To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10576

Title

Methodology of Secure and Efficient Source Authentication Protocol for Multicast Data Streams

Author

Sanghoon Jeon, Jeonghoon Jeon, Moonseog Jun

Citation

Vol. 6  No. 2  pp. 226~232

Keywords

Multicast, Source Authentication, Streaming Data security.


Title

Analyzing Impacts of Software Diversity on Worm Propagation in Peer-to-Peer Networks

Author

Ying Zhou, Zhong-fu Wu, Feng Li, Hao Wang, Zheng-zhou Zhu

Citation

Vol. 6  No. 2  pp. 219~225

Keywords

Peer-to-Peer Network, Peer-to-Peer Worm, Software Diversity, Worm Propagation.


Title

Combining Multiple Techniques for Intrusion Detection

Author

Ronghua Yao, Qijun Zhao, Hongtao Lu

Citation

Vol. 6  No. 2  pp. 208~218

Keywords

intrusion detection system, combined detection model, fusion method.


Title

A Novel Watermark Algorithm for Integrity Protection of XML Documents

Author

Ronghua Yao, Qijun Zhao, Hongtao Lu

Citation

Vol. 6  No. 2  pp. 202~207

Keywords

Extensible Markup Language (XML), Integrity Protection, Watermark, Signature, Principal Component Analysis (PCA)


[1] ... [prev] [2611] [2612] [2613] [2614] [2615] [2616] [2617] [2618] [2619] [2620] [next] ... [2644]