Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,781,572 papers from all fields of science
Search
Sign In
Create Free Account
Security parameter
In cryptography, the security parameter is a variable that measures the input size of the computational problem. Both the resource requirements of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
Adversary (cryptography)
Algorithm
Computational indistinguishability
Computational problem
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
A Method to Detect SMTP Flood Attacks using FlowIDS Framework
Mohd Zafran
,
Abdul Aziz
,
K. Okamura
2017
Corpus ID: 212600818
Summary This publication presents a framework to detect SMTP Flood attacks on SDN-based platforms such as ONOS. We have revisited…
Expand
2015
2015
Model To Prevent Websites From XSS Vulnerabilities
Tejinder Singh Mehta
,
S. Jamwal
2015
Corpus ID: 14586488
As social websites get more and more users across internet, Cross Site Scripting is becoming one of the major problems, which…
Expand
2014
2014
Intrusion Detection, Secure Protocol & Network Creation for Spontaneous Wireless AD HOC Network
Nikhil Varghane
,
Prof. Bhakti Kurade
,
Prof. Chandradas Pote
2014
Corpus ID: 212611924
— Fundamental aspect in wireless network creation & wireless communication is use of security so this paper proposing a secure…
Expand
2013
2013
Wide area measurement based security assessment & monitoring of modern power system: A danish power system case study
Z. Rather
,
Zhe Chen
,
P. Thogersen
IEEE Innovative Smart Grid Technologies-Asia
2013
Corpus ID: 9557455
Power System security has become a major concern across the global power system community. This paper presents wide area…
Expand
2013
2013
A new efficient asymmetric cryptosystem based on the integer factorization problem of N=p2q
M. Ariffin
,
M. Asbullah
,
N. Abu
,
Z. Mahad
2013
Corpus ID: 265095965
In this paper, we introduce a new scheme based on the hardness of factoring integers of the shape ��=�� 2 �� . Our scheme uses a…
Expand
2013
2013
RFID in eHealth: How to Combat Medication Errors and Strengthen Patient Safety
Pedro Peris-López
,
Masoumeh Safkhani
,
N. Bagheri
,
M. Naderi
2013
Corpus ID: 18033117
A medication error is an adverse event or even a miss in the treatment process that may harm a patient. As a consequence of this…
Expand
2012
2012
A New Efficient Asymmetric Cryptosystem Based on the Integer Factorization Problem
M. Ariffin
2012
Corpus ID: 16829106
A new asymmetric cryptosystem based on the Integer Factorization Problem is proposed. It posses an encryption and decryption…
Expand
2008
2008
In-Depth Look at the Host Identity Protocol ( HIP ) : Providing Agile Mobility , Multi-Homing , and Security
Dr. Pekka Nikander
2008
Corpus ID: 31752366
The Host Identity Protocol (HIP) is an experimental architecture and protocol, being developed at the IETF since 1999 and…
Expand
2003
2003
A scalable and unifying architecture for deploying advanced protocols in the Internet
Damien Magoni
10th International Conference on…
2003
Corpus ID: 16765658
Since its inception in the '70s, the Internet has sustained a tremendous growth. The architectural choices made at the birth of…
Expand
1999
1999
Unconditionally secure quantum coin tossing
D. Mayers
,
L. Salvail
,
Yoshie Chiba-Kohno
1999
Corpus ID: 118854318
In coin tossing two remote participants want to share a uniformly distributed random bit. At the least in the quantum version…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE