Sciweavers

CISC
2006
Springer
124views Cryptology» more  CISC 2006»
15 years 7 months ago
An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses
Enterprises use security equipments in order to protect their information assets from various attacks such as viruses and hacking. However, such individual equipments hardly provid...
Yoonsun Lim, Myung Kim, Kwang Hee Seo, Ho-Kun Moon...
167
Voted
CISC
2006
Springer
131views Cryptology» more  CISC 2006»
15 years 7 months ago
Efficient Intrusion-Resilient Signatures Without Random Oracles
Intrusion-resilient signatures are key-evolving protocols that extend the concepts of forward-secure and key-insulated signatures. As in the latter schemes, time is divided into di...
Benoît Libert, Jean-Jacques Quisquater, Moti...
110
Voted
ESAS
2004
Springer
15 years 7 months ago
Key Management in Wireless Sensor Networks
Yann-Hang Lee, Vikram Phadke, Amit Deshmukh, Jin W...
180
Voted
ESAS
2004
Springer
15 years 7 months ago
Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks
Abstract. The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node ma...
Frank Kargl, Andreas Klenk, Stefan Schlott, Michae...
CISC
2006
Springer
81views Cryptology» more  CISC 2006»
15 years 7 months ago
Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks
Buffer overflow(BOF) has been the most common form of vulnerability in software systems today, and many methods exist to defend software systems against BOF attacks. Among them, th...
Deok Jin Kim, Tae Hyung Kim, Jong Kim, Sung Je Hon...