cryptography research papers 2012
Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software free download ABSTRACT Software-based attacks (eg, malware) pose a big threat to cryptographic software because they can compromise the associated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key cryptography, which can mitigate Multi-instance security and its application to password-based cryptography free download This […]
biometric security research papers 2012
Application of Biometric Security in Agent based Hotel Booking System-Android Environment free download W Lawrence, S Suresh ,Communicated to International Journal on , 2012 Abstract—The process of finding the finest hotel in central location is time consuming, information overload and overwhelming and in some cases poses a security risk to the client. Some of the more advanced […]
adhoc network research papers 2012
Development of Energy Efficient and Reliable Congestion Control Protocol for Multicasting in Mobile Adhoc Networks compare with AODV Based on Receivers free download KS Rao, RS Kumar, P Venkatesh, RVS Naidu ,Development, 2012 Abstract Mobile ad-hoc networks (MANETs) allow portable mobile devices to establish communication path without having any central infrastructure. Since there is no central infrastructure […]