Sciweavers

IJNSEC
2007
139views more  IJNSEC 2007»
13 years 11 months ago
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications
Large scale distributed applications combine network access with multiple storage and computational elements. The distributed responsibility for resource control creates new secur...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
IJNSEC
2007
154views more  IJNSEC 2007»
13 years 11 months ago
Integrity of mobile agents: a new approach
The recent developments in the mobile technology (mobile phones, middleware) created a need for new methods of protecting the code transmitted through the network. The oldest and ...
Aneta Zwierko, Zbigniew Kotulski
IJNSEC
2007
125views more  IJNSEC 2007»
13 years 11 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
IJNSEC
2007
121views more  IJNSEC 2007»
13 years 11 months ago
Injecting Heterogeneity Through Protocol Randomization
In this paper, we argue that heterogeneity should be an important principle in design and use of cryptographic protocols. We use automated formal analysis tools to randomly genera...
Li Zhuang, J. D. Tygar, Rachna Dhamija
IJNSEC
2007
79views more  IJNSEC 2007»
13 years 11 months ago
A Novel Approach to Hide Credentials
Zhensong Liao, Hai Jin, Deqing Zou, Weizhong Qiang
IJNSEC
2007
82views more  IJNSEC 2007»
13 years 11 months ago
On Software Implementation of Fast DDP-based Ciphers
Data-dependent (DD) permutations (DDP) are discussed as a cryptographic primitive for the design of fast hardware, firmware, and software encryption systems. DDP can be performed...
Nikolay A. Moldovyan, Peter A. Moldovyanu, Douglas...
IJNSEC
2007
138views more  IJNSEC 2007»
13 years 11 months ago
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings
In 2001, Rivest et al. rstly introduced the concept of ring signatures. A ring signature is a simpli ed group signature without any manager. It protects the anonymity of a signer....
Amit K. Awasthi, Sunder Lal
IJNSEC
2007
83views more  IJNSEC 2007»
13 years 11 months ago
Secure Logging for Irrefutable Administration
This paper presents a method that allows for securely saving a temporal sequence of data (log lines) in a file. Log lines are signed by an authority, and are thus unalterable wit...
Paolo Dal Checco, Francesco Bergadano, Davide Cava...
IJNSEC
2007
144views more  IJNSEC 2007»
13 years 11 months ago
IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems
The ability of communicating with a selected party anonymously is an important aspect of network security. Communicating anonymously means that no adversary can discern who is com...
Magdy Saeb, Meer Hamza, Ahmed El-Shikh