Sciweavers

12 search results - page 1 / 3
» wetice 2002
Sort
View
122
Voted
WETICE
2002
IEEE
15 years 10 months ago
Intrusion Detection: Systems and Models
Joseph S. Sherif, Tommy G. Dearmond
WETICE
2002
IEEE
15 years 10 months ago
Evaluation Factors for Multi-Stakeholder Broadband Visual Communication Projects
Marion A. Barfurth, Janice Singer, Bruno Emond, No...
WETICE
2002
IEEE
15 years 10 months ago
A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection
In 1996, Mambo et al. first introduced the concept of a proxy signature scheme, and discussed the delegation of the signing capability to a proxy signer. In 2001, Lee et al. cons...
K. Shum, Victor K. Wei
150
Voted
WETICE
2002
IEEE
15 years 10 months ago
Honeypots for Distributed Denial of Service Attacks
Distributed Denial-of-Service attacks are still a big threat to the Internet. Several proposals for coping with the attacks have been made in the recent past, but neither of them ...
Nathalie Weiler