DocumentCode :
1583183
Title :
Table of contents
fYear :
2013
Firstpage :
1
Lastpage :
2
Abstract :
The following topics are dealt with: attribute-based ring signature; secret key cryptosystem; WSN; Internet-of-Things; video watermarking; MANET; cognitive radio; cloud computing; blind image steganalysis; cellular automata; neural network; and detecting authentication misuse attack.
Keywords :
Internet of Things; cellular automata; cloud computing; cognitive radio; cryptography; digital signatures; mobile ad hoc networks; neural nets; steganography; video watermarking; wireless sensor networks; Internet-of-Things; MANET; WSN; attribute-based ring signature; authentication misuse attack; blind image steganalysis; cellular automata; cloud computing; cognitive radio; neural network; secret key cryptosystem; video watermarking;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Security and Cryptology (ISCISC), 2013 10th International ISC Conference on
Conference_Location :
Yazd
Type :
conf
DOI :
10.1109/ISCISC.2013.6767318
Filename :
6767318
Link To Document :
بازگشت