3 Questions 9 Answers 0 Followers
Questions related from Mohamed Amine Ferrag
Traditional searchable encryption has been widely studied in the context of cryptography. Could anyone present some information, survey about the public key encryption with keyword search applied...
10 October 2014 7,126 7 View
We have proposed security schemes that use asymmetric ciphers / symmetric ciphers for some types of wireless networks. To determine the amount of overhead that a security protocol can introduce in...
10 October 2014 3,394 6 View
Are we running into the next catastrophe with these next-generation networks ? Or can we manage the future security challenges ?
09 September 2014 1,371 2 View