Filter your results
- 5
- 5
- 5
- 5
- 1
- 2
- 1
- 1
- 5
- 5
- 5
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional OperationInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.578-592, ⟨10.1007/978-3-642-32498-7_44⟩
Conference papers
hal-01542445v1
|
||
|
A Block Cipher Mode of Operation with Two Keys1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.392-398, ⟨10.1007/978-3-642-36818-9_43⟩
Conference papers
hal-01480198v1
|
||
|
Building an Initialization Cipher Block with Two-Dimensional Operation and Random ParametersInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.166-171, ⟨10.1007/978-3-319-10975-6_12⟩
Conference papers
hal-01403993v1
|
||
|
A Multiple-Key Management Scheme in Wireless Sensor Networks1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.337-344
Conference papers
hal-01506711v1
|
||
|
A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless Networks1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.255-270, ⟨10.1007/978-3-642-23300-5_20⟩
Conference papers
hal-01590385v1
|