1 |
Syntax, and Semantics-based signature database for hybrid intrusion detection systems |
B. I. A Barry, H. A Chan |
457 - 475 |
2 |
An Anonymous on-demand source routing in MANETs |
C Zou, C Chigan |
476 - 491 |
3 |
On the performance of using Covert Timing Channels for node aunthetication |
R Newman, R. A Beyah |
492 - 506 |
4 |
Smart encryption channels for securing virtual machine-based networked applications |
W Itani, A Kayssi, A Chehab |
507 - 518 |
5 |
Fast convergent key distribution algorithms using a dual quantum channel |
D Jin, P. K Verma, S. V Kartalopoulos |
519 - 530 |
6 |
Privacy-preserving rental services using one-show anonymous credentials |
Y Yang, R. H Deng, F Bao |
531 - 545 |
7 |
Embedded security framework for integrated classical and quantum cryptography services in optical burst switching networks |
Y Chen, P. K Verma, S Kak |
546 - 554 |
8 |
Chestega: chess steganography methodology |
A Desoky, M Younis |
555 - 566 |
9 |
When is a key establishment protocol correct ? |
L Dong, K Chen, X Lai, M Wen |
567 - 579 |
10 |
Using camouflging mobility to protect privacy in mobile ad hoc networks |
L Tang, X Hong, S. V Vrbsky |
580 - 594 |
11 |
Secure and pratical key establishment for distributed sensor networks |
P Kotzanikolaou, E Magkos, D Vergados, M Stefanidakis |
595 - 610 |
12 |
New statistical approaches for anomaly detection |
C Callegari, S Giordano, M Pagano |
611 - 634 |
13 |
Misuse patterns in VoIP |
J. C Pelaez, E. B Fernandez, M. M. Larrondo Petrie |
635 - 653 |
14 |
Building a wireless capturing tool for WIFI |
K Meng, Y Xiao, S. V Vrbsky |
654 - 668 |
15 |
A Framework for instrusion detection systems by social network analysis methods in ad hoc networks |
W Wang, H Man, Y Liu |
669 - 685 |
16 |
K08: a generalized BB84/B92 protocol in quantum crypography |
S. V Kartalopoulos |
686 - 693 |
17 |
Random security scheme selection for mobile transaction |
B. S Babu, P Venkataram |
694 - 708 |