geographical journal , 183 (1), pp. 34-46. Nobrega, S., Macario, V., & Pasa, C. (2016). Dimensions of social innovation and the roles of organizational actor: the proposition of a framework. RAM. Revista de Administração Mackenzie , 17 (6), pp. 102-133. SICP (2010). About SICP – the community

Open access

Madeline González Muñiz and Rainer Steinwndt

]. [BPS07] BACKES, M.-PFITZMANN, B.-SCEDROV, A.: Key-dependent message security under active attacks-BRSIM/UC-soundness of symbolic encryption with key cycles, in: CSF ’07, Proc. of the 20th IEEE Computer Security Foundations Symposium, IEEE Computer Society, Washington, DC, USA, 2007, pp. 112-124, http://dx.doi.org/10.1109/CSF.2007.23. [BRS03] BLACK, J.-ROGAWAY, P.-SHRIMPTON, T.: Encryption-scheme security in the presence of key-dependent messages, in: SAC ’02-Selected Areas in Cryptography (K. Nyberg et al., eds.), 9th Annual International Workshop, St

Open access

S. Spahija, E. Shehi and G. Guxho

References 1. Haycock, John. Productivity toolkit for garment companies. RRije/Albania, USAID, 2011. 2. Hunter, Alan. Quick response in apparel manufacturing. 3. Suanmalu, Suthathip. A study of business performance through Key Performance Indicators (KPIs) in the Thai garment industry. 4. Performance measurement of companies - www.wikipedia.org.

Open access

Mohammed Sahmoudi and Abdelhakim Chillali

] MENEZES, A. J.: Elliptic Curve Public key Cryptosystems. Foreword by Neal Koblitz. In: Kluwer Internat. Ser. Engrg. Comput. Sci., Vol. 234, Kluwer Acad. Publ., Boston, MA, 1993. [6] RIVEST, R. L.-ADLEMAN, L.-DERTOUZOS, M. L.: On data banks and privacy homomorphisms. Foundations of Secure Computation 11, (1978) no. 4, 169-180. [7] SAHMOUDI, M.: Explicit integral basis for a family of sextic field, Gulf J. Math. 4 (2016), 217-222. [8] MILLER, V. S.: Use of elliptic curves in cryptography. In: Advances in Cryptology- -CRYPTO

Open access

Dmytro Kaidalov, Roman Oliynykov and Oleksandr Kazymyrov

. V.-GORBENKO, I. D.-DOLGOV, V. I.- RUZHENTSEV, V. I.: Prospective symmetric block cipher: “Kalina”-basic terms and specification, Applied Radioelectronic 6 (2007), special issue-devoted to the problems of information security, Kharkiv. (In Ukrainian) [5] BIRYUKOV, A.-KHOVRATOVICH, D.: Related-key cryptanalysis of the full ES-192 and AES-256, in: Advances in Cryptology-ASIACRYPT ’09 (M. Matsui, ed.), 15th Internat. Conf. on the Theory and Appl. of Cryptology and Information Security, Tokyo, Japan, 2009, Lecture Notes in Comput. Sci., Vol. 5912