ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: collusion attack
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Digital Signature Protocol for Visual Authentication Anirban Goswami1, Ritesh Mukherjee2, Soumit Chowdhury3, and Nabin Ghoshal4 1Department of Information Technology, Techno India, India 2Department of Advanced Signal Processing, Centre for Development of Advanced Computing, India 3Department of Computer Science and Engineering, Government College of Engineering and Ceramic
Technology, India 4Department of Engineering and Technological Studies, University of Kalyani, India
#Share
# DCT and IDCT
# image compression
# data hiding
# SSIM
# collusion attack
Flexible Fair and Collusion Resistant Pseudonym Providing System
Belal Amro1, Albert Levi2, and Yucel Saygin2 1College of IT, Hebron University, Palestine 2Faculty of Engineering and Natural Sciences, Sabanci University, Turkey
#Security
# privacy
# pseudonym
# anonymity
# access control
A Robust Secure Self-Certified Concurrent
Signature Scheme from Bilinear Pairings
#Bilinear pairings
# concurrent signature
# fair exchange
# self-certified
# trusted third party
All Rights reserved to IAJIT 2024
Powered by:
TurnPoint