Sciweavers

CANS
2005
Springer
86views Cryptology» more  CANS 2005»
14 years 6 months ago
Distributed Credential Chain Discovery in Trust-Management with Parameterized Roles
Xian Zhu, Shaobin Wang, Fan Hong, Junguo Liao
CANS
2005
Springer
120views Cryptology» more  CANS 2005»
14 years 6 months ago
The Second-Preimage Attack on MD4
In Eurocrypt’05, Wang et al. presented new techniques to find collisions of Hash function MD4. The techniques are not only efficient to search for collisions, but also applicabl...
Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang
CANS
2005
Springer
105views Cryptology» more  CANS 2005»
14 years 6 months ago
A Novel Method to Maintain Privacy in Mobile Agent Applications
Abstract. Two methods to implement privacy in network communication, anonymity and DCSC (data confidentiality and secure computation) are analysed and compared in regard to privac...
Kun Peng, Ed Dawson, Juanma González Nieto,...
CANS
2005
Springer
134views Cryptology» more  CANS 2005»
14 years 6 months ago
A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time
Abstract. In this paper, we propose a new unsupervised anomaly detection framework for detecting network intrusions online. The framework consists of new anomalousness metrics name...
Wei Lu, Issa Traoré
CANS
2005
Springer
120views Cryptology» more  CANS 2005»
14 years 6 months ago
A New Model for Dynamic Intrusion Detection
Building on the concepts and the formal definitions of self, nonself, antigen, and detector introduced in the research of network intrusion detection, the dynamic evolution models...
Tao Li, XiaoJie Liu, Hongbin Li
CANS
2005
Springer
86views Cryptology» more  CANS 2005»
14 years 6 months ago
On the Performance and Analysis of DNS Security Extensions
The Domain Name System (DNS) is an essential component of the critical infrastructure of the Internet. The role of DNS is vital, as it is involved in virtually every Internet tran...
Reza Curtmola, Aniello Del Sorbo, Giuseppe Atenies...