Author of the publication

Key Distribution for Pay-TV System with Reduced Computation Cost Using XOR Operation.

, , and . ADCONS, volume 7135 of Lecture Notes in Computer Science, page 478-485. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Key Distribution for Pay-TV System with Reduced Computation Cost Using XOR Operation., , and . ADCONS, volume 7135 of Lecture Notes in Computer Science, page 478-485. Springer, (2011)MutatedSocioAgentSim (MSAS): semisupervised modelling of multiagent simulation to predict and detect the mutation in a camouflaged social network., and . Turkish J. Electr. Eng. Comput. Sci., 26 (2): 961-973 (2018)Centralized key distribution protocol using the greatest common divisor method., , and . Comput. Math. Appl., 65 (9): 1360-1368 (2013)Energy Efficient XPath Query Processing on Wireless XML Streaming Data., , and . Comput. Informatics, 34 (6): 1289-1308 (2015)SpyNetMiner: An Outlier Analysis to Tag Elites in Clandestine Social Networks., , and . IJDWM, 10 (1): 32-54 (2014)IBeH: Naïve Community Detection Methodology for Dark Social Network., and . ICIA, page 111:1-111:4. ACM, (2016)Stochastic model: reCAPTCHA controller based co-variance matrix analysis on frequency distribution using trust evaluation and re-eval by Aumann agreement theorem against DDoS attack in MANET., and . Clust. Comput., 18 (4): 1549-1559 (2015)A Firegroup Mechanism to Provide Intrusion Detection and Prevention System Against DDos Attack in Collaborative Clustered Networks., and . Int. J. Inf. Secur. Priv., 8 (2): 1-18 (2014)Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication., , , and . KSII Trans. Internet Inf. Syst., 7 (4): 878-894 (2013)A Novel Framework for DDoS Attacks Detection Using Hybrid LSTM Techniques., , and . Comput. Syst. Sci. Eng., 45 (3): 2553-2567 (2023)