Sciweavers

2081 search results - page 132 / 417
» Chaotic Systems Synchronization in Secure Communication Syst...
Sort
View
VTC
2006
IEEE
179views Communications» more  VTC 2006»
14 years 2 months ago
Design of a Joint Defense System for Mobile Ad Hoc Networks
— A mobile ad hoc network (MANET) is vulnerable to malicious attacks although it is suitable for various environments because of its rapid establishment. In order to set up a sec...
Huei-Wen Ferng, Chien-Liang Liu
FC
2006
Springer
97views Cryptology» more  FC 2006»
14 years 3 days ago
Privacy-Protecting Coupon System Revisited
Abstract. At FC'05, Chen et al. introduced an elegant privacy protecting coupon (PPC) system, CESSS05 [13], in which users can purchase multi-coupons and redeem them unlinkabl...
Lan Nguyen
ISI
2007
Springer
14 years 2 months ago
Architecture for an Automatic Customized Warning System
Abstract—Public communication during natural and manmade disasters is a key issue that must be addressed to protect lives and properties. The choice of the best protective action...
Mirko Montanari, Sharad Mehrotra, Nalini Venkatasu...
MATA
2004
Springer
189views Communications» more  MATA 2004»
14 years 1 months ago
APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection System
Abstract. Intrusion detection systems are quickly becoming a standard requirement in building a network security infrastructure. Although many established techniques and commercial...
Ken Deeter, Kapil Singh, Steve Wilson, Luca Filipo...
AINA
2007
IEEE
14 years 2 months ago
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System
Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Lifu Wang, Partha Dasgupta