Sciweavers

IJNSEC
2016
83views more  IJNSEC 2016»
8 years 21 days ago
Rank Correlation for Low-Rate DDoS Attack Detection: An Empirical Evaluation
A low-rate distributed denial of service (DDoS) attack has the ability to obscure its tra c because it is very similar to legitimate tra c. It can easily evade current detection m...
Arindom Ain, Monowar H. Bhuyan, Dhruba K. Bhattach...
IJNSEC
2016
40views more  IJNSEC 2016»
8 years 21 days ago
Stride Towards Proposing Multi-Modal Biometric Authentication for Online Exam
Biometric authentication has been getting widespread attention over the past decade with growing demands in automated secured personal identification and has been employed in div...
A. Prakash, R. Dhanalakshmi
IJNSEC
2016
35views more  IJNSEC 2016»
8 years 21 days ago
Weaknesses of Password Authentication Scheme Based on Geometric Hashing
We show that a recently proposed password authentication scheme based on geometric hashing has several security weaknesses, and that the use of this scheme should be avoided in pr...
Martin Stanek
IJNSEC
2016
39views more  IJNSEC 2016»
8 years 21 days ago
Threshold Signature Scheme without Using Polynomial Interpolation
In a (t, n) secret sharing scheme (SS), the secret is shared among n shareholders in such a way that (a) with t or more than t shares can recover the secret, and (b) with fewer th...
Lein Harn, Feng Wang
IJNSEC
2016
39views more  IJNSEC 2016»
8 years 21 days ago
Penetration Testing and Mitigation of Vulnerabilities Windows Server
Cyber attack has become a major concern over the past few years. While the technical capability to attack has declined, hacking tools - both simple and comprehensive - are themsel...
Deris Stiawan, Mohd Yazid Idris, Abdul Hanan Abdul...
IJNSEC
2016
50views more  IJNSEC 2016»
8 years 21 days ago
A New Robust Blind Copyright Protection Scheme Based on Visual Cryptography and Steerable Pyramid
In this paper, we proposed a novel blind digital image copyright protection scheme based on Steerable pyramid transform (SPT) and visual cryptography (VC). Unlike traditional wate...
Azz El Arab El Hossaini, Mohamed El Aroussi, Khadi...
IJNSEC
2016
50views more  IJNSEC 2016»
8 years 21 days ago
A Quantitative and Qualitative Analysis-based Security Risk Assessment for Multimedia Social Networks
The emerging Multimedia Social Network (MSN) provides much more conveniences for the transmission and sharing of multimedia digital contents. However, the scenario on the distribu...
Zhiyong Zhang, Lijun Yang, Hanman Li, Fei Xiang
IJNSEC
2016
48views more  IJNSEC 2016»
8 years 21 days ago
Key Trees Combining Algorithm for Overlapping Resource Access Members
In cloud computing environment, resources are accessed by multiple members. Resources may be considered as VM, CPU, Storage etc. Group key management required when multiple member...
Amar Buchade, Rajesh Ingle