To search, Click below search items.
All Published Papers Search Service
Title
Analyzing Network Security using Malefactor Action Graphs
Author
Igor Kotenko, Mikhail Stepashkin
Vol. 6 No. 6 pp. 226-235
Keywords
Vulnerability Assessment, Risk Assessment, Security Metrics, Network attacks, Management of Computing Security
Sharing secret images by using base-transform and small-size host images
Chih Ching Thien, Wen-Pinn Fang, Ja Chen Lin
Vol. 6 No. 6 pp. 219-225
base-transform, sharing, hiding, stego images
SWAN: A Secured Watchdog for Ad hoc Networks
Xiaoyun Xue, Jean Leneutre, Lin Chen, Jalel Ben-Othman
Vol. 6 No. 6 pp. 209-218
Ad hoc networks, watchdog, broadcast message authentication, reputation system
PEPSI (Privacy-Enhanced Permanent Subject Identifier) Embedded in X.509 Certificate
Jaeil Lee, JongWook Park, Seungjoo Kim, JooSeok Song
Vol. 6 No. 6 pp. 204-208
PKI, X.509, Certificate, CA, User authentication, Privacy