Sciweavers

1779 search results - page 188 / 356
» Secure Communications in ATM Networks
Sort
View
MMSEC
2006
ACM
129views Multimedia» more  MMSEC 2006»
15 years 10 months ago
WLAN steganography: a first practical review
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network are introduced in this paper. First test results on the reliability, undetectab...
Christian Krätzer, Jana Dittmann, Andreas Lan...
ICC
2007
IEEE
15 years 11 months ago
Petrifying Worm Cultures: Scalable Detection and Immunization in Untrusted Environments
— We present and evaluate the design of a new and comprehensive solution for automated worm detection and immunization. The system engages a peer-to-peer network of untrusted mac...
Joel O. Sandin, Bilal Khan
IFIP
2007
Springer
15 years 11 months ago
Insider Threat Analysis Using Information-Centric Modeling
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...
MONET
2010
148views more  MONET 2010»
15 years 3 months ago
REP: Location Privacy for VANETs Using Random Encryption Periods
It is well recognized that security is vital for reliable operation of vehicular ad-hoc networks (VANETs). Location privacy is one of the main security challenges in VANETs, which ...
Albert Wasef, Xuemin (Sherman) Shen
CANS
2008
Springer
126views Cryptology» more  CANS 2008»
15 years 6 months ago
A New Message Recognition Protocol for Ad Hoc Pervasive Networks
We propose a message recognition protocol which is suitable for ad hoc pervasive networks without the use of hash chains. Hence, we no longer require the devices to save values of ...
Atefeh Mashatan, Douglas R. Stinson