All Stories

  1. A Privacy Preserving Search Index for Image Databases Based on SURF and OrderPreserving Encryption
  2. New Video Encryption Schemes Based on Chaotic Maps
  3. Approximate Analytical Solution for Standard Model of Viral Dynamics
  4. ArMTFr: a new permutation-based image encryption scheme
  5. A Mixed Integer Linear Programming Approach to Electrical Stimulation Optimization Problems
  6. Data hiding in a digital cover image using chaotic maps and LSB technique
  7. Two-Phase Image Encryption Scheme Based on FFCT and Fractals
  8. An efficient load flow algorithm for radial distribution networks
  9. Mixed-integer quadratically constrained programming with application to distribution networks reconfiguration
  10. An Optimized Hybrid Approach for Spectrum Handoff in Cognitive Radio Networks With Non-Identical Channels
  11. A secure geographical routing protocol for highly-dynamic aeronautical networks
  12. Dual cycle mode scheduling of internal transfer in container terminals using a Genetic Algorithm
  13. Optimal capacitor placement and sizing in radial electric power systems
  14. New blind signcryption schemes with application to E-cash systems
  15. Extension and application of El-Gamal encryption scheme
  16. A heuristics-based solution to the continuous berth allocation and crane assignment problem
  17. An efficient identity-based signeryption scheme without bilinear pairings
  18. An Optimized, Authenticated Key Distribution Protocol for Optical Channels
  19. Certificate-based authenticated key agreement protocols
  20. A new biometrics-based authentication protocol for smart card applications
  21. MIDSCYK: An efficient provably secure multi-recipient identity-based signcryption scheme
  22. Privacy protecting digital payment system using ID-based blind signatures with anonymity revocation trustees
  23. A New Blind Identity-Based Signature Scheme
  24. A Scalable Trace and Revoke Scheme with Security Enhancements
  25. A new blind identity-based signature scheme
  26. A new multi-recipient tree-based signcryption scheme
  27. Digital Rights Management system design and implementation issues
  28. A Multi-Recipient Tree-Based Signcryption Scheme
  29. Broadcast Encryption Schemes: A Comparative Study