Sciweavers

CSREASAM
2006
14 years 28 days ago
TRINETR: Facilitating Alerts Analysis and Response Decision Making
Due to many inherent deficiencies and flaws, current intrusion detection systems (IDS) are plagued by numerous problems. Intrusion Detection Systems are often inefficient and inef...
Jinqiao Yu, Y. V. Ramana Reddy, Sumitra Reddy
CSREASAM
2006
14 years 28 days ago
On Achieving Trustworthy SOA-Based Web Services
This work is inspired by the intend to construct SOABased E-Government. We first emphasize the importance of taking measures for solving security problems facing Web Services, we ...
Jianwu Zheng, Mingsheng Liu, Hui Liu
CSREASAM
2006
14 years 28 days ago
An ID-based Anonymous Proxy Signature From Bilinear Pairings
Zemao Zhao, Xiangxong Tang, Bin Li, Longhai Zhu
CSREASAM
2006
14 years 28 days ago
Comparison of Two Sampling-Based Data Collection Mechanisms for Intrusion Detection System
- Data collection mechanism is a crucial factor for the performance of intrusion detection system (IDS). Simple random sampling and Stratified random sampling techniques of statist...
Kuo Zhao, Liang Hu, Guannan Gong, Meng Zhang, Kexi...
CSREASAM
2006
14 years 28 days ago
Software Vaccine Technique and Its Application in Early Virus
: The paper introduces a new anti-virus idea of Software Vaccine technique. It can apply the security technique inside the software itself. By inserting the software vaccine into t...
Xiaodong Yuan, Dajiong Yue
CSREASAM
2006
14 years 28 days ago
The Value of Hardware-Based Security Solutions and its Architecture for Security Demanding Wireless Services
- In the paper, the generic vulnerability of security software solution is depicted. For selected wireless services such as Device Management, Digital Rights Management and M-Payme...
Rongzhen Yang, Liang He, Shoufeng Yang, Forni Gary...
CSREASAM
2006
14 years 28 days ago
Architectural Framework Design for Authentication Mechanism in Mobile Adhoc Networks (MANETs)
Wireless ad-hoc networks do not rely on a pre-existing network structure and are characterized by dynamic changes in the topology. This characteristic makes it difficult to perform...
Rajasekhar Yakkali, Gregory Vert
CSREASAM
2006
14 years 28 days ago
Data Security and wireless networks: mutually exclusive?
- The increased use and popularity of wireless networks has seen their adoption in medical information systems. They provide the advantages of mobility and instant information avai...
Andrew Woodward