Zobrazeno 1 - 10
of 23
pro vyhledávání: '"Shehzad Ashraf Ch"'
Publikováno v:
Information Technology And Control. 48:211-224
The remote authentication has been advancing with the growth of online services being offered on remotely basis. This calls for an optimal authentication framework other than single-server authentication. In this connection, the multi-server authenti
Publikováno v:
Multimedia Tools and Applications. 74:3967-3984
The Session Initiation Protocol (SIP) has revolutionized the way of controlling Voice over Internet Protocol (VoIP) based communication sessions over an open channel. The SIP protocol is insecure for being an open text-based protocol inherently. Diff
Autor:
Mahmood Ul Hassan, Muhammad Shahzad Faisal, Anwer Ghani, Muhammad Sher, Shehzad Ashraf Ch, Azeem Irshad
Publikováno v:
Security and Communication Networks. 7:1210-1218
Session initiation protocol SIP provides the basis for establishing the voice over internet protocol sessions after authentication and exchanging signaling messages. SIP is one of the significant and extensively used protocols in the multimedia proto
Publikováno v:
International Journal of Machine Learning and Computing. :224-230
Autor:
Samina Bilal, Jabar Zaman Khan Khattak, Shehzad Ashraf Ch, Hamid Rashid, Tahira Sultana, Asif Mir
Publikováno v:
African Journal of Biotechnology; Vol 11, No 27 (2012); 6965-6973
The genome sequencing accomplishes complete genetic blue prints for hundreds of organisms, including humans. In the current era, we are trying to focus on analyzing, controlling and modifying functions of proteins encoded by these genomes. This task
Publikováno v:
2012 Second International Conference on Digital Information Processing and Communications (ICDIPC).
Dynamic key management is a pre requisite for ensuring confidentiality, authentication and other security primitives, which are needed in almost every type of network especially for future body sensor networks which shares patients personal informati
Publikováno v:
Computer Science and its Applications ISBN: 9789400756984
All wireless networks are resource constrained, the battery power, memory and bandwidth are main constraints along with security of information in wireless networks. Running of ordinary file systems on such wireless networks can result in short batte
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::367efacc6462be39cef3c4a700f6710d
https://doi.org/10.1007/978-94-007-5699-1_95
https://doi.org/10.1007/978-94-007-5699-1_95
Publikováno v:
Information Systems, Technology and Management ISBN: 9783642291654
ICISTM
ICISTM
Signcryption is a process of combining encryption and signature into a single logical step. Traditional signcryption schemes provide message confidentiality and sender authentication, sender authentication can only be provided after unsigncryption of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c6c027d721c3eb7a96792897c5a10072
https://doi.org/10.1007/978-3-642-29166-1_12
https://doi.org/10.1007/978-3-642-29166-1_12
Publikováno v:
8th International Conference on High-capacity Optical Networks and Emerging Technologies.
Security of transmitted information is a key element for any communication system it becomes more important as for as resource constrained and wireless/mobile networks are concerned, as security is an energy, memory and processing extensive applicati
Publikováno v:
2011 7th International Conference on Emerging Technologies.
Securing data over wireless medium got significant importance because of inherent problems of power, memory and processing constraints. Hyper elliptic curve cryptosystem (HECC) is an emerging public key cryptosystem suitable for such resource constra