To search, Click below search items.
All Published Papers Search Service
Title
JPEG Quantization-Distribution Steganalytic Method Attacking JSteg
Author
Quan Weiwei, Guo Yanqing, Kong Xiangwei
Vol. 6 No. 7 pp. 192-195
Keywords
DCT, coefficient distribution, JPEG, quantization, steganalysis
A Reliable Peer Connection Scheme for Pure P2P Network Environments
Gu Su Kim, Junghyun Han, Young Ik Eom
Vol. 6 No. 7 pp. 185-191
Input here the part of 4-5 keywords
Robust Quick String Matching Algorithm for Network Security
Jianming Yu, Yibo Xue
Vol. 6 No. 7 pp. 180-184
String matching, network security, algorithmic performance attack
A Dynamic Authentication, Authorization, and Accounting (AAA) Resolution for Hierarchical Mobile IPv6 Network
Jinsuk Baek, Eunjung Lee
Vol. 6 No. 7 pp. 170-179
AAA, MIPv4, MIPv6, HMIPv6