Sciweavers

96
Voted
IJNSEC
2007
139views more  IJNSEC 2007»
14 years 10 months ago
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications
Large scale distributed applications combine network access with multiple storage and computational elements. The distributed responsibility for resource control creates new secur...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
84
Voted
IJNSEC
2007
154views more  IJNSEC 2007»
14 years 10 months ago
Integrity of mobile agents: a new approach
The recent developments in the mobile technology (mobile phones, middleware) created a need for new methods of protecting the code transmitted through the network. The oldest and ...
Aneta Zwierko, Zbigniew Kotulski
87
Voted
IJNSEC
2007
125views more  IJNSEC 2007»
14 years 10 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
79
Voted
IJNSEC
2007
121views more  IJNSEC 2007»
14 years 10 months ago
Injecting Heterogeneity Through Protocol Randomization
In this paper, we argue that heterogeneity should be an important principle in design and use of cryptographic protocols. We use automated formal analysis tools to randomly genera...
Li Zhuang, J. D. Tygar, Rachna Dhamija
IJNSEC
2007
79views more  IJNSEC 2007»
14 years 10 months ago
A Novel Approach to Hide Credentials
Zhensong Liao, Hai Jin, Deqing Zou, Weizhong Qiang
91
Voted
IJNSEC
2007
82views more  IJNSEC 2007»
14 years 10 months ago
On Software Implementation of Fast DDP-based Ciphers
Data-dependent (DD) permutations (DDP) are discussed as a cryptographic primitive for the design of fast hardware, firmware, and software encryption systems. DDP can be performed...
Nikolay A. Moldovyan, Peter A. Moldovyanu, Douglas...
90
Voted
IJNSEC
2007
138views more  IJNSEC 2007»
14 years 10 months ago
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings
In 2001, Rivest et al. rstly introduced the concept of ring signatures. A ring signature is a simpli ed group signature without any manager. It protects the anonymity of a signer....
Amit K. Awasthi, Sunder Lal
68
Voted
IJNSEC
2007
83views more  IJNSEC 2007»
14 years 10 months ago
Security Analysis of Double Length Compression Function Based on Block Cipher
Pin Lin, Wenling Wu, Chuankun Wu
77
Voted
IJNSEC
2007
83views more  IJNSEC 2007»
14 years 10 months ago
Secure Logging for Irrefutable Administration
This paper presents a method that allows for securely saving a temporal sequence of data (log lines) in a file. Log lines are signed by an authority, and are thus unalterable wit...
Paolo Dal Checco, Francesco Bergadano, Davide Cava...
89
Voted
IJNSEC
2007
144views more  IJNSEC 2007»
14 years 10 months ago
IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems
The ability of communicating with a selected party anonymously is an important aspect of network security. Communicating anonymously means that no adversary can discern who is com...
Magdy Saeb, Meer Hamza, Ahmed El-Shikh