Sciweavers

75 search results - page 4 / 15
» csreasam 2006
Sort
View
CSREASAM
2006
13 years 9 months ago
Firewall Rules Analysis
- In this paper, we propose a method to analyze the firewall policy or rule-set using Relational Algebra and Raining 2D-Box Model. It can discover all the anomalies in the firewall...
Thawatchai Chomsiri, Chotipat Pornavalai
CSREASAM
2006
13 years 9 months ago
Modelling to Enhance GSM Network Security
With the rapid development in global communication networks, the threat of security and in particular that of cellular telecommunication system is real and highly dangerous. Mobil...
Johnnes Arreymbi
CSREASAM
2006
13 years 9 months ago
Case Study: An Implementation of a Secure Steganographic System
- In this paper, we present the development of a Windows-based application implemented on the Microsoft .NET platform as a framework to allow a user to first compress and encrypt a...
Xuan-Hien Dang, Krishna C. S. Kota
CSREASAM
2006
13 years 9 months ago
Do No Harm: The Use of RFID Tags in a Medical Environment
- With the increasing usage of RFID systems and their potential in a range of common applications especially medical related fields, it is important to investigate the weaknesses o...
Christopher Bolan
CSREASAM
2006
13 years 9 months ago
A New Approach For Source Authentication Of Multicast Data
Multicast Security is one of the important problems to solve for the successful deployment of group communication applications, and source authentication of multicast data is a key...
Jinxin He, Gaochao Xu, Zhiguo Zhou, Guannan Gong