Intend 发表于 2025-3-23 12:50:52
A New Variant of Algebraic Attack discussed the general attack strategy using decomposable function. We also demonstrate the decomposition of some Boolean function used in practical stream ciphers. Finally we have given a bound on the degree of a function to be multiplied with a given function so that the product has low degree decomposition.CESS 发表于 2025-3-23 16:31:40
http://reply.papertrans.cn/83/8235/823418/823418_12.pngCHOKE 发表于 2025-3-23 18:42:13
Chain Routing for Convergecast Small Scale Wireless Sensor Networkse in the protocol. The proposed CRCSS protocol exhibits improvement in energy spent per packet and latency per packet for a wireless sensor network as compared to ConverSS protocol for small scale wireless sensor networks. In CRCSS protocol energy spent per packet is independent of the network radius.Blood-Clot 发表于 2025-3-23 23:46:45
A Security Framework for Multi-authority Based e-Sealed Bid Auction System auction in a two server setting using public key infrastructure: First, secure bid submission and bid opening using multiple authorities, and second, secure bid document storage for future references.laceration 发表于 2025-3-24 06:06:02
Collaborative Approach for Data Integrity Verification in Cloud Computingications and data are moved towards cloud infrastructure and data center which run on virtual computing resources in the form of virtual machine. The large scale usage of virtualization to achieve cloud infrastructure brings additional security burden for tenants of a public cloud service. In this pInstinctive 发表于 2025-3-24 09:49:09
EESOR: Energy Efficient Selective Opportunistic Routing in Wireless Sensor Networksple hops from source to the destination for transfer of information. The set of neighbor nodes participating in the routing are included in the forwarder list in the order of priority. A node with highest priority is allowed to forward the packet it hears. This paper implements Energy Efficient SeleMadrigal 发表于 2025-3-24 13:46:33
A Security Framework for Multi-authority Based e-Sealed Bid Auction Systemsecurity control over multiple-authorities to ensure trust among them and avoid dispute. In our research we are presenting two aspects of e-sealed bid auction in a two server setting using public key infrastructure: First, secure bid submission and bid opening using multiple authorities, and second,支柱 发表于 2025-3-24 15:36:59
http://reply.papertrans.cn/83/8235/823418/823418_18.png保守 发表于 2025-3-24 21:57:05
Enhanced Security of PHR System in Cloud Using Prioritized Level Based Encryption, there has been increasing security and privacy concerns on outsourced data. However there are more privacy concerns when the data involved is related to health. The current trend is that all the sectors are now moving to paperless management setup reducing the manual work and increasing the effici方舟 发表于 2025-3-25 02:10:42
http://reply.papertrans.cn/83/8235/823418/823418_20.png