Volume 3 Number 2 June 2012

    
IT Architecture from the Service Continuity Perspective: Application of Well-Founded Ontology in Corporate Environments

Hedwio Carvalho e Silva1,2, Rita de Cassia C. de Castro, Marcos Jose Negreiros Gomes,Anilton Salles Garcia

https://doi.org/

Abstract This paper presents an application of data center IT architecture ontology model for corporate environments. The article is based PAS77 in order to get a service continuity view and uses Unified Foundation Ontology (UFO) to produce a well-founded ontology. It is built using the Conceptual Model Language OntoUML with the objective of preserving the ontologic prerogatives defined in the UFO.... Read More


Schnorr Digital Signature in Signcryption Scheme

Laura Savu

https://doi.org/

Abstract This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have implemented the algorithm in a program and here are provided the steps of the algorithm, the results and some examples. The paper also contains the presentation of the original Signcryption scheme, based... Read More


High Complexity with Steganography in LSB and MSB

Salam R. Mahdi , Yahia Najar, Mahmood Shaar

https://doi.org/

Abstract Steganography is a modern, yet ancient, method of secret storage and access of communication, in contrast to cryptography, where the “enemy” is permitted to detect, intercept and modify messages without being able to violate certain security premises protected by the cryptosystem. Steganography is an art and a science. in our previous research, we showed that we had been able to... Read More


Natural Heuristics for Cryptanalysis

T. Mekhaznia

https://doi.org/

Abstract Natural Metaheuristics have been widely used to solve difficult optimization problems. This is mainly due to their ability to converge in reasonable time. However, they remain inefficient where handling large instances. Current research tends to improve these techniques in order to produce hybrid algorithms able to solve these problems. The encryption information has long been a challenge for cryptanalysis. It... Read More


Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks

Asma Ben Hassouna, Hend Koubaa, Farouk Kamoun

https://doi.org/

Abstract broadcast nature of wireless medium makes multicast communication subject to various challenges, especially, the unreliability due to the interference [2] and the impact of the transmission data rate choice on the conflicts between communicating users. In fact, a fundamental trade-off exists between communication speed (transmission data rate) and communication range. Actually, the effect of interference is more important when the... Read More