To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10576

Title

SWAN: A Secured Watchdog for Ad hoc Networks

Author

Xiaoyun Xue, Jean Leneutre, Lin Chen, Jalel Ben-Othman

Citation

Vol. 6  No. 6  pp. 209-218

Keywords

Ad hoc networks, watchdog, broadcast message authentication, reputation system


Title

PEPSI (Privacy-Enhanced Permanent Subject Identifier) Embedded in X.509 Certificate

Author

Jaeil Lee, JongWook Park, Seungjoo Kim, JooSeok Song

Citation

Vol. 6  No. 6  pp. 204-208

Keywords

PKI, X.509, Certificate, CA, User authentication, Privacy


Title

Correlating Intrusion Alerts into Attack Scenarios based on Improved Evolving Self-Organizing Maps

Author

Yun Xiao, Chongzhao Han

Citation

Vol. 6  No. 6  pp. 199-203

Keywords

Intrusion alert, correlation, attack scenarios, improved evolving self-organizing map


Title

The simple information security audit process: SISAP

Author

Bel G. Raggad, Emilio Collar

Citation

Vol. 6  No. 6  pp. 189-198

Keywords

Security audit, vulnerability assessment, threats, ISO 17799, nominal audit, risk assessment


[1] ... [prev] [2561] [2562] [2563] [2564] [2565] [2566] [2567] [2568] [2569] [2570] [next] ... [2644]