Sciweavers

7544 search results - page 1355 / 1509
» Network Forensics Analysis
Sort
View
WISA
2004
Springer
15 years 9 months ago
Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack
Abstract. Encapsulating messages in onions is one of the major techniques providing anonymous communication in computer networks. To some extent, it provides security against trafï...
Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kut...
HICSS
2003
IEEE
168views Biometrics» more  HICSS 2003»
15 years 9 months ago
'Pay-per-use' Concept in Healthcare: A Grounded Theory Perspective
Healthcare organizations worldwide are faced with the growing challenge of introducing structural and technological reforms and cost-effective IT solutions that will transform the...
Abdullah A. Akbar
HICSS
2003
IEEE
129views Biometrics» more  HICSS 2003»
15 years 9 months ago
Experimental Studies and Modeling of an Information Embedded Power System
This paper develops a model of an electrical power system, with its inherent embedded communication system, for the purpose of studying the characteristics of power system measure...
Stephen P. Carullo, Chika Nwankpa
ISCAS
2003
IEEE
235views Hardware» more  ISCAS 2003»
15 years 9 months ago
Enhanced chaotic image encryption algorithm based on Baker's map
Imaging has gained importance due to the improvements of performances in computer speed, media storage and network bandwidth. Along with this advancement, the fundamental issue of...
Mazleena bt. Salleh, Subariah bt. Ibrahim, I. F. I...
ISCC
2003
IEEE
15 years 9 months ago
On the Issues of IP Traceback for IPv6 and Mobile IPv6
As the Internet becomes pervasive, the vulnerability of some fundamental design aspects of the Internet has also become significant. Among which, Denial-of-Service (DoS) and Distr...
Henry C. J. Lee, Miao Ma, Vrizlynn L. L. Thing, Yi...
« Prev « First page 1355 / 1509 Last » Next »