scinapse is loading now...
  • References (2)
  • Citations (177)
Published on Jan 1, 2012
Pierre L'Ecuyer51
Estimated H-index: 51
(Université de Montréal)
The fields of probability and statistics are built over the abstract concepts of probability space and random variable. This has given rise to elegant and powerful mathematical theory, but exact implementation of these concepts on conventional computers seems impossible. In practice, random variables and other random objects are simulated by deterministic algorithms. The purpose of these algorithms is to produce sequences of numbers or objects whose behavior is very hard to distinguish from that...
272 Citations Source Cite
Published on Jan 1, 1996
Alfred Menezes44
Estimated H-index: 44
Scott A. Vanstone14
Estimated H-index: 14
(University of Waterloo),
Paul C. van Oorschot33
Estimated H-index: 33
From the Publisher: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols; more than 200 tables and figures; more than 1,000 numbered definitions, facts, examples, notes, and remarks; and over 1,250 significant references, including brief comments on each paper.
10.6k Citations
Cited By177
Published on May 1, 2019in Wireless Personal Communications 1.20
Geir M. Køien10
Estimated H-index: 10
(University of Agder)
In the paper “Why Cryptosystems Fail”, Ross Anderson ponders the question about why cryptosystems really fail. Obviously, there may be weak crypto-algorithms, too short key lengths and flawed crypto-protocols. However, these were not the main reason why cryptosystems failed. Anderson discovered that the problem had more to do with misplaced trust and misconceptions of the threats the systems faced. Now, more than 25 years later, it seems prudent to revisit the question of why cryptosystems fail....
Source Cite
Published on Oct 1, 2016
Manpreet Kaur2
Estimated H-index: 2
Simarpreet Kaur1
Estimated H-index: 1
(Chandigarh University),
Kamaljit Singh Saini2
Estimated H-index: 2
(Chandigarh University)
In today's world abundant data travelled from node to node or from cluster head to node or vice versa in a Wireless Sensor Network (WSN). This data can be of any type but it must consists the identity of that particular node where this data actually exist. The identity of that particular node is also as much important as the data. Due to this, there can be some security issues because if the identity of that particular node leaked out then any fake node can act as the original one and data will ...
Source Cite
Sunghyuck Hong2
Estimated H-index: 2
(Baekseok University)
According to parallel computing technology, Cloud service is popular, and it is easy to use Cloud service at everywhere. Cloud means involving application systems that are executed within the cloud and operated via the internet enabled devices. Cloud computing does not rely on the use of cloud storage as it will be removed upon users download action. Clouds can be classified as public, private and hybrid. Cloud service comes up with Ubiquitous; Cloud service users can use their service at anywhe...
2 Citations Source Cite
Published on Aug 1, 2016
E. Venkat Reddy (Bundelkhand Institute of Engineering & Technology), K. Srinivasa Rao
This paper presents an integrated approach to resource utilization and security concern for wireless communication. In wireless communication, during the exchange of data, allocated spectrum and its utilization over a wireless channel plays an important role in providing efficient communication service in such network. In the need towards optimal resource utilization in wireless communication, a spectrum sensing and its utilization to higher resource optimization is suggested. The proposed commu...
Source Cite
Published on Jun 1, 2016
Abhishek Pandey (Indian Institute of Information Technology, Allahabad), Pawan Kumar Pant (Indian Institute of Information Technology, Allahabad), R. C. Tripathi (Indian Institute of Information Technology, Allahabad)
Wireless local area networks (WLANs) are widely used in airports, enterprises, schools, shops etc. Now a day, WLANs are growing very fast in aforesaid sectors and others. In their, security (specially authentication) is a vital issue because of the wireless medium being available to everybody in open space. The users of wireless network today aspire to have a tight security and good performance equivalent to those of the wired networks. As such, we have many authentication procedure for WLAN lik...
Source Cite
Published on Jan 1, 2014
Hamid M Salim1
Estimated H-index: 1
If we are to manage security risks more effectively in today’s complex and dynamic cyber environment, then a new way of thinking is needed to complement traditional approaches. According to Symantec’s 2014 Internet Security Threat Report, in 2012 more than ten million identities that included real names, dates of birth, and social security were exposed by a single breach. In 2013 there were eight breaches that each exposed over ten million identities. These breaches were recorded despite the fac...
5 Citations
Published on Sep 23, 2013
John R. Vacca1
Estimated H-index: 1
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wi...
2 Citations
Published on Sep 1, 2013
Finn Kuusisto1
Estimated H-index: 1
4 Citations Source Cite