Sciweavers

83 search results - page 14 / 17
» ijnsec 2008
Sort
View
IJNSEC
2008
117views more  IJNSEC 2008»
13 years 6 months ago
Wavelet-based Real Time Detection of Network Traffic Anomalies
Real time network monitoring for intrusions is offered by various host and network based intrusion detection systems. These systems largely use signature or pattern matching techni...
Chin-Tser Huang, Sachin Thareja, Yong-June Shin
IJNSEC
2008
190views more  IJNSEC 2008»
13 years 6 months ago
Probabilistic Analysis and Verification of the ASW Protocol using PRISM
The ASW protocol is one of the prominent optimistic fair exchange protocols that is used for contract signing between two participants, the originator and the responder, with the ...
Salekul Islam, Mohammad Abu Zaid
IJNSEC
2008
109views more  IJNSEC 2008»
13 years 6 months ago
A Multi-band Wavelet Watermarking Scheme
This paper presents a new multi-band wavelet watermarking scheme. Compared with conventional watermarking schemes implemented in two-band wavelet domain, by incorporating the prin...
Xiangui Kang, Wenjun Zeng, Jiwu Huang
IJNSEC
2008
120views more  IJNSEC 2008»
13 years 6 months ago
Formal Specification and Verification of a Secure Micropayment Protocol
As online businesses keep growing and Web services become pervasive, there is an increasing demand for micropayment protocols that facilitate microcommerce, namely selling content...
Mohamed G. Gouda, Alex X. Liu
IJNSEC
2008
78views more  IJNSEC 2008»
13 years 6 months ago
Fault Tolerant Weighted Voting Algorithms
Agreement algorithms can be categorized in different ways. One categorization of such algorithms is based on whether the final decisions are exact or inexact. In inexact algorithm...
Azad H. Azadmanesh, Alireza Farahani, Lotfi Najjar