- In this paper, we present the development of a Windows-based application implemented on the Microsoft .NET platform as a framework to allow a user to first compress and encrypt a...
Biometrics systems are automated systems that recognize a person based on physical or behavioral characteristics. There are a number of primary biometric disciplines including fin...
The Session Initiation Protocol (SIP) is an application-layer protocol commonly used in VoIP for communication over the Internet. In this paper we describe a method to assess a pa...
- This paper proposes a Hash Chain algorithm to create a key safer than the existing encryption method, and suggests an encryption method of higher security than the existing syste...
Kun-Won Jang, Chan-Kil Park, Jung-Jae Kim, Moon-Se...
- In this paper, we propose a method to analyze the firewall policy or rule-set using Relational Algebra and Raining 2D-Box Model. It can discover all the anomalies in the firewall...
Although mobile devices are globally omnipresent, security developments for these devices have not kept pace with their technological advancements. Thus, mobile devices are increa...
Grant A. Jacoby, Thadeus Hickman, Stuart Warders, ...
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Firewalls are the cornerstones of network security. To make firewalls working effectively, firewall manager must design firewall rules and the rule order correctly. In this paper, ...
Considering disaster sensitivity especially in developing large-scale, multiple-use parking structures, we propose dual-surveillance based SCADA (supervisory control and data acqui...
After the 9/11 event, terrorist attacks related to vehicles cannot be overlooked. In some critical areas, security should be concerned from the context of streets or vehicle moveme...