To search, Click below search items.
All Published Papers Search Service
Title
A Novel Watermark Algorithm for Integrity Protection of XML Documents
Author
Ronghua Yao, Qijun Zhao, Hongtao Lu
Vol. 6 No. 2 pp. 202~207
Keywords
Extensible Markup Language (XML), Integrity Protection, Watermark, Signature, Principal Component Analysis (PCA)
Combining Multiple Techniques for Intrusion Detection
Vol. 6 No. 2 pp. 208~218
intrusion detection system, combined detection model, fusion method.
Analyzing Impacts of Software Diversity on Worm Propagation in Peer-to-Peer Networks
Ying Zhou, Zhong-fu Wu, Feng Li, Hao Wang, Zheng-zhou Zhu
Vol. 6 No. 2 pp. 219~225
Peer-to-Peer Network, Peer-to-Peer Worm, Software Diversity, Worm Propagation.
Methodology of Secure and Efficient Source Authentication Protocol for Multicast Data Streams
Sanghoon Jeon, Jeonghoon Jeon, Moonseog Jun
Vol. 6 No. 2 pp. 226~232
Multicast, Source Authentication, Streaming Data security.