Items where Subject is "08 INFORMATION AND COMPUTING SCIENCES > 0804 Data Format > 080402 Data Encryption"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: C | G | O | T
Number of items at this level: 12.

C

Cahya Prihandoko, Antonius, Ghodosi, Hossein, and Litow, Bruce (2013) Secure and private content distribution in the DRM environment. In: Proceedings of the Information System International Conference, pp. 659-664. From: ISICO 2013: Information System International Conference, 2-4 December 2013, Bali, Indonesia.

Curiac, Daniel-Ioan, Iercan, Daniel, Dranga, Octavian, Dragan, Florin, and Banias, Ovidiu (2007) Chaos-based cryptography: end of the road? In: Proceedings of International Conference on Emerging Security Information, Systems and Technologies, pp. 71-76. From: SECURWARE 2007 International Conference on Emerging Security Information, Systems and Technologies, 14-20 October 2007, Valencia, Spain.

Cahya Prihandoko, Antonius, Ghodosi, Hossein, and Litow, Bruce Deterring traitor using double encryption scheme. In: Proceedings of the IEEE International Conference on Communication, Networks and Satellite, pp. 100-104. From: COMNETSAT 2013: IEEE International Conference on Communication, Networks and Satellite, 3-5 December 2013, Yogyakarta, Indonesia. (In Press)

G

Ghodosi, Hossein, and Lee, Ickjai (2012) Unconditional security and privacy preserving oblivious transfer. In: Proceedings of the 7th International Conference on Computing and Convergence Technology (ICCCT2012) (7), pp. 1042-1047. From: 2012 7th International Conference on Computing and Convergence Technology, 3-5 December 2012, Seoul, Korea.

Ghodosi, Hossein (2007) On insecurity of Naor–Pinkas’ distributed oblivious transfer. Information Processing Letters, 104 (5). pp. 179-182.

Ghodosi, Hossein (2007) A general model for oblivious transfer. In: Proceedings of the Sixth International Workshop for Applied PKC, pp. 79-87. From: Sixth International Workshop for Applied PKC (IWAP2007), 3-4 DEC 2007, Perth, WA, Australia.

Ghodosi, Hossein, and Zaare-Nahandi, Rahim (2007) A non-interactive multiparty computation protocol. In: Proceedings of the Sixth International Workshop for Applied PKC, pp. 88-95. From: Sixth International Workshop for Applied PKC (IWAP2007), 3-4 DEC 2007, Perth, WA, Australia.

Ghodosi, Hossein, and Zaare-Nahandi, Rahim (2006) Comments on the `m out of n oblivious transfer'. Information Processing Letters, 97 (4). pp. 153-155.

O

Orumiehchi, Mohammad Ali, Mohebbipoor, S. Fahimeh, and Ghodosi, Hossein (2008) Cryptanalysis of MV 3 Stream Cipher. In: Franklin, Matthew K., Hui, Lucas Chi Kwong, and Wong, Duncan S., (eds.) Cryptology and Network Security. Lecture Notes in Computer Science . Springer, Berlin, Germany, pp. 240-251.

T

Trevathan, Jarrod, Ghodosi, Hossein, and Myers, Trina (2011) Efficient batch authentication for hierarchical wireless sensor networks. In: Proceedings of the 2011 Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing, pp. 217-222. From: ISSNIP 2011: Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 6-9 December 2011, Adelaide, Australia.

Trevathan, Jarrod (2007) Privacy and security in online auctions. PhD thesis, James Cook University.

Trevathan, Jarrod, Ghodosi, Hossein, and Litow, Bruce (2003) Overview of traitor tracing schemes. Communications of the CCISA, Selected Topics of Cryptography and Information Security, 9 (4). pp. 51-63.

This list was generated on Fri Apr 18 05:08:10 2014 EST.