To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10849

Title

Sharing secret images by using base-transform and small-size host images

Author

Chih Ching Thien, Wen-Pinn Fang, Ja Chen Lin

Citation

Vol. 6  No. 6  pp. 219-225

Keywords

base-transform, sharing, hiding, stego images


Title

SWAN: A Secured Watchdog for Ad hoc Networks

Author

Xiaoyun Xue, Jean Leneutre, Lin Chen, Jalel Ben-Othman

Citation

Vol. 6  No. 6  pp. 209-218

Keywords

Ad hoc networks, watchdog, broadcast message authentication, reputation system


Title

PEPSI (Privacy-Enhanced Permanent Subject Identifier) Embedded in X.509 Certificate

Author

Jaeil Lee, JongWook Park, Seungjoo Kim, JooSeok Song

Citation

Vol. 6  No. 6  pp. 204-208

Keywords

PKI, X.509, Certificate, CA, User authentication, Privacy


Title

Correlating Intrusion Alerts into Attack Scenarios based on Improved Evolving Self-Organizing Maps

Author

Yun Xiao, Chongzhao Han

Citation

Vol. 6  No. 6  pp. 199-203

Keywords

Intrusion alert, correlation, attack scenarios, improved evolving self-organizing map


[1] ... [prev] [2621] [2622] [2623] [2624] [2625] [2626] [2627] [2628] [2629] [2630] [next] ... [2713]