Sciweavers

IJNSEC
2007
119views more  IJNSEC 2007»
13 years 4 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
IJNSEC
2007
131views more  IJNSEC 2007»
13 years 4 months ago
An Asymmetric Cryptographic Key Assignment Scheme for Access Control in Tree Structural Hierarchies
In a hierarchical structure, a user in a security class has access to information items of another class if and only if the former class is a predecessor of latter. Based upon cry...
Debasis Giri, Parmeshwary Dayal Srivastava
IJNSEC
2007
142views more  IJNSEC 2007»
13 years 4 months ago
Java Bytecode Dependence Analysis for Secure Information Flow
Java programs can be transmitted and executed on another host in bytecode format, thus the sensitive information of the host may be leaked via these assembly-like programs. Inform...
Gaowei Bian, Ken Nakayama, Yoshitake Kobayashi, Ma...
IJNSEC
2007
161views more  IJNSEC 2007»
13 years 4 months ago
Data Hiding: Current Status and Key Issues
Image steganography is a covert communication method that uses an image as the cover to hide the truth from potential attackers that some secret message hidden in the image is bei...
Nan-I Wu, Min-Shiang Hwang
IJNSEC
2007
107views more  IJNSEC 2007»
13 years 4 months ago
Original Signer's Forgery Attacks on Discrete Logarithm Based Proxy Signature Schemes
A proxy signature scheme enables a proxy signer to sign messages on behalf of the original signer. In this paper, we demonstrate that a number of discrete logarithm based proxy si...
Tianjie Cao, Xianping Mao
IJNSEC
2007
127views more  IJNSEC 2007»
13 years 4 months ago
A Web-based Multilayer Access Control Model for Multimedia Applications in MPEG-7
This paper presents a Criterion-Based Role-Based Access Control model in which secure permissions (SP), secure operations (SOp), secure objects (SOb), and secure users (SU) are in...
Leon Pan
IJNSEC
2007
189views more  IJNSEC 2007»
13 years 4 months ago
When Fingerprints Are Combined with Iris - A Case Study: FVC2004 and CASIA
This paper presents novel studies on fusion strategies for personal identification using fingerprint and iris biometrics. The purpose of our paper is to investigate whether the ...
Alessandra Lumini, Loris Nanni
IJNSEC
2007
143views more  IJNSEC 2007»
13 years 4 months ago
Distributed Cryptographic Computing on Grid
Distributed cryptographic computing system plays an important role in cryptographic research since cryptographic computing is extremely computation sensitive. There are many resea...
Zhonghua Jiang, Dongdai Lin, Lin Xu, Lei Lin
IJNSEC
2007
145views more  IJNSEC 2007»
13 years 4 months ago
Authenticated Group Key Agreement Protocols for Ad hoc Wireless Networks
The lack of fixed infrastructure, both physical and organizational, and the highly dynamic nature of ad hoc networks, presents a major challenge in providing secure, authenticate...
Ahmed Abdel-Hafez, Ali Miri, Luis Orozco-Barbosa
IJNSEC
2007
121views more  IJNSEC 2007»
13 years 4 months ago
Data Hiding in a Kind of PDF Texts for Secret Communication
In this paper, we present a novel steganographic technique for hiding data in a kind of PDF texts. We first point out the secret channels in a kind of PDF English texts, which ar...
Shangping Zhong, Xueqi Cheng, Tierui Chen