Sciweavers

21 search results - page 1 / 5
» icics 2009
Sort
View
85
Voted
ICICS
2009
Springer
15 years 7 months ago
How to Steal a Botnet and What Can Happen When You Do
Richard A. Kemmerer
113
Voted
ICICS
2009
Springer
15 years 7 months ago
Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks
Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng...
97
Voted
ICIC
2009
Springer
15 years 7 months ago
Group-Based Proxy Re-encryption Scheme
Recently, proxy re-encryption scheme received much attention. In this paper, we propose a proxy re-encryption used for divert ciphertext from one group to another. The scheme is bi...
Chunbo Ma, Jun Ao
109
Voted
ICIC
2009
Springer
15 years 7 months ago
A Method for Multiple Sequence Alignment Based on Particle Swarm Optimization
Sequence Alignment is a basic information disposal method in Bioinformatics. However, it is difficult to deal with multiple sequence alignment problem(MSA). In this paper, an impro...
Fasheng Xu, Yuehui Chen