Subscribe Now Subscribe Today
Science Alert Home Journals at Science Alert For Authors For Subscribers Contact Us
 
FOLLOW US:     Facebook    Twitter
   
 
    Publisher: Academic Journals Inc., USA
   
  Research Journal of Information Technology is positioned to publish high quality research papers that reflect global information technology advances. Scope of the journal includes: Strategy, change, infrastructure, human resources, sourcing, system development and implementation, communications, technology developments, technology futures, national policies and standards.

Research Journal of Information Technology now accepting new submissions. Submit your best paper via online submission system.
  Editor-in-Chief:  David Chek Ling Ngo
 
 
He, D., J. Chen and J. Hu, 2010. A random number generator based on NTRU cryptosystem. Maejo Int. J. Sci. Technol., 4: 428-434.
Direct Link  |  
He, D., J. Chen and J. Hu, 2010. Cryptanalysis of simple three-party key exchange protocol. Informatic, 34: 337-339.
He, D., J. Chen and J. Hu, 2010. New provably secure authenticated key agreement protocol without bilinear pairings. J. Inform. Comput. Sci., 7: 1089-1096.
He, D., J. Chen and J. Hu, 2010. Weakness of a remote user password authentication scheme using smart card. Int. J. Network Secur., 12: 175-177.
He, D., J. Chen and J. Hu, 2011. A pairing-free certificateless authenticated key agreement protocol. Int. J. Commun. Syst., (In press) 10.1002/dac.1265.
CrossRef  |  
He, D., J. Chen and J. Hu, 2011. An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Inform. Fusion, (In press), 10.1016/j.inffus.2011.01.001.
CrossRef  |  
He, D., J. Chen and J. Hu, 2011. An ID-based proxy signature schemes without bilinear pairings. Ann. Telecommun., (In press), 10.1007/s12243-011-0244-0.
CrossRef  |  
He, D., J. Chen and J. Hu, 2011. An authentication key agreement protocol using isogenies between elliptic curves. Int. J. Comput. Commun. Control., 6: 258-265.
Direct Link  |  
He, D., J. Chen and R. Zhang, 2010. Weakness of a dynamic ID-based remote user authtication scheme. Int. J. Electron. Secur. Digital Forensics, 3: 355-362.
He, D., J. Chen and R. Zhang, 2011. A more secure authentication scheme for telecare medicine information systems. J. Med. Syst., (In press), 10.1007/s10916-011-9658-5.
CrossRef  |  PubMed  |  
He, D., J. Chen and R. Zhang, 2011. An efficient and provably-secure certificateless signature scheme. Int. J. Commun. Syst., (In press), 10.1002/dac.1330.
CrossRef  |  
He, D., J. Chen and R. Zhang, 2011. An efficient identity-based blind signature scheme without bilinear pairings. Comput. Electr. Eng., 37: 444-450.
He, D., Y. Chen, J. Chen, R. Zhang and W. Han, 2011. A new two-round certificateless authenticated key agreement protocol withour bilinear pairings. Math. Comput. Modell., 54: 3143-3152.
Direct Link  |  

 
 
 
 
 
 
 
 
 

 
 
 
 
 
 

                 home       |       journals        |       for authors       |       for subscribers       |       asci
          © Science Alert. All Rights Reserved