To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10750

Title

Analyzing Network Security using Malefactor Action Graphs

Author

Igor Kotenko, Mikhail Stepashkin

Citation

Vol. 6  No. 6  pp. 226-235

Keywords

Vulnerability Assessment, Risk Assessment, Security Metrics, Network attacks, Management of Computing Security


Title

Sharing secret images by using base-transform and small-size host images

Author

Chih Ching Thien, Wen-Pinn Fang, Ja Chen Lin

Citation

Vol. 6  No. 6  pp. 219-225

Keywords

base-transform, sharing, hiding, stego images


Title

SWAN: A Secured Watchdog for Ad hoc Networks

Author

Xiaoyun Xue, Jean Leneutre, Lin Chen, Jalel Ben-Othman

Citation

Vol. 6  No. 6  pp. 209-218

Keywords

Ad hoc networks, watchdog, broadcast message authentication, reputation system


Title

PEPSI (Privacy-Enhanced Permanent Subject Identifier) Embedded in X.509 Certificate

Author

Jaeil Lee, JongWook Park, Seungjoo Kim, JooSeok Song

Citation

Vol. 6  No. 6  pp. 204-208

Keywords

PKI, X.509, Certificate, CA, User authentication, Privacy


[1] ... [prev] [2601] [2602] [2603] [2604] [2605] [2606] [2607] [2608] [2609] [2610] [next] ... [2688]