To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10576

Title

Sharing secret images by using base-transform and small-size host images

Author

Chih Ching Thien, Wen-Pinn Fang, Ja Chen Lin

Citation

Vol. 6  No. 6  pp. 219-225

Keywords

base-transform, sharing, hiding, stego images


Title

Analyzing Network Security using Malefactor Action Graphs

Author

Igor Kotenko, Mikhail Stepashkin

Citation

Vol. 6  No. 6  pp. 226-235

Keywords

Vulnerability Assessment, Risk Assessment, Security Metrics, Network attacks, Management of Computing Security


Title

Worm Poisoning Technology and Application

Author

Bing Wu, Xiaochun Yun, Xiang Cui

Citation

Vol. 6  No. 6  pp. 236-244

Keywords

Poisoning, PoisonWorm, SIPR, Detection, DHT, P2P


Title

Study on Dynamic Key Management of Clustered Sensor Networks

Author

Huanzhao Wang, Dongwei Luo, Feifei Chen, Zengzhi Li

Citation

Vol. 6  No. 6  pp. 245-252

Keywords

Sensor networks, dynamic key management, key-pool, clustered sensor networks, key exchange


[1] ... [prev] [81] [82] [83] [84] [85] [86] [87] [88] [89] [90] [next] ... [2644]