Sciweavers

CORR
2010
Springer
114views Education» more  CORR 2010»
13 years 7 months ago
Integrating identity-based cryptography in IMS service authentication
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the r...
Mohamed Abid, Songbo Song, Hassnaa Moustafa, Hossa...
CORR
2010
Springer
150views Education» more  CORR 2010»
13 years 7 months ago
On Generation of Firewall Log Status Reporter (SRr) Using Perl
Computer System Administration and Network Administration are few such areas where Practical Extraction Reporting Language (Perl) has robust utilization these days apart from Bioi...
Sugam Sharma, Hari Cohly, Tzusheng Pei
CORR
2010
Springer
124views Education» more  CORR 2010»
13 years 7 months ago
Quantum Three-Pass protocol: Key distribution using quantum superposition states
This letter proposes a novel key distribution protocol with no key exchange in advance, which is secure as the BB84 quantum key distribution protocol. Our protocol utilizes a phot...
Yoshito Kanamori, Seong-Moo Yoo
CORR
2010
Springer
50views Education» more  CORR 2010»
13 years 7 months ago
Dynamic IDP Signature processing by fast elimination using DFA
Mohammed Misbahuddin, Sachin Narayanan, Bishwa Ran...
CORR
2010
Springer
82views Education» more  CORR 2010»
13 years 7 months ago
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images
this paper demonstrates analysis of well known block cipher CAST-128 and its modified version using avalanche criterion and other tests namely encryption quality, correlation coeff...
G. N. Krishnamurthy, V. Ramaswamy
CORR
2010
Springer
47views Education» more  CORR 2010»
13 years 7 months ago
Tools and techniques for Network Forensics
Natarajan Meghanathan, Sumanth Reddy Allam, Lorett...
CORR
2010
Springer
149views Education» more  CORR 2010»
13 years 7 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh
CORR
2010
Springer
57views Education» more  CORR 2010»
13 years 7 months ago
Embedding Secret Data in HTML Web Page
Sandipan Dey, Hameed Al-Qaheri, Sugata Sanyal
CORR
2010
Springer
173views Education» more  CORR 2010»
13 years 7 months ago
CONCISE: Compressed 'n' Composable Integer Set
Bit arrays, or bitmaps, are used to significantly speed up set operations in several areas, such as data warehousing, information retrieval, and data mining, to cite a few. Howeve...
Alessandro Colantonio, Roberto Di Pietro