To search, Click below search items.
All Published Papers Search Service
Title
Sharing secret images by using base-transform and small-size host images
Author
Chih Ching Thien, Wen-Pinn Fang, Ja Chen Lin
Vol. 6 No. 6 pp. 219-225
Keywords
base-transform, sharing, hiding, stego images
Analyzing Network Security using Malefactor Action Graphs
Igor Kotenko, Mikhail Stepashkin
Vol. 6 No. 6 pp. 226-235
Vulnerability Assessment, Risk Assessment, Security Metrics, Network attacks, Management of Computing Security
Worm Poisoning Technology and Application
Bing Wu, Xiaochun Yun, Xiang Cui
Vol. 6 No. 6 pp. 236-244
Poisoning, PoisonWorm, SIPR, Detection, DHT, P2P
Study on Dynamic Key Management of Clustered Sensor Networks
Huanzhao Wang, Dongwei Luo, Feifei Chen, Zengzhi Li
Vol. 6 No. 6 pp. 245-252
Sensor networks, dynamic key management, key-pool, clustered sensor networks, key exchange