To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10893

Title

Sharing secret images by using base-transform and small-size host images

Author

Chih Ching Thien, Wen-Pinn Fang, Ja Chen Lin

Citation

Vol. 6  No. 6  pp. 219-225

Keywords

base-transform, sharing, hiding, stego images


Title

SWAN: A Secured Watchdog for Ad hoc Networks

Author

Xiaoyun Xue, Jean Leneutre, Lin Chen, Jalel Ben-Othman

Citation

Vol. 6  No. 6  pp. 209-218

Keywords

Ad hoc networks, watchdog, broadcast message authentication, reputation system


Title

PEPSI (Privacy-Enhanced Permanent Subject Identifier) Embedded in X.509 Certificate

Author

Jaeil Lee, JongWook Park, Seungjoo Kim, JooSeok Song

Citation

Vol. 6  No. 6  pp. 204-208

Keywords

PKI, X.509, Certificate, CA, User authentication, Privacy


Title

Correlating Intrusion Alerts into Attack Scenarios based on Improved Evolving Self-Organizing Maps

Author

Yun Xiao, Chongzhao Han

Citation

Vol. 6  No. 6  pp. 199-203

Keywords

Intrusion alert, correlation, attack scenarios, improved evolving self-organizing map


[1] ... [prev] [2641] [2642] [2643] [2644] [2645] [2646] [2647] [2648] [2649] [2650] [next] ... [2724]