Sciweavers

2081 search results - page 299 / 417
» Chaotic Systems Synchronization in Secure Communication Syst...
Sort
View
ACSAC
2001
IEEE
13 years 11 months ago
Implementing the Intrusion Detection Exchange Protocol
We describe the goals of the IETF's Intrusion Detection Working Group (IDWG) and the requirements for a transport protocol to communicate among intrusion detection systems. W...
Tim Buchheim, Michael Erlinger, Ben Feinstein, Gre...
ACSAC
2001
IEEE
13 years 11 months ago
The Authorization Service of Tivoli Policy Director
This paper presents the Authorization Service provided by Tivoli Policy Director (PD) and its use by PD family members as well as third-party applications. Policies are defined ov...
Günter Karjoth
IVC
2008
93views more  IVC 2008»
13 years 8 months ago
A blind source separation-based method for multiple images encryption
Blind source separation (BSS) has been successfully applied to many fields such as communications and biomedical engineering. Its application for image encryption, however, remain...
Qiu-Hua Lin, Fuliang Yin, Tiemin Mei, Hualou Liang
ISI
2006
Springer
13 years 8 months ago
DrillSim: A Simulation Framework for Emergency Response Drills
Responding to natural or man-made disasters in a timely and effective manner can reduce deaths and injuries, contain or prevent secondary disasters, and reduce the resulting econom...
Vidhya Balasubramanian, Daniel Massaguer, Sharad M...
ICDCSW
2005
IEEE
14 years 1 months ago
Integrating Databases with Publish/Subscribe
Publish/subscribe is emerging as an appropriate communication paradigm for large-scale, widely-distributed systems. In this paper, we describe our work on integrating active datab...
Luis Vargas, Jean Bacon, Ken Moody