108
click to vote
ICICS
15 years 6 months ago
2005 Springer
Abstract. Multimedia community is moving from monolithic applications to more flexible and scalable integrated solutions. Stream authentication is more complex since a stream may ...
109
Voted
ICICS
15 years 6 months ago
2005 Springer
This paper presents PCAV (Parallel Coordinates Attack Visualizer), a real-time visualization system for detecting large-scale Internet attacks including Internet worms, DDoS attack...
ICICS
15 years 6 months ago
2005 Springer
In a secure multicast communication environment, only valid members belong to the multicast group could decrypt the data. In many previous researches, there is one “group key” ...
125
click to vote
ICICS
15 years 6 months ago
2005 Springer
Secure socket layer (SSL) is the most popular protocol to secure Internet communications. Since SSL handshake requires a large amount of computational resource, batch RSA was propo...
106
Voted
ICICS
15 years 6 months ago
2005 Springer
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
|