Sciweavers

2474 search results - page 433 / 495
» Attacks on Steganographic Systems
Sort
View
WECWIS
2008
IEEE
75views ECommerce» more  WECWIS 2008»
15 years 6 months ago
Price Trust Evaluation in E-service Oriented Applications
Trust is a critical issue in e-commerce and e-service environments. Some applications (such as eBay) have introduced various trust management mechanisms to provide valuable inform...
Yan Wang 0002, Lei Li, Ee-Peng Lim
HICSS
2007
IEEE
90views Biometrics» more  HICSS 2007»
15 years 6 months ago
Optimizing Regional Aid during Public Health Emergencies: An Autonomic Resource Allocation Approach
A large scale public health emergency such as an epidemic (occurring naturally or due to a bioterrorism attack) can result in an overwhelming number of human casualties. This can ...
Hina Arora, T. S. Raghu, Ajay S. Vinze
ICC
2007
IEEE
119views Communications» more  ICC 2007»
15 years 6 months ago
A Secure Authentication Policy for UMTS and WLAN Interworking
—We propose a security authentication policy, Dynamic Session Key Policy (DSKP), for a secure handoff between the UMTS and IEEE 802.11 WLAN. This policy is founded and improved f...
Yen-Chieh Ouyang, Chang-Bu Jang, Hung-Ta Chen
ICC
2007
IEEE
169views Communications» more  ICC 2007»
15 years 6 months ago
Secure Vehicular Communications Based on Group Signature and ID-Based Signature Scheme
—Vehicular communication networking is a promising approach of facilitating road safety, traffic management, and infotainment dissemination for drivers and passengers. However, i...
Xiaoting Sun, Xiaodong Lin, Pin-Han Ho
ICC
2007
IEEE
137views Communications» more  ICC 2007»
15 years 6 months ago
A Novel Algorithm and Architecture for High Speed Pattern Matching in Resource-Limited Silicon Solution
— Network Intrusion Detection Systems (NIDS) are more and more important for identifying and preventing the malicious attacks over the network. This paper proposes a novel cost-e...
Nen-Fu Huang, Yen-Ming Chu, Chi-Hung Tsai, Chen-Yi...