Extended versions of papers presented at the 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS 2013) and 4th International Conference on Emerging Intelligent Data and Web Technologies (EIDWT 2013).
- Key management scheme based on secret sharing for wireless sensor networks
- Attribute-based signature schemes with accountability
- Statistical analysis and comparison of linear regression attacks on the advanced encryption standard
- On two circuit configurations of non-linear feedback shift registers
- A real-time data backup model and methods based on peer-to-peer network
- Hidden Markov model-based Assamese vowel phoneme recognition using cepstral features
- New signature schemes in the standard model based on publicly verifiable CCA-secure public key encryption
- Multi-party concurrent signatures scheme from lattice
- Sociality-based comprehensive buffer management for multicast in DTNs
- Server-aided aggregate verification signature: security definition and construction
- Provably secure and efficient certificateless signature in the standard model
- Improving network routing energy-efficiency for real-time workloads by stochastic service model
- Decreasing the BER of turbo codes with short frame by optimising the energy allocation
- Design of a microwave down-converter module
No comments:
Post a Comment