Sciweavers

IEEECIT
2010
IEEE
13 years 7 months ago
Hiding Short Secret Messages based on Linguistic Steganography and Manual Annotation
—This article shows to what extent it is possible to develop a public simple mechanism for hiding information in natural language by means of the use of templates and manual anno...
Alfonso Muñoz Muñoz, Justo Carracedo...
IEEECIT
2010
IEEE
13 years 7 months ago
Enabling Privacy-preserving Credential-based Access Control with XACML and SAML
—In this paper we describe extensions to the access control industry standards XACML and SAML to enable privacy-preserving and credential-based access control. Rather than assumi...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
IEEECIT
2010
IEEE
13 years 7 months ago
Selective and Early Threat Detection in Large Networked Systems
—The complexity of modern networked information systems, as well as all the defense-in-depth best practices, require distributed intrusion detection architectures relying on the ...
Michele Colajanni, Mirco Marchetti, Michele Messor...
IEEECIT
2010
IEEE
13 years 7 months ago
xFace: A Lightweight Web Application Engine on Multiple Mobile Platforms
With the vigorous development of the Internet, web applications have been widely used on the PC (Personal Computer) platforms. The maturity of the hardware and software platforms ...
Fan Jiang, Zhigang Feng, Lei Luo
IEEECIT
2010
IEEE
13 years 7 months ago
An Innovative Course about Network Storage and System Virtualization Technologies in PKU
—“Network Storage and System Virtualization Technologies” is an up-to-date course opened by the school of electronics engineering and computer science of Peking University. T...
Xiaolin Wang, Xinxin Jin, Yingwei Luo, Zhenlin Wan...
IEEECIT
2010
IEEE
13 years 7 months ago
Porting Mobile Web Application Engine to the Android Platform
Android which Google released as an open-source mobile phone operating system is a Linux-based platform; it consists of the operating system, middleware, and user interface and ap...
Yonghong Wu, Jianchao Luo, Lei Luo
IEEECIT
2010
IEEE
13 years 7 months ago
Tessellating Cell Shapes for Geographical Clustering
This paper investigates the energy-saving organization of sensor nodes in large wireless sensor networks. Due to a random deployment used in many application scenarios, much more n...
Jakob Salzmann, Ralf Behnke, Dirk Timmermann
IEEECIT
2010
IEEE
13 years 7 months ago
Virtual Security Kernel: A Component-Based OS Architecture for Self-Protection
—This paper presents VSK, a lightweight adaptable OS authorization architecture suitable for self-protection of pervasive devices. A “virtual” management plane, separate from...
Ruan He, Marc Lacoste, Jean Leneutre
IEEECIT
2010
IEEE
13 years 7 months ago
An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures
Abstract—In Wireless Sensor Networks (WSNs), authentication is a crucial security requirement to avoid attacks against secure communication, and to mitigate DoS attacks exploitin...
Rehana Yasmin, Eike Ritter, Guilin Wang