To search, Click below search items.
All Published Papers Search Service
Title
Methodology of Secure and Efficient Source Authentication Protocol for Multicast Data Streams
Author
Sanghoon Jeon, Jeonghoon Jeon, Moonseog Jun
Vol. 6 No. 2 pp. 226~232
Keywords
Multicast, Source Authentication, Streaming Data security.
Analyzing Impacts of Software Diversity on Worm Propagation in Peer-to-Peer Networks
Ying Zhou, Zhong-fu Wu, Feng Li, Hao Wang, Zheng-zhou Zhu
Vol. 6 No. 2 pp. 219~225
Peer-to-Peer Network, Peer-to-Peer Worm, Software Diversity, Worm Propagation.
Combining Multiple Techniques for Intrusion Detection
Ronghua Yao, Qijun Zhao, Hongtao Lu
Vol. 6 No. 2 pp. 208~218
intrusion detection system, combined detection model, fusion method.
A Novel Watermark Algorithm for Integrity Protection of XML Documents
Vol. 6 No. 2 pp. 202~207
Extensible Markup Language (XML), Integrity Protection, Watermark, Signature, Principal Component Analysis (PCA)