Sciweavers

12 search results - page 1 / 3
» wetice 2002
Sort
View
WETICE
2002
IEEE
13 years 9 months ago
Intrusion Detection: Systems and Models
Joseph S. Sherif, Tommy G. Dearmond
WETICE
2002
IEEE
13 years 9 months ago
Evaluation Factors for Multi-Stakeholder Broadband Visual Communication Projects
Marion A. Barfurth, Janice Singer, Bruno Emond, No...
WETICE
2002
IEEE
13 years 9 months ago
A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection
In 1996, Mambo et al. first introduced the concept of a proxy signature scheme, and discussed the delegation of the signing capability to a proxy signer. In 2001, Lee et al. cons...
K. Shum, Victor K. Wei
WETICE
2002
IEEE
13 years 9 months ago
Honeypots for Distributed Denial of Service Attacks
Distributed Denial-of-Service attacks are still a big threat to the Internet. Several proposals for coping with the attacks have been made in the recent past, but neither of them ...
Nathalie Weiler