To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10576

Title

Using Elliptic Curves on RFID Tags

Author

Michael Braun, Erwin Hess, Bernd Meyer

Citation

Vol. 8  No. 2  pp. 1-9

Keywords

RFID, Authentication, Elliptic Curve Cryptography, Privacy


Title

An Optimal Sensor Architecture for Wi-Fi Intrusion Detection

Author

Zhiqi Tao, Baikunth Nath, Andrew Lonie

Citation

Vol. 8  No. 2  pp. 10-19

Keywords

Wi-Fi network security, IEEE 802.11 network, Network Monitoring, intrusion detection, clustering


Title

New Hash Function Based on Chaos Theory (CHA-1)

Author

Mahmoud Maqableh, Azman Bin Samsudin, Mohammad A. Alia

Citation

Vol. 8  No. 2  pp. 20-26

Keywords

Hash Functions, SHA-1, Chaos Theory, Logistic Map and Collision Search Attacks


Title

Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms

Author

Y.Dhanalakshmi, I. Ramesh Babu

Citation

Vol. 8  No. 2  pp. 27-32

Keywords

Data Mining algorithms, Apriori, Fuzzy logic, Genetic algorithms


[1] ... [prev] [301] [302] [303] [304] [305] [306] [307] [308] [309] [310] [next] ... [2644]