To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10576

Title

Study on Dynamic Key Management of Clustered Sensor Networks

Author

Huanzhao Wang, Dongwei Luo, Feifei Chen, Zengzhi Li

Citation

Vol. 6  No. 6  pp. 245-252

Keywords

Sensor networks, dynamic key management, key-pool, clustered sensor networks, key exchange


Title

Worm Poisoning Technology and Application

Author

Bing Wu, Xiaochun Yun, Xiang Cui

Citation

Vol. 6  No. 6  pp. 236-244

Keywords

Poisoning, PoisonWorm, SIPR, Detection, DHT, P2P


Title

Analyzing Network Security using Malefactor Action Graphs

Author

Igor Kotenko, Mikhail Stepashkin

Citation

Vol. 6  No. 6  pp. 226-235

Keywords

Vulnerability Assessment, Risk Assessment, Security Metrics, Network attacks, Management of Computing Security


Title

Sharing secret images by using base-transform and small-size host images

Author

Chih Ching Thien, Wen-Pinn Fang, Ja Chen Lin

Citation

Vol. 6  No. 6  pp. 219-225

Keywords

base-transform, sharing, hiding, stego images


[1] ... [prev] [2561] [2562] [2563] [2564] [2565] [2566] [2567] [2568] [2569] [2570] [next] ... [2644]