Information Security
Title |
Country |
Author |
Number |
Use of Elliptic Curves Cryptosystems in Information Security | ROMANIA ,France | Ion TUTĂNESCU, Constantin ANTON, Daniel CARAGAŢĂ | 504 |
How SAGE helps to implement Goppa Codes and McEliece PKCSs | Germany | Thomas Risse | 526 |
Applying the Software Engineering Principles in Building a Secure Software | Iraq | Huda Abdulaali AL_Amwee | 561 |
User Authentication via Keystroke Dynamics: An Artificial Immune System Based Approach | Egypt | ||
Implementing Serpent Cipher in Field Programmable Gate Arrays | Poland | Jaroslaw Sugier | 620 |
IEEE 802.21 Information Service: Features and Implementation Issues |
Spain | Fábio Buiati, Ismail Saadat, Delfín Rupérez Cañas and Luis Javier García Villalba | 636 |
Overview of IEEE 802.21 Security Issues for MIH Networks |
Spain |
Ismail Saadat1, Fábio Buiati, Delfín Rupérez Cañas and Luis Javier García Villalba |
637 |