Volume 9 (2022)
Volume 8 (2021)
Volume 7 (2020)
Volume 6 (2019)
Volume 5 (2018)
Volume 4 (2017)
Volume 3 (2016)
Volume 2 (2015)
Volume 1 (2014)
Number of Articles: 4
Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off
Volume 3, Issue 3 , July 2016, Pages 155-162
Abstract
Critical overlap situations in the classical Hellman's cryptanalytic time memory trade-off method can be avoided, provided that during the precomputation phase, we generate perfect ... Read MoreSecurity Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol
Volume 3, Issue 3 , July 2016, Pages 163-174
Abstract
Design of secure authentication solutions for low-cost RFID tags is still an open and quite challenging problem, though many protocols have been published in the last decade. In 2013, ... Read MoreA New Hybrid Method for VoIP Stream Steganography
Volume 3, Issue 3 , July 2016, Pages 175-182
Abstract
In this article, a new stream steganography method for real time digital data network environment with the focus on VoIP is presented. This method consists of a combination of Least ... Read MoreEffect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem
Volume 3, Issue 3 , July 2016, Pages 183-191