Volume 10 (2023)
Volume 9 (2022)
Volume 8 (2021)
Volume 7 (2020)
Volume 6 (2019)
Volume 5 (2018)
Volume 4 (2017)
Volume 3 (2016)
Volume 2 (2015)
Volume 1 (2014)
Number of Articles: 8
A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing
Volume 1, Issue 1 , January 2014, Pages 3-14
Abstract
Correctness verification of query results is an important security concern in data outsourcing scenarios. In previous approaches, the correctness verification was impossible in real ... Read MoreVol. 6, No. 2, 2019
Volume 1, Issue 1 , January 2014, Pages 43-80
Abstract
Vol. 6, No. 2, 2019 Read MoreUnified Byte Permutations for the Block Cipher 3D
Volume 1, Issue 1 , January 2014, Pages 15-22
Abstract
3D is a 512-bit block cipher whose design is inspired from the Advanced Encryption Standard (AES). Like the AES, each round of 3D is composed of 4 transformations including a round-key ... Read MoreAn Efficient End to End Key Establishment Protocol for Wireless Sensor Networks
Volume 1, Issue 1 , January 2014, Pages 23-38
Abstract
Sensor networks are eligible candidates for military and scientific applications such as border security and environmental monitoring. They are usually deployed in unattended or hostile ... Read MoreThe Effect of Correlogram Properties on Blind Steganalysis in JPEG Images
Volume 1, Issue 1 , January 2014, Pages 39-46
Abstract
Blind image steganalysis is a technique for discovering the message hidden in images in an independent manner than embedding the hidden message. The content of the image contribute ... Read MoreA Growing Hierarchical Approach to Batch Linear Manifold Topographic Map Formation
Volume 1, Issue 1 , January 2014, Pages 47-59
Abstract
The linear manifold topographic map (LMTM) is a model for unsupervised learning of multiple low-dimensional linear manifolds from a set of data samples in a topology-preserving map. ... Read MoreAn Optimal Traffic Distribution Method Supporting End-to-End Delay Bound
Volume 1, Issue 1 , January 2014, Pages 61-71