research paper-computer science-cryptography
Logic functions for cryptography–A Tutorial Finite field multiplication combining AMNS and DFT approach for pairing cryptography blind source separation based cryptography scheme for mobile military communication applications Secure localization using Elliptic Curve Cryptography in wireless sensor networks Iris Biometric Cryptography for Identity Document Algebraic visual cryptography scheme for color images Symmetric extendibility for qudits and tolerable error rates in quantum cryptography Provable […]
Study on the Security Mechanism for Web Services
FREE-DOWNLOADK Hongzhao – Proceedings of the World Congress on Engineering …, 2010 . spoofing and repudiation. Before web service-related security standards became available, the Transport Layer Security (TLS) is a simply and widely used method for performing secure transactions for the Web security. But the
Requirements of a security framework for the semantic web
FREE-DOWNLOAD IR Mbaya, AJ Gerber… – 2009 – . established. Common criteria arc therefore required to evaluate existing security frameworks. In this paper, we suggest a -.et ¡il evaluation criteria that can be used to evaluate existing Semantic Web security frameworks. KEY