IP@SS - Integrated Passenger Security Solutions (Englisch)
- Neue Suche nach: Yahav, Y.
- Neue Suche nach: Institute of Electrical and Electronics Engineers
- Neue Suche nach: Yahav, Y.
- Neue Suche nach: Sanson, L. D.
- Neue Suche nach: Institute of Electrical and Electronics Engineers
In:
Security technology
;
151-153
;
2002
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:IP@SS - Integrated Passenger Security Solutions
-
Beteiligte:
-
Kongress:Annual international Carnahan conference; 36th, Security technology ; 2002 ; Atlantic City, NJ
-
Erschienen in:Security technology ; 151-153
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsdatum:01.01.2002
-
Format / Umfang:3 pages
-
Anmerkungen:IEEE Cat no 02CH37348
-
ISBN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Testing and Evaluation Counterterrorism TechnologyKing, S. G. / Wood, T. M. / Stewart, J. W. / Institute of Electrical and Electronics Engineers et al. | 2003
- 8
-
Understanding Concepts in the Defence in Depth StrategySmith, C. L. / Institute of Electrical and Electronics Engineers et al. | 2003
- 15
-
Author index| 2002
- 17
-
IntelliFIBER Fiber Optic Fence Sensor DevelopmentsMak, M. / Weese, J. / Institute of Electrical and Electronics Engineers et al. | 2003
- 17
-
The Center for Civil Force ProtectionSmith, G.J. et al. | 2002
- 19
-
US Department of Energy security technologiesBowser, G.H. / Piechowski, C.J. / Pocratsky, C.A. / Sparks, M.H. et al. | 2002
- 23
-
A Research of Information and Communication Security Forensic Mechanism in TaiwanLin, I. L. / Lan, T. S. / Wu, J. C. / Institute of Electrical and Electronics Engineers et al. | 2003
- 25
-
Secure Flow: a totally integrated transportation security systemPolillo, R.R. et al. | 2002
- 29
-
An infrastructure vulnerability assessment methodology for metropolitan areasBiersack, W.M. / Hyder, C.B. / James, J.W. / King, S.G. / Kruse, E.M. / Veatch, J.D. / Wood, T.M. et al. | 2002
- 30
-
Intelligence Security Home NetworkVolner, R. / Pousek, L. / Institute of Electrical and Electronics Engineers et al. | 2003
- 35
-
Multiscale analysis for iris biometricsSanchez-Avila, C. / Sanchez-Reillo, R. et al. | 2002
- 38
-
Design of SPS Model Using Mobile Agent SystemPark, J. / Chung, J. / Institute of Electrical and Electronics Engineers et al. | 2003
- 39
-
Biometric identification system by lip shapeGomez, E. / Travieso, C.M. / Briceno, J.C. / Ferrer, M.A. et al. | 2002
- 43
-
Mathematical Morphology Approaches for Fingerprints ThinningEspinosa-Duro, V. / Institute of Electrical and Electronics Engineers et al. | 2002
- 43
-
Pocket Device for Authentication and Data Integrity on Internet Banking Applicationsde la Puente, F. / Sandoval, J. D. / Hernandez, P. / Institute of Electrical and Electronics Engineers et al. | 2003
- 43
-
Mathematical morphology approaches for fingerprint thinningEspinosa-Duro, V. et al. | 2002
- 46
-
Microprocessor smart cards with fingerprint user authenticationSanchez-Reillo, R. / Sanchez-Avila, C. / Mengibar-Pozo, L. et al. | 2002
- 50
-
A system and method for enhanced psychophysiological detection of deceptionMcClure, J. / Ames, W.I. / McGraw, T.F. / Gouin, J.-L. et al. | 2002
- 51
-
On the Security of Multimedia Video InformationShieh, J. J. R. / Institute of Electrical and Electronics Engineers et al. | 2003
- 57
-
An Extended Object-Oriented Security Model for High Secure Office EnvironmentsGaun, B. C. / Wang, P. / Chen, S. J. / Chang, R. I. / Institute of Electrical and Electronics Engineers et al. | 2003
- 60
-
Motion signature analysis for microwave detection systemsLester, A.J. / Smith, C.L. et al. | 2002
- 62
-
Progressive Watermarking Techniques with Genetic AlgorithmsHuang, H. C. / Pan, J. S. / Shieh, C. S. / Wang, F. H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 66
-
Vessel Identification and Monitoring Systems for Maritime SecurityChang, S. J. / Institute of Electrical and Electronics Engineers et al. | 2003
- 71
-
A novel sensor application to increase security of prisoners in community hospitalsTucknutt, M.D. et al. | 2002
- 71
-
Virus Detection Using Data Mining TechniquesWang, J. H. / Deng, P. S. / Fan, Y. S. / Jaw, L. J. / Liu, Y. C. / Institute of Electrical and Electronics Engineers et al. | 2003
- 75
-
Man portable sensor technology for use in dynamic environments with multiple areas for concealmentRoberts, M.K. et al. | 2002
- 77
-
New Development in Portable Sensor Allows Low-Cost Component to be Left Behind (Disposable)Andre, G. / Institute of Electrical and Electronics Engineers et al. | 2003
- 80
-
Intrepid MicroPoint system - European fence experienceBackx, A.J. / Harman, R.K. et al. | 2002
- 83
-
And-CFAR and Or-CFAR Detectors Design in Weibull BackgroundLiu, X. H. / Liu, W. X. / Institute of Electrical and Electronics Engineers et al. | 2003
- 87
-
Critical asset protection, perimeter monitoring and threat detection using automated video surveillance - a technology overview with case studiesHeartwell, C.H. / Lipton, A.J. et al. | 2002
- 87
-
A Detection Algorithm for Road Feature Extraction Using EO-1 Hyperspectral ImagesSun, T. L. / Institute of Electrical and Electronics Engineers et al. | 2003
- 88
-
First response to terrorist bombingsKing, S.G. / Wood, T.M. / Priem, R.G. et al. | 2002
- 94
-
September 11, 2001 - response to the PentagonWood, T.M. / King, S.G. et al. | 2002
- 96
-
Millimeter Wave Control Switch for Secure Giga-Scale SystemFu, J. S. / Cai, C. / Lu, Y. / Shen, Z. X. / Institute of Electrical and Electronics Engineers et al. | 2003
- 100
-
Secure 77GHz Vivaldi Antenna for Millimeter Wave CommunicationChong, L. P. / Ng, P. T. / Fu, J. S. / Institute of Electrical and Electronics Engineers et al. | 2003
- 102
-
A first step towards automatic hoax detectionHernandez, J.C. / Hernandez, C.J. / Sierra, J.M. / Ribagorda, A. et al. | 2002
- 102
-
A First Step Toward Automatic Hoax DetectionHernandez, J. C. / Hernandez, C. J. / Sierra, J. M. / Ribagorda, A. / Institute of Electrical and Electronics Engineers et al. | 2002
- 104
-
An Intelligent Real Time Fire-Detection Method Based on Video ProcessingChen, T. H. / Kao, C. L. / Chang, S. M. / Institute of Electrical and Electronics Engineers et al. | 2003
- 112
-
Security of ZLYH-Key Authentication SchemeLee, J. M. / Ryu, E. K. / Kim, K. W. / Lee, H. M. / Yoo, K. Y. / Institute of Electrical and Electronics Engineers et al. | 2003
- 115
-
On the use of trusted objects to enforce isolation between processes and dataTarman, T.D. / Witzke, E.L. / Pierson, L.G. / Campbell, P.L. et al. | 2002
- 115
-
A New Convertible Group Signature Scheme on the Basis of Dual ComplexitiesChen, J. J. R. / Lin, W. M. / Chen, A. P. / Institute of Electrical and Electronics Engineers et al. | 2003
- 120
-
Improving security in information technology using cryptographic hardware modulesSanchez-Reillo, R. / Sanchez-Avila, C. / Lopez-Ongil, C. / Entrena-Arrontes, L. et al. | 2002
- 123
-
A Novel Blind Signature Scheme Possessed with Dual ProtectionsChen, J. J. R. / Chen, A. P. / Lin, R. W. M. / Institute of Electrical and Electronics Engineers et al. | 2003
- 124
-
Compulsive votingHernandez, J.C. / Sierra, J.M. / Hernandez, C.J. / Ribagorda, A. et al. | 2002
- 128
-
A Simple Key Agreement ProtocolRyu, E. K. / Kim, K. W. / Yoo, K. Y. / Institute of Electrical and Electronics Engineers et al. | 2003
- 132
-
A Novel Round Function Architecture for AES Encryption/Decryption Utilizing Look-Up TableWang, J. F. / Chang, S. W. / Lin, P. C. / Institute of Electrical and Electronics Engineers et al. | 2003
- 134
-
Migration of Internet security protocols to the IPSEC frameworkSierra, J.M. / Hernandez, J.C. / Ribagorda, A. / Jayaram, N. et al. | 2002
- 137
-
An Integrated User Authentication and Access Control Scheme without PublicChien, H. Y. / Jan, J. K. / Institute of Electrical and Electronics Engineers et al. | 2003
- 144
-
Security system throughput modelingLeone, K. et al. | 2002
- 144
-
An Authorization Mechanism for Web Services Using Attribute CertificateKim, K. N. / Kang, M. H. / Ryou, H. B. / Institute of Electrical and Electronics Engineers et al. | 2003
- 151
-
IP@SS - Integrated Passenger Security SolutionsYahav, Y. / Institute of Electrical and Electronics Engineers et al. | 2002
- 151
-
Achieving Database Accountability and Traceability Using the Bitemporal RelationChen, H. H. / Farn, K. J. / Tsai, D. R. / Institute of Electrical and Electronics Engineers et al. | 2003
- 154
-
Information systems security in an airport environmentWilson, D.L. et al. | 2002
- 157
-
Design of a Computer-Aided System for Risk Assessment on Information SystemsLiao, G. Y. / Song, C. H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 158
-
Smart card technology with case studiesCarr, M.R. et al. | 2002
- 160
-
Interface and usability assessment of imaging systemsKlock, B.A. et al. | 2002
- 162
-
Millimetre wave aviation security scannerMurphy, K.S.J. / Appleby, R. / Sinclair, G. / McClumpha, A. / Tatlock, K. / Doney, R. / Hutcheson, I. et al. | 2002
- 163
-
An Electronic Voting Scheme Based on Undeniable Blind Signature SchemeYun, S. H. / Lee, S. J. / Institute of Electrical and Electronics Engineers et al. | 2003
- 167
-
Detection of illegal passengers in lorries using a passive millimetre wave scannerSinclair, G.N. / Coward, P.R. / Anderton, R.N. / Appleby, R. / Seys, T. / Southwood, P. et al. | 2002
- 168
-
Evaluation of Info Security Related Risks of an Organization-The Application of the Multi-Criteria Decision Making MethodGuan, B. C. / Lo, C. C. / Wang, P. / Hwang, J. S. / Institute of Electrical and Electronics Engineers et al. | 2003
- 171
-
Field testing of outdoor intrusion detection sensorsMaki, M. / Nieh, R. / Dickie, M. et al. | 2002
- 176
-
From Web Server Security to Web Components SecurityLin, S. K. / Institute of Electrical and Electronics Engineers et al. | 2003
- 179
-
Representation of weather and terrain effects on intrusion detectionPeck, L. et al. | 2002
- 183
-
A Panoramic Stabilized Periscope with Common Optical PathChen, P. H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 190
-
A Real-time Security Surveillance System for Personal AuthenticationChien, Y. T. / Huang, Y. S. / Jeng, S. W. / Tasi, Y. H. / Zhao, H. X. / Institute of Electrical and Electronics Engineers et al. | 2003
- 191
-
Intrepid MicroTrack leaky cable sensorHarman, R.K. et al. | 2002
- 196
-
A Risk Assessment System for FacilitiesWood, T. M. / King, S. G. / Institute of Electrical and Electronics Engineers et al. | 2003
- 198
-
Some remarks on very high-rate image compression and its impact on security image data subjective evaluationKlima, M. / Kloucek, V. et al. | 2002
- 200
-
An Auto Bi-Directional Passing-People Counting Method Based on Color Image ProcessingChen, T. H. / Hsu, C. W. / Institute of Electrical and Electronics Engineers et al. | 2003
- 202
-
AMETHYST: automatic alarm assessmentMockler, S. / Clarke, N. et al. | 2002
- 208
-
Motion Tracking of Multi-Objects for Access Surveillance Based on the Panoramic Imaging SystemPan, M. C. / Tsai, Y. L. / Huang, Y. J. / Institute of Electrical and Electronics Engineers et al. | 2003
- 209
-
CATV security architectureVolner, R. et al. | 2002
- 216
-
A New Security Key Exchange Channel for 802.11 WLANsOuyang, Y. C. / Chang, R. L. / Chiu, J. H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 216
-
Linescan imaging of ballistics projectile markings for identificationSmith, C.L. et al. | 2002
- 222
-
Application of Certificate on the ECC Authentication Protocol for Point-to-Point CommunicationsMar, J. / Lee, K. M. / Institute of Electrical and Electronics Engineers et al. | 2003
- 223
-
Digital video recorder selection for a casinoBurleson-Webb, K. et al. | 2002
- 225
-
Design and Implementation of Smartcard-Based Secure E-Mail CommunicationChen, H. H. / Chen, Y. S. / Chiang, H. L. / Yang, C. H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 228
-
Multi-camera video surveillanceEllis, T. et al. | 2002
- 232
-
Hiding Binary Images behind Noise with Authentication Capability -A New Approach to Convert CommunicationTzeng, C. H. / Tsai, W. H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 237
-
Integrate the Structure of Negotiation Certification of SET and the Intelligent Mobile AgentHuang, P. H. / Yen, J. H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 245
-
Light-Weight Authentication and Billing in Mobile CommunicationsChen, H. B. / Hsueh, S. C. / Institute of Electrical and Electronics Engineers et al. | 2003
- 253
-
A Group Digital Signature Technique for AuthenticationHsu, C. M. / Twu, S. H. / Chao, H. M. / Institute of Electrical and Electronics Engineers et al. | 2003
- 257
-
A Knowledge-Based Model for Defending DDoSLin, S. S. / Lin, S. C. / Tseng, S. S. / Institute of Electrical and Electronics Engineers et al. | 2003
- 264
-
A Novel Public Digital Watermarking for Still Images Based on Encryption AlgorithmTai, G. C. / Chang, L. W. / Institute of Electrical and Electronics Engineers et al. | 2003
- 268
-
A New Proxy Signature Scheme Based on Dual ComplexitiesSun, P. T. / Lin, C. L. / Chen, J. J. R. / Institute of Electrical and Electronics Engineers et al. | 2003
- 273
-
Integration of Trusted Operating System from Open SourceLu, Y. F. / Kuo, C. F. / Institute of Electrical and Electronics Engineers et al. | 2003
- 281
-
Automatic Biometric Identification System by Hand Geometrylez, S. G. / Travieso, C. M. / Alonso, J. B. / Ferrer, M. A. / Institute of Electrical and Electronics Engineers et al. | 2003
- 285
-
Facial Image Database for Law Enforcement Application An ImplementationLai, P. J. / Wang, J. H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 290
-
Face Recognition in Transformed DomainZanuy, M. F. / Institute of Electrical and Electronics Engineers et al. | 2003
- 298
-
3D Visualization to Support Airport Security OperationsKoch, D. B. / Institute of Electrical and Electronics Engineers et al. | 2003
- 305
-
Airport Access Control StandardsWilkinson, C. / Rao, E. / Institute of Electrical and Electronics Engineers et al. | 2003
- 314
-
Secure Identity Authentication and Logical Access Control for Airport Info SystemDavid, M. W. / Hussein, G. / Sakurai, K. / Institute of Electrical and Electronics Engineers et al. | 2003
- 321
-
A Wavelet-Based Public Key Image Authentication WatermarkingFan, K. C. / Wang, S. W. / Chen, C. C. / Institute of Electrical and Electronics Engineers et al. | 2003
- 325
-
Adaptive Digital Watermarking Using Neural Network TechniqueLou, D. C. / Hu, M. C. / Liu, J. L. / Institute of Electrical and Electronics Engineers et al. | 2003
- 333
-
Defining Requirement for Network Solution in Protection ProfilesSung, Y. G. / Yi, E. K. / No, B. G. / Kim, J. S. / Institute of Electrical and Electronics Engineers et al. | 2003
- 337
-
Assigning Cryptographic Keys to Access Control in a Multi-Attribute HierarchyGuan, B. C. / Wang, P. / Chen, Y. F. / Chang, R. I. / Institute of Electrical and Electronics Engineers et al. | 2003
- 341
-
Constructing Auditing Rules from ERP System: A Business Process Flow ApproachHung, Y. H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 349
-
Cryptanalysis of a Fingerprint-based Remote User Authentication Scheme Using Smart CardsHsieh, B. T. / Yeh, H. T. / Sun, H. M. / Lin, C. T. / Institute of Electrical and Electronics Engineers et al. | 2003
- 351
-
Countermeasures in Curbing Gambling Activities on Internet in TaiwanWang, S. J. / Ke, H. J. / Institute of Electrical and Electronics Engineers et al. | 2003
- 354
-
Firearm DataloggersSutcliff, J. D. / Institute of Electrical and Electronics Engineers et al. | 2003
- 358
-
The Analysis of Primer Mixtures and Gunshot Residues Using Scanning Electron Microscop / Energy Dispersive X-ray AnalysisMeng, H. H. / Lee, H. C. / Chen, Y. L. / Institute of Electrical and Electronics Engineers et al. | 2003
- 364
-
The Safety Helmet Detection for ATM's Surveillance System via Modified Hough TransformWen, C. Y. / Chiu, S. H. / Liaw, J. J. / Lu, C. P. / Institute of Electrical and Electronics Engineers et al. | 2003
- 370
-
Digital Watermarking Using Multiresolution Wavelet TransformLou, D. C. / Chang, M. C. / Liu, J. L. / Institute of Electrical and Electronics Engineers et al. | 2003
- 378
-
Recommendation of Information Sharing and Analysis Center-A Suggestion of Defensive Mechanism against Mainland China Hacker EventsFarn, K. J. / Fung, A. R. W. / Lin, A. C. / Institute of Electrical and Electronics Engineers et al. | 2003
- 386
-
A Study of Information and Communication Security Forensic Technology Capability in TaiwanLin, I. L. / Yang, H. C. / Gu, G. L. / Liu, A. C. / Institute of Electrical and Electronics Engineers et al. | 2003
- 394
-
Robust Image Watermarking Based on Hybrid TransformationLou, D. C. / Sung, C. H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 400
-
A Robust Watermarking and Image Authentication TechniqueTruong, T. K. / Kung, C. M. / Jeng, J. H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 405
-
The Development of PKI Interoperability in TaiwanTai, G. C. / Ou, C. M. / Institute of Electrical and Electronics Engineers et al. | 2003
- 410
-
Video Watermarking Synchronization Based on Profile StatisticsSun, S. W. / Chang, P. C. / Institute of Electrical and Electronics Engineers et al. | 2003
- 414
-
Vulnerability Assessment SystemYing, C. / Tsai, A. / Chang, T. / Yu, H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 422
-
Visual Robust Oblivious Watermarking TechniqueKung, C. H. / Jeng, J. H. / Hsiao, H. H. / Yan, Y. H. / Cheng, W. S. / Institute of Electrical and Electronics Engineers et al. | 2003
- 428
-
A Hybrid Intelligent Intrusion Detection System to Recognize Novel AttacksTsai, D. R. / Tai, W. P. / Chang, C. F. / Institute of Electrical and Electronics Engineers et al. | 2003
- 435
-
Securing a Restricted Site-Biometric Authentication at Entry PointKulula, E. / Elliott, S. J. / Institute of Electrical and Electronics Engineers et al. | 2003
- 440
-
Performance Evaluation and Improvement of Speaker Recognition over GSM EnvironmentTan, T. H. / Chang, S. W. / Yang, C. H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 444
-
Securing the Biometric ModelElliott, S. J. / Leniski, A. C. / McGann, S. F. / Skinner, R. C. / Institute of Electrical and Electronics Engineers et al. | 2003
- 450
-
Trace Copy Forgery Detection for Handwritten Signature VerificationDeng, P. S. / Jaw, L. J. / Wang, J. H. / Tung, C. T. / Institute of Electrical and Electronics Engineers et al. | 2003
- 456
-
Efficient Method for Security Image Data CompressionKlima, M. / Pata, P. / Institute of Electrical and Electronics Engineers et al. | 2003
- 460
-
Detecting Offensive Routers - A Straightforward ApproachWang, B. T. / Schulzrinne, H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 468
-
SIM Based Subscriber Authentication for Wireless Local Area NetworksTsai, Y. R. / Chang, C. J. / Institute of Electrical and Electronics Engineers et al. | 2003
- 474
-
Cryptanalysis of a Strong Proxy Signature Scheme with Proxy Signer Privacy ProtectionSun, H. M. / Hsieh, B. T. / Institute of Electrical and Electronics Engineers et al. | 2003
- 477
-
Building Intrusion Pattern Miner for Snort Network Intrusion Detection SystemChen, S. F. / Wu, L. C. / Institute of Electrical and Electronics Engineers et al. | 2003
- 485
-
Design of an Active Intrusion Monitor SystemHuang, I. H. / Yang, C. Z. / Institute of Electrical and Electronics Engineers et al. | 2003
- 493
-
Protocol Based Foresight Anomaly Intrusion Detection SystemTsai, M. K. / Lin, S. C. / Tseng, S. S. / Institute of Electrical and Electronics Engineers et al. | 2003
- 501
-
The Neuron Security of Joint Defense for Network Intrusion DetectionWu, J. S. / Institute of Electrical and Electronics Engineers et al. | 2003
- 508
-
The Use of Laser Scanning Technology for Perimeter ProtectionHosmer, P. / Institute of Electrical and Electronics Engineers et al. | 2003
- 515
-
External Second Gate, Fourier Transform Ion Mobility Spectrometry: Parametric Optimization for Detection of Weapons of Mass DestructionTarver, E. E. / Institute of Electrical and Electronics Engineers et al. | 2003
- 523
-
Specification of a Video Test Imagery Library (VITAL)Baker, D. / Thomas, N. / Institute of Electrical and Electronics Engineers et al. | 2003
- 527
-
Face Recognition for Images from the Same Unknown PersonHuang, Y. S. / Tsai, Y. H. / Chao, H. H. / Chien, Y. T. / Institute of Electrical and Electronics Engineers et al. | 2003
- 531
-
Facial Recognition at Purdue University Airport-2003-2008Morton, J. M. / Portell, C. M. / Elliott, S. J. / Kukula, E. P. / Institute of Electrical and Electronics Engineers et al. | 2003
- 535
-
Contingency Planning: Emergency Preparedness for Terrorist AttacksWang, H. M. / Institute of Electrical and Electronics Engineers et al. | 2003
- 544
-
TSRG Randomized CryptosystemHussein, G. A. / David, M. W. / Institute of Electrical and Electronics Engineers et al. | 2003
- 552
-
Audio Content Based Feature Extraction on Subband DomainShieh, J. J. R. / Institute of Electrical and Electronics Engineers et al. | 2003
- 556
-
ID-Based Cryptographic Schemes Based on Factoring and Discrete LogarithmsSu, P. C. / Lu, E. H. / Chang, H. K. C. / Institute of Electrical and Electronics Engineers et al. | 2003
- 564
-
An Encryption Scheme for Large Chinese TextsGuan, B. C. / Wei, Y. C. / Hu, C. L. / Chiu, Y. L. / Chang, R. I. / Institute of Electrical and Electronics Engineers et al. | 2003
- 569
-
Implementing the RSA Algorithm on the TI TMS320C55x FamilyHwang, R. J. / Su, F. F. / Huang, L. S. / Peng, J. K. / Institute of Electrical and Electronics Engineers et al. | 2003
- 573
-
Fast Implementation of AES Cryptographic Algorithms in Smart CardsLu, C. F. / Chiang, H. L. / Yang, C. H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 580
-
A Host-Based Real-Time Intrusion Detection System with Data Mining and Forensic TechniquesLeu, F. Y. / Yang, T. Y. / Institute of Electrical and Electronics Engineers et al. | 2003
- 587
-
Proxy Certificates Based Digital Fingerprinting Scheme for Mobile CommunicationChoi, J. G. / Sakurai, K. C. / Park, J. H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 595
-
A Robust Method for Software Self-DefenseDeng, P. S. / Shieh, W. G. / Wang, J. H. / Tung, C. T. / Yen, C. P. / Institute of Electrical and Electronics Engineers et al. | 2003
- 600
-
Intelligent Automatic Malicious Code Signatures ExtractionDeng, P. S. / Wang, J. H. / Shieh, W. G. / Yen, C. P. / Tung, C. T. / Institute of Electrical and Electronics Engineers et al. | 2003
-
Proceedings IEEE 36th Annual 2002 International Carnahan Conference on Security Technology (Cat. No.02CH37348)| 2002