Sciweavers

CSREASAM
2006
14 years 2 months ago
Mechanism-Based PKI - A Real-Time Key Generation from Fingerprints
- This paper proposes a "mechanism-based PKI", in which only a mechanism for generating user's private keys is installed on a smart card. The private key is generate...
Yoichi Shibata, Masahiro Mimura, Kenta Takahashi, ...
CSREASAM
2006
14 years 2 months ago
Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security
Identity theft continues to be an ever-present problem. Identity theft and other related crimes are becoming an unparalleled phenomenon that nearly everyone will have to deal with...
Jonathan White, Dale Thompson
CSREASAM
2006
14 years 2 months ago
Stochastic Modeling of Worm Propagation in Trusted Networks
- There are two types of models useful in the study of worm propagation for a given number of terminals in a trusted network i.e. deterministic and stochastic model. The determinis...
Vivek Kumar Sehgal
CSREASAM
2006
14 years 2 months ago
Securing Collaborative Applications
Mobile technologies are experiencing rapid growth and adoption in both enterprise and consumer markets, as users demand unfettered access to resources, services, and data at any ti...
Manoj B. Sastry, Michael J. Covington, Deepak J. M...
CSREASAM
2006
14 years 2 months ago
Network Intrusion Detection System with Data Mart
- Network Intrusion Detection Systems (NIDS) capture large amounts of data that is difficult or impractical to report and analyze directly from the capture device. It is also commo...
Richard Wasniowski
CSREASAM
2006
14 years 2 months ago
Framework for realizing Mobile and Computer Communications through Color Signals
: This paper proposes a technology for realizing a mobile network based on color signals which does not require the time and the space switching matrix for call routing. In absence...
Rajarshi Sanyal
CSREASAM
2006
14 years 2 months ago
A New Secure Authentication Scheme Based Threshold ECDSA For Wireless Sensor Network
- Security is an important issue for Wireless Sensor Network (WSN), especially for security-sensitive application. In this paper, we address secure authentication problems in WSN. ...
Hao Wang, Zhongfu Wu, Xin Tan