Sciweavers

117 search results - page 19 / 24
» csreasam 2007
Sort
View
CSREASAM
2006
14 years 9 days ago
Gibraltar: A Mobile Host-Based Intrusion Protection System
Although mobile devices are globally omnipresent, security developments for these devices have not kept pace with their technological advancements. Thus, mobile devices are increa...
Grant A. Jacoby, Thadeus Hickman, Stuart Warders, ...
CSREASAM
2006
14 years 9 days ago
A Study on DRM System for On/Off Line Key Authentication
- This paper proposes a Hash Chain algorithm to create a key safer than the existing encryption method, and suggests an encryption method of higher security than the existing syste...
Kun-Won Jang, Chan-Kil Park, Jung-Jae Kim, Moon-Se...
CSREASAM
2006
14 years 9 days ago
Application of Gaussian Estimation for Devising Reliable Vulnerability Assessment on SIP-based VoIP Infrastructure
The Session Initiation Protocol (SIP) is an application-layer protocol commonly used in VoIP for communication over the Internet. In this paper we describe a method to assess a pa...
Mohammad Chowdhury, Bon Sy, Rasheed Ahmad
CSREASAM
2006
14 years 9 days ago
Security Requirements for Multimodal Biometric Systems
Biometrics systems are automated systems that recognize a person based on physical or behavioral characteristics. There are a number of primary biometric disciplines including fin...
Kevin Daimi, Katherine Snyder
CSREASAM
2006
14 years 9 days ago
Using Aspects and Compilation Techniques to Dynamically Manage Applications
- The emergence of middleware solutions and new services even on small devices will need adapted distributed management solutions which address these specificities, both in terms o...
Bernard Kaddour, Joël Quinqueton