Sciweavers

CSREASAM
2006
14 years 28 days ago
An Efficient Bloom Filter Based Solution for Multiparty Private Matching
- The issue of privacy becomes more and more important. On the other hand, online collaboration among different parties is almost unavoidable. How to allow collaboration while prot...
Pierre K. Y. Lai, Siu-Ming Yiu, K. P. Chow, C. F. ...
CSREASAM
2006
14 years 28 days ago
The Fault Detecting Method for Supporting SLA Fault Metrics of IPTV Service
Eunjin Ko, Yongsun Ryu, Gilhaeng Lee, Youngsun Kim
CSREASAM
2006
14 years 28 days ago
Flexible Cryptographic Component Design for Secure Web Applications
- Although Internet serves many contents and services, it has serious problems of security: the invasion of privacy, hacking and etc. To prevent these problems, two implementations...
Tae Ho Kim, Jong Jin Kim, Chang Hoon Kim, Chun Pyo...
CSREASAM
2006
14 years 28 days ago
A New Robust and Secure Steganographic System for Greyscale Images
: The research work in this paper shows that the currently available stenographic methods might be quite easily detected by using sufficiently careful analysis of the transmitted d...
Hesham Elzouka
CSREASAM
2006
14 years 28 days ago
The Analyses of Key Stroke Timings using Self Organizing Maps and its Application to Authentication
Recently, security of the computer systems becomes an important problem. Almost all computers use the password mechanism for the user authentication. But password mechanism has ma...
Hiroshi Dozono, Yoshio Noguchi, Masanori Nakakuni,...
CSREASAM
2006
14 years 28 days ago
Using Aspects and Compilation Techniques to Dynamically Manage Applications
- The emergence of middleware solutions and new services even on small devices will need adapted distributed management solutions which address these specificities, both in terms o...
Bernard Kaddour, Joël Quinqueton
CSREASAM
2006
14 years 28 days ago
Agent-based Distributed Intrusion Detection Methodology for MANETs
Intrusion detection, as a complementary mechanism to intrusion prevention, is necessary to secure wireless Mobile Ad hoc Networks (MANETs). In this paper we propose a practical age...
Hongmei Deng, Roger Xu, Frank Zhang, Chiman Kwan, ...
CSREASAM
2006
14 years 28 days ago
Session Based Logging (SBL) for IP-Traceback on Network Forensics
The widely acknowledged problem of reliably identifying the origin of information in cyberspace has been the subject of much research. Due to the nature of the Internet protocol, ...
Omer Demir, Ping Ji, Jinwoo Kim