Go to other papers

 

 

 

Information Security

 

Title

Country

Author

Number

Use of Elliptic Curves Cryptosystems in Information Security ROMANIA ,France Ion TUTĂNESCU, Constantin ANTON, Daniel CARAGAŢĂ 504
How SAGE helps to implement Goppa Codes and McEliece PKCSs Germany Thomas Risse 526
Applying the Software Engineering Principles in Building a Secure Software Iraq Huda Abdulaali AL_Amwee 561
User Authentication via Keystroke Dynamics: An Artificial Immune System Based Approach Egypt

Kenneth Revett

562

Implementing Serpent Cipher in Field Programmable Gate Arrays Poland Jaroslaw Sugier 620

IEEE 802.21 Information Service: Features and Implementation Issues

Spain Fábio Buiati, Ismail Saadat, Delfín Rupérez Cañas and Luis Javier García Villalba 636

Overview of IEEE 802.21 Security Issues for MIH Networks

Spain

Ismail Saadat1, Fábio Buiati, Delfín Rupérez Cañas and Luis Javier García Villalba

637