Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 1 - 6 of 6.

Add to Quick Collection   All 6 Results

  • First
  • Previous
  • 1
  • Next
  • Last
Sort:
 Add All Items to Quick Collection
Date: 2015
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/353023
Description: In 1984, Bennett and Brassard designed the first quantum key distribution protocol, whose security is based on quantum indeterminacy. Since then, there has been growing research activities, aiming in ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1048821
Description: Radio frequency identification (RFID) authentication is an indispensable part of RFID applications, which allows a reader to identify objects in an authenticated manner. Recently, Liao and Hsiao propo ... More
Reviewed: Reviewed
Date: 2013
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/221683
Description: The empowerment in wireless communication technologies and sensors have developed the Wireless Body Area Network (WBAN). In the past few years, many researchers have been focusing on building system a ... More
Reviewed: Reviewed
Date: 2006
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/102694
Description: Next-generation identity verification systems will require the ability to integrate with numerous distributed applications and services during the authentication process. This paper describes the arch ... More
Reviewed: Reviewed
Date: 2005
Language: chi
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/135739
Description: This paper presents a new way to design VoIP application on mobile Ad Hoc network, which can correctly solve the problem of variable IP addresses in MANET and allows the nodes to communicate with each ... More
Reviewed: Reviewed
Date: 2003
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/9994
Description: A parallel authentication and public-key encryption is introduced and exemplified on joint encryption and signing which compares favorably with sequential Encrypt-then-Sign (ɛtS) or Sign-then-Encrypt ... More
Reviewed: Reviewed
  • First
  • Previous
  • 1
  • Next
  • Last