- This paper proposes a "mechanism-based PKI", in which only a mechanism for generating user's private keys is installed on a smart card. The private key is generate...
Identity theft continues to be an ever-present problem. Identity theft and other related crimes are becoming an unparalleled phenomenon that nearly everyone will have to deal with...
- There are two types of models useful in the study of worm propagation for a given number of terminals in a trusted network i.e. deterministic and stochastic model. The determinis...
Mobile technologies are experiencing rapid growth and adoption in both enterprise and consumer markets, as users demand unfettered access to resources, services, and data at any ti...
Manoj B. Sastry, Michael J. Covington, Deepak J. M...
- Network Intrusion Detection Systems (NIDS) capture large amounts of data that is difficult or impractical to report and analyze directly from the capture device. It is also commo...
: This paper proposes a technology for realizing a mobile network based on color signals which does not require the time and the space switching matrix for call routing. In absence...
- Security is an important issue for Wireless Sensor Network (WSN), especially for security-sensitive application. In this paper, we address secure authentication problems in WSN. ...
- This paper explains a new technique that takes advantage of advancements in digital imaging technology to visually transfer large amounts of data quickly between computing machin...
: Traditional state modeling techniques have several limitations. One of these is the reduced ability to model a large number of variables simultaneously. Another limitation is tha...
Gregory Vert, Sergiu M. Dascalu, Frederick C. Harr...