2,139
Views
2
CrossRef citations to date
0
Altmetric
Editorial

Advanced computer mathematics based cryptography and security technologies

, &
Pages 2512-2514 | Published online: 09 Dec 2013

References

  • Y. Ku, O. Choi, K. Kim, T. Shon, M. Hong, H. Yeh, and J.-H. Kim, Two-factor authentication system based on extended OTP mechanism, Int. J. Comput. Math. 90 (12) (2013), pp. 2512–2529.
  • M.-Q. Fan, P.-P. Liu, H.-X. Wang, and H.-J. Li, A semi-fragile watermarking scheme for authenticating audio signal based on dual-tree complex wavelet transform and discrete cosine transform, Int. J. Comput. Math. 90 (12) (2013), pp. 2588–2602.
  • K. Jeong, Y. Lee, J. Sung, and S. Hong, Improved differential fault analysis on PRESENT-80/128, Int. J. Comput. Math. 90 (2013), pp. 2553–2563.
  • Y. Liu, Y.S. Lee, H.-K. Zhang, T.-Y. Wu, and C.-H. Lo, Modelling and simulations for DDoS attacks mitigation in identifier–locator split network, Int. J. Comput. Math. 90 (12) (2013), pp. 2541–2552.
  • Y. Lu and J. Li, New forward-secure public-key encryption without random oracles, Int. J. Comput. Math. 90 (12) (2013), pp. 2603–2613.
  • J. Song, K. Lee, and H. Lee, Biclique cryptanalysis on lightweight block cipher: HIGHT and Piccolo, Int. J. Comput. Math. 90 (12) (2013), pp. 2564–2580.
  • Y.-Y. Chen, Y.-.J Wang, and J.-K. Jan, The design of speedy seamless safe messaging mechanism in VANET, Int. J. Comput. Math. 90 (2013), pp. 2614–2630.
  • H. Yi, S. Kim, G. Ma, and J.H. Yi, Elastic password authentication scheme using the Passcell-based virtual scroll wheel, Int. J. Comput. Math. 90 (12) (2013), pp. 2530–2540.
  • W.-C. Yau, R.C.-W. Phan, S.-H. Heng, and B.-M. Goi, Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester, Int. J. Comput. Math. 90 (12) (2013), pp. 2581–2587.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.