Title :
Table of contents
Abstract :
The following topics are dealt with: attribute-based ring signature; secret key cryptosystem; WSN; Internet-of-Things; video watermarking; MANET; cognitive radio; cloud computing; blind image steganalysis; cellular automata; neural network; and detecting authentication misuse attack.
Keywords :
Internet of Things; cellular automata; cloud computing; cognitive radio; cryptography; digital signatures; mobile ad hoc networks; neural nets; steganography; video watermarking; wireless sensor networks; Internet-of-Things; MANET; WSN; attribute-based ring signature; authentication misuse attack; blind image steganalysis; cellular automata; cloud computing; cognitive radio; neural network; secret key cryptosystem; video watermarking;
Conference_Titel :
Information Security and Cryptology (ISCISC), 2013 10th International ISC Conference on
Conference_Location :
Yazd
DOI :
10.1109/ISCISC.2013.6767318