To search, Click below search items.
All Published Papers Search Service
Title
Sharing secret images by using base-transform and small-size host images
Author
Chih Ching Thien, Wen-Pinn Fang, Ja Chen Lin
Vol. 6 No. 6 pp. 219-225
Keywords
base-transform, sharing, hiding, stego images
SWAN: A Secured Watchdog for Ad hoc Networks
Xiaoyun Xue, Jean Leneutre, Lin Chen, Jalel Ben-Othman
Vol. 6 No. 6 pp. 209-218
Ad hoc networks, watchdog, broadcast message authentication, reputation system
PEPSI (Privacy-Enhanced Permanent Subject Identifier) Embedded in X.509 Certificate
Jaeil Lee, JongWook Park, Seungjoo Kim, JooSeok Song
Vol. 6 No. 6 pp. 204-208
PKI, X.509, Certificate, CA, User authentication, Privacy
Correlating Intrusion Alerts into Attack Scenarios based on Improved Evolving Self-Organizing Maps
Yun Xiao, Chongzhao Han
Vol. 6 No. 6 pp. 199-203
Intrusion alert, correlation, attack scenarios, improved evolving self-organizing map