Recent Works (1)
Research Works (25)
SecureCoin: A Robust Secure and Efficient Protocol for Anonymous ...
International Journal of Network Security (2017)
Bitcoin is the rst decentralized peer-to-peer electronicvirtual asset and payment cryptocurrency, through which,users can transact digital currency directly, without theneed ...
Enhancing Efficiency of Enterprise Digital Rights Management
2015 International Conference on Advanced Computer Science and Information Systems (ICACSIS) Date of Conference: (2015)
Most of private enterprises and governmental institutions are in an increasing need for enterprise-oriented digital rights management (E-DRM) schemes. E-DRM ...
IMPROVING SECURITY AND EFFICIENCY OF ENTERPRISE DIGITAL RIGHTS MANAGEMENT
6th IEEE International Conference on Computing, Communications and Networking Technologies (2015)
Recently, private enterprises, governmental and military institutions have been relied mainly on digitizing their work. Digital files containing sensitive information ...
Secure and Robust Enterprise Digital Rights Management Protocol with Efficient ...
International Journal on Information (Information Tokyo) (2015)
In the digital world, protection against information theft by unauthorized entities is the most demanding services for enterprise business organizations. ...
Matched-Filter-based Spectrum Sensing for Secure Cognitive Radio Network Communications
International Journal of Computer Applications (2014)
The increasing demand for wireless communication introduces efficient spectrum utilization challenge. To address this challenge, Cognitive Radio (CR) has emerged ...
SECURE AUTHENTICATION SCHEME PREVENTING WORMHOLE ATTACKS IN COGNITIVE RADIO NETWORKS
Asian Journal of Computer Science and Information Technology (2012)
Cognitive Radio Cognitive Radio (CR) may introduce new classes of security threats and challenges where attacker could disrupt the basic ...
Efficient Noninteractive Secure Protocol Enforcing Privacy in Vehicle-to-Roadside Communication Networks
International Journal of Vehicular Technology (2012)
Vehicular ad hoc networks (VANETs) have attracted extensive attentions in recent years for their promises in improving safety andenabling other ...
Non-interactive Authentication Scheme Providing Privacy among Drivers in Vehicle-to-Vehicle Networks
Networking and Services (ICNS), 2010 Sixth International Conference on (2010)
In this paper, we present a non-interactive authentication scheme providing privacy among drivers in vehicle-to-vehicle (V2V) communication networks. Where the ...
Noninteractive, Anonymously Authenticated and Traceable Message Transmission for VANETs
International Journal of Vehicular Technology (2009)
Unlike sensor and other ad-hoc wireless networks, vehicular ad-hoc networks (VANETs) are characterized by its high mobility which allows a ...