Skip to search formSkip to main contentSkip to account menu

Security parameter

In cryptography, the security parameter is a variable that measures the input size of the computational problem. Both the resource requirements of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Summary This publication presents a framework to detect SMTP Flood attacks on SDN-based platforms such as ONOS. We have revisited… 
2015
2015
As social websites get more and more users across internet, Cross Site Scripting is becoming one of the major problems, which… 
2014
2014
— Fundamental aspect in wireless network creation & wireless communication is use of security so this paper proposing a secure… 
2013
2013
Power System security has become a major concern across the global power system community. This paper presents wide area… 
2013
2013
In this paper, we introduce a new scheme based on the hardness of factoring integers of the shape ��=�� 2 �� . Our scheme uses a… 
2013
2013
A medication error is an adverse event or even a miss in the treatment process that may harm a patient. As a consequence of this… 
2012
2012
A new asymmetric cryptosystem based on the Integer Factorization Problem is proposed. It posses an encryption and decryption… 
2008
2008
The Host Identity Protocol (HIP) is an experimental architecture and protocol, being developed at the IETF since 1999 and… 
2003
2003
  • Damien Magoni
  • 2003
  • Corpus ID: 16765658
Since its inception in the '70s, the Internet has sustained a tremendous growth. The architectural choices made at the birth of… 
1999
1999
In coin tossing two remote participants want to share a uniformly distributed random bit. At the least in the quantum version…