[PDF][PDF] A note on tame polynomial automorphisms and the security of TTM cryptosystem

J Hrdina, M Kureš, P Vašík - Appl. Comput. Math, 2010 - academia.edu
In this paper we discuss two basic ways of TTM cryptosystem modifications. We suggest to
add one more polynomial transformation into the coding process, and we discuss the …

CST: P2P anonymous authentication system based on collaboration signature

X Wang, X Sun, G Sun, D Luo - 2010 5th International …, 2010 - ieeexplore.ieee.org
Anonymity has received increasing attention in the literature due to the users' awareness of
their privacy nowadays. While anonymity related issues have been extensively studied in …

Cryptanalysis and Improvement of Akleylek et al.'s cryptosystem

R Rastaghi - arXiv preprint arXiv:1302.2112, 2013 - arxiv.org
Akleylek et al.[S. Akleylek, L. Emmungil and U. Nuriyev, A mod ified algorithm for peer-to-
peer security, journal of Appl. Comput. Math., vol. 6 (2), pp. 258-264, 2007.], introduced a …

Una arquitectura distribuida para la detección, comunicación y mitigación de la denegación de servicio

L Campo Giralte - 2014 - burjcdigital.urjc.es
Como bien se sabe, en la actualidad los ciberataques tienen lugar en cualquier lugar del
mundo y afectan a todo tipo de infraestructuras. Todos los meses se reciben noticias de …

[PDF][PDF] Sharing of Encrypted Information in a Network Using Block Cipher Cryptography

M Ojha, P Dubey - International Journal of Emerging Technology and …, 2013 - Citeseer
In this Paper we are proposing a theoretical cum practical model that predicts the
performance of the system and computes the values of the technique parameters that …

[PDF][PDF] Hybrid Public Key Encryption Scheme for Networking

SJ Aboud - Advances in Computational Research, 2013 - academia.edu
In this paper, we analyze the Akleylek, et al. scheme and their try to enhance a security of
peer-to-peer network by merging El-Gamal scheme with knapsack system. We demonstrate …

[引用][C] SWP2P: P2P anonymous trace system based on superposition watermarking

X Wang, X Sun, H Yang, S Shah - International …, 2011 - Advanced Institute of Convergence …

[引用][C] Fair blind signature based authentication for super peer P2P network

X Wang, X Sun - Information Technology Journal, 2009

[引用][C] Exchange of Encrypted Information Using Block Cipher Cryptography

PK Agnihotri, P Gautam