Search

Showing total 123 results

Search Constraints

Start Over You searched for: Publication Type Books Remove constraint Publication Type: Books Journal computational intelligence & security (9783540308195) Remove constraint Journal: computational intelligence & security (9783540308195) Publisher springer nature Remove constraint Publisher: springer nature
123 results

Search Results

1. A Fast Inversion Algorithm and Low-Complexity Architecture over GF(2m).

2. An ID-Based Optimistic Fair Signature Exchange Protocol from Pairings.

3. FMS Attack-Resistant WEP Implementation Is Still Broken.

4. Design of a New Kind of Encryption Kernel Based on RSA Algorithm.

5. On the Security of Condorcet Electronic Voting Scheme.

6. Special Distribution of the Shortest Linear Recurring Sequences in Z /(p) Field.

7. Cryptanalysis of a Cellular Automata Cryptosystem.

8. A New Conceptual Framework Within Information Privacy: Meta Privacy.

9. Error Oracle Attacks on Several Modes of Operation.

10. An Efficient Certificateless Signature Scheme.

11. ID-Based Restrictive Partially Blind Signatures.

12. On Anonymity of Group Signatures.

13. The Running-Mode Analysis of Two-Party Optimistic Fair Exchange Protocols.

14. Password-Based Group Key Exchange Secure Against Insider Guessing Attacks.

15. On the Security of Some Password-Based Key Agreement Schemes.

16. Efficient ID-Based Proxy Signature and Proxy Signcryption Form Bilinear Pairings.

17. An Identity-Based Threshold Signcryption Scheme with Semantic Security.

18. A Token-Based Single Sign-On Protocol.

19. Efficient Compilers for Authenticated Group Key Exchange.

20. Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys.

21. An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks.

22. A New User-Habit Based Approach for Early Warning of Worms.

23. Sampling Distance Analysis of Gigantic Data Mining for Intrusion Detection Systems.

24. A New Network Anomaly Detection Technique Based on Per-Flow and Per-Service Statistics.

25. SoIDPS: Sensor Objects-Based Intrusion Detection and Prevention System and Its Implementation.

26. A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services.

27. Tamper Detection for Ubiquitous RFID-Enabled Supply Chain.

28. Measuring the Histogram Feature Vector for Anomaly Network Traffic.

29. Efficient Small Face Detection in Surveillance Images Using Major Color Component and LDA Scheme.

30. Fast Motion Detection Based on Accumulative Optical Flow and Double Background Model.

31. Reducing Worm Detection Time and False Alarm in Virus Throttling.

32. Anomaly Detection Method Based on HMMs Using System Call and Call Stack Information.

33. Parallel Optimization Technology for Backbone Network Intrusion Detection System.

34. Attack Scenario Construction Based on Rule and Fuzzy Clustering.

35. A CBR Engine Adapting to IDS.

36. Application of Fuzzy Logic for Distributed Intrusion Detection.

37. On the Security of the Canetti-Krawczyk Model.

38. A Novel Architecture for Detecting and Defending Against Flooding-Based DDoS Attacks.

39. Covert Channel Identification Founded on Information Flow Analysis.

40. Real-Time Risk Assessment with Network Sensors and Intrusion Detection Systems.

41. Design and Implementation of a Parallel Crypto Server.

42. Assessment of Windows System Security Using Vulnerability Relationship Graph.

43. Digital Image Authentication Based on Error-Correction Codes.

44. Design and Implementation of Efficient Cipher Engine for IEEE 802.11i Compatible with IEEE 802.11n and IEEE 802.11e.

45. Secure Delegation-by-Warrant ID-Based Proxy Signcryption Scheme.

46. Building Security Requirements Using State Transition Diagram at Security Threat Location.

47. Study on Security iSCSI Based on SSH.

48. A Scheduling Algorithm Based on a Trust Mechanism in Grid.

49. Enhanced Security and Privacy Mechanism of RFID Service for Pervasive Mobile Device.

50. Worm Propagation Modeling and Analysis on Network.