Digital Library
Vol. 2, No. 6, December 24, 2008
[Regular Papers]
Others
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Shape-based image retrieval
- Dynamic time warping
- sequence matching
- rotation invariance
- K-NN
- range search
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- cryptography
- provably security
- Key Exchange
- three-party setting
- Dictionary attacks
- undetectable dictionary attacks
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Transport control protocol (TCP)
- Congestion Control
- congestion
- wireless link bit error rate (BER)
- retransmission timeout (RTO)
- TCP New Jersey
Archives