A Risk Assessment System for Facilities (Englisch)
- Neue Suche nach: Wood, T. M.
- Neue Suche nach: King, S. G.
- Neue Suche nach: Institute of Electrical and Electronics Engineers
- Neue Suche nach: Wood, T. M.
- Neue Suche nach: King, S. G.
- Neue Suche nach: Sanson, L. D.
- Neue Suche nach: Institute of Electrical and Electronics Engineers
In:
Security technology
;
196-199
;
2003
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:A Risk Assessment System for Facilities
-
Beteiligte:Wood, T. M. ( Autor:in ) / King, S. G. ( Autor:in ) / Sanson, L. D. / Institute of Electrical and Electronics Engineers
-
Kongress:Annual international Carnahan conference; 36th, Security technology ; 2003 ; Taipei, Taiwan
-
Erschienen in:Security technology ; 196-199
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsdatum:01.01.2003
-
Format / Umfang:4 pages
-
Anmerkungen:IEEE Cat no 02CH37348
-
ISBN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Testing and evaluating counterterrorism technologyKing, S.G. / Stewart, J.W. / Wood, T.M. et al. | 2003
- 1
-
Testing and Evaluation Counterterrorism TechnologyKing, S. G. / Wood, T. M. / Stewart, J. W. / Institute of Electrical and Electronics Engineers et al. | 2003
- 8
-
Understanding concepts in the defence in depth strategySmith, C.L. et al. | 2003
- 15
-
Author index| 2002
- 17
-
IntelliFIBER/spl trade/: fiber optic fence sensor developmentsMaki, M.C. / Weese, J.K. et al. | 2003
- 17
-
IntelliFIBER Fiber Optic Fence Sensor DevelopmentsMak, M. / Weese, J. / Institute of Electrical and Electronics Engineers et al. | 2003
- 17
-
The Center for Civil Force ProtectionSmith, G.J. et al. | 2002
- 19
-
US Department of Energy security technologiesBowser, G.H. / Piechowski, C.J. / Pocratsky, C.A. / Sparks, M.H. et al. | 2002
- 23
-
A research of information and communication security forensic mechanism in TaiwanI-Long Lin, / Tian-Shing Lan, / Jia-Chyi Wu, et al. | 2003
- 25
-
Secure Flow: a totally integrated transportation security systemPolillo, R.R. et al. | 2002
- 29
-
An infrastructure vulnerability assessment methodology for metropolitan areasBiersack, W.M. / Hyder, C.B. / James, J.W. / King, S.G. / Kruse, E.M. / Veatch, J.D. / Wood, T.M. et al. | 2002
- 30
-
Intelligence security home networkVolner, R. / Pousek, L. et al. | 2003
- 35
-
Multiscale analysis for iris biometricsSanchez-Avila, C. / Sanchez-Reillo, R. et al. | 2002
- 38
-
Design of SPS model using mobile agent systemJin-Ho Park, / Jin-Wook Chung, et al. | 2003
- 39
-
Biometric identification system by lip shapeGomez, E. / Travieso, C.M. / Briceno, J.C. / Ferrer, M.A. et al. | 2002
- 43
-
Mathematical Morphology Approaches for Fingerprints ThinningEspinosa-Duro, V. / Institute of Electrical and Electronics Engineers et al. | 2002
- 43
-
Pocket device for authentication and data integrity on Internet banking applicationsde la Puente, F. / Sandoval, J.D. / Hernandez, P. et al. | 2003
- 43
-
Mathematical morphology approaches for fingerprint thinningEspinosa-Duro, V. et al. | 2002
- 46
-
Microprocessor smart cards with fingerprint user authenticationSanchez-Reillo, R. / Sanchez-Avila, C. / Mengibar-Pozo, L. et al. | 2002
- 50
-
A system and method for enhanced psychophysiological detection of deceptionMcClure, J. / Ames, W.I. / McGraw, T.F. / Gouin, J.-L. et al. | 2002
- 51
-
On the security of multimedia video informationShieh, J.-R.J. et al. | 2003
- 57
-
An extended object-oriented security model for high secure office environmentsBao-Chyuan Guan, / Ping Wang, / Chen, S.-J. / Chang, R.-I. et al. | 2003
- 60
-
Motion signature analysis for microwave detection systemsLester, A.J. / Smith, C.L. et al. | 2002
- 62
-
Progressive watermarking techniques with genetic algorithmsHuang, H.-C. / Pan, J.-S. / Shieh, C.-S. / Wang, F.-H. et al. | 2003
- 66
-
Vessel identification and monitoring systems for maritime securityShwu-Jing Chang, et al. | 2003
- 71
-
A novel sensor application to increase security of prisoners in community hospitalsTucknutt, M.D. et al. | 2002
- 71
-
Virus detection using data mining techinquesJau-Hwang Wang, / Deng, P.S. / Yi-Shen Fan, / Li-Jing Jaw, / Yu-Ching Liu, et al. | 2003
- 71
-
Virus Detection Using Data Mining TechniquesWang, J. H. / Deng, P. S. / Fan, Y. S. / Jaw, L. J. / Liu, Y. C. / Institute of Electrical and Electronics Engineers et al. | 2003
- 75
-
Man portable sensor technology for use in dynamic environments with multiple areas for concealmentRoberts, M.K. et al. | 2002
- 77
-
New development in portable sensor allows low-cost components to be left behind (disposable)Gagnon, A. et al. | 2003
- 77
-
New Development in Portable Sensor Allows Low-Cost Component to be Left Behind (Disposable)Andre, G. / Institute of Electrical and Electronics Engineers et al. | 2003
- 80
-
Intrepid MicroPoint system - European fence experienceBackx, A.J. / Harman, R.K. et al. | 2002
- 83
-
And-CFAR and Or-CFAR detectors design in Weibull backgroundLiu, W. / Liu, X. et al. | 2003
- 87
-
Critical asset protection, perimeter monitoring and threat detection using automated video surveillance - a technology overview with case studiesHeartwell, C.H. / Lipton, A.J. et al. | 2002
- 87
-
A detection algorithm for road feature extraction using EO-1 hyperspectral imagesTzu-Lung Sun, et al. | 2003
- 88
-
First response to terrorist bombingsKing, S.G. / Wood, T.M. / Priem, R.G. et al. | 2002
- 94
-
September 11, 2001 - response to the PentagonWood, T.M. / King, S.G. et al. | 2002
- 96
-
Millimeter wave control switch for secure giga-scale systemFu, J.S. / Cai, C. / Lu, Y. / Shen, Z. et al. | 2003
- 100
-
Secure 77GHz Vivaldi antenna for millimeter wave communicationChong, L.P. / Ng, P.T. / Fu, J.S. et al. | 2003
- 102
-
A First Step Toward Automatic Hoax DetectionHernandez, J. C. / Hernandez, C. J. / Sierra, J. M. / Ribagorda, A. / Institute of Electrical and Electronics Engineers et al. | 2002
- 102
-
A first step towards automatic hoax detectionHernandez, J.C. / Hernandez, C.J. / Sierra, J.M. / Ribagorda, A. et al. | 2002
- 104
-
An intelligent real-time fire-detection method based on video processingThou-Ho Chen, / Cheng-Liang Kao, / Sju-Mo Chang, et al. | 2003
- 112
-
Security of ZLYH-key authentication schemeJae-Min Lee, / Kee-Won Kim, / Eun-Kyung Ryu, / Hyung-Mok Lee, / Kee-Young Yoo, et al. | 2003
- 115
-
On the use of trusted objects to enforce isolation between processes and dataTarman, T.D. / Witzke, E.L. / Pierson, L.G. / Campbell, P.L. et al. | 2002
- 115
-
A new convertible group signature scheme on the basis of dual complexitiesJonathan Jen-Rong Chen, / Richard Wen-Mao Lin, / An-Pin Chen, et al. | 2003
- 120
-
Improving security in information technology using cryptographic hardware modulesSanchez-Reillo, R. / Sanchez-Avila, C. / Lopez-Ongil, C. / Entrena-Arrontes, L. et al. | 2002
- 123
-
A novel blind signature scheme possessed with dual protectionsJen-Rong Chen, J. / An-Pin Chen, / Wen-Mao Lin, R. et al. | 2003
- 124
-
Compulsive votingHernandez, J.C. / Sierra, J.M. / Hernandez, C.J. / Ribagorda, A. et al. | 2002
- 128
-
A simple key agreement protocolEun-Kyung Ryu, / Kee-Won Kim, / Kee-Young Yoo, et al. | 2003
- 132
-
A novel round function architecture for AES encryption/decryption utilizing look-up tableJhing-Fa Wang, / Sun-Wei Chang, / Po-Chuan Lin, et al. | 2003
- 134
-
Migration of Internet security protocols to the IPSEC frameworkSierra, J.M. / Hernandez, J.C. / Ribagorda, A. / Jayaram, N. et al. | 2002
- 137
-
An Integrated User Authentication and Access Control Scheme without PublicChien, H. Y. / Jan, J. K. / Institute of Electrical and Electronics Engineers et al. | 2003
- 137
-
An integrated user authentication and access control scheme without public key cryptographyHung-Yu Chien, / Jinn-Ke Jan, et al. | 2003
- 144
-
Security system throughput modelingLeone, K. et al. | 2002
- 144
-
An Authorization Mechanism for Web Services Using Attribute CertificateKim, K. N. / Kang, M. H. / Ryou, H. B. / Institute of Electrical and Electronics Engineers et al. | 2003
- 144
-
An authorization mechanism for Web services using an attribute certificateMyung-Hee Kang, / Kyung-Nam Kim, / Hwang-Bin Ryou, et al. | 2003
- 151
-
Achieving database accountability and traceability using the bitemporal relationHsiang-Hui Chen, / Kwo-Jean Farn, / Dwen-Ren Tsai, et al. | 2003
- 151
-
IP@SS - Integrated Passenger Security SolutionsYahav, Y. / Institute of Electrical and Electronics Engineers et al. | 2002
- 154
-
Information systems security in an airport environmentWilson, D.L. et al. | 2002
- 157
-
Design of a computer-aided system for risk assessment on information systemsGen-Yih Liao, / Chen-Hwa Song, et al. | 2003
- 158
-
Smart card technology with case studiesCarr, M.R. et al. | 2002
- 160
-
Interface and usability assessment of imaging systemsKlock, B.A. et al. | 2002
- 162
-
Millimetre wave aviation security scannerMurphy, K.S.J. / Appleby, R. / Sinclair, G. / McClumpha, A. / Tatlock, K. / Doney, R. / Hutcheson, I. et al. | 2002
- 163
-
An electronic voting scheme based on undeniable blind signature schemeSung-Hyun Yun, / Sung-Jin Lee, et al. | 2003
- 167
-
Detection of illegal passengers in lorries using a passive millimetre wave scannerSinclair, G.N. / Coward, P.R. / Anderton, R.N. / Appleby, R. / Seys, T. / Southwood, P. et al. | 2002
- 168
-
Evaluation of information security related risks of an organization: the application of the multicriteria decision-making methodBao-Chyuan Guan, / Chi-Chun Lo, / Ping Wang, / Jaw-Shi Hwang, et al. | 2003
- 168
-
Evaluation of Info Security Related Risks of an Organization-The Application of the Multi-Criteria Decision Making MethodGuan, B. C. / Lo, C. C. / Wang, P. / Hwang, J. S. / Institute of Electrical and Electronics Engineers et al. | 2003
- 171
-
Field testing of outdoor intrusion detection sensorsMaki, M. / Nieh, R. / Dickie, M. et al. | 2002
- 176
-
From Web server security to Web components securitySheng-Kang Lin, et al. | 2003
- 179
-
Representation of weather and terrain effects on intrusion detectionPeck, L. et al. | 2002
- 183
-
A panoramic stabilized periscope with common optical pathPing-Ho Chen, et al. | 2003
- 190
-
A real-time security surveillance system for personal authenticationYi-Tsung Chien, / Yea-Shuan Huang, / Sheng-Wen Jeng, / Yao-Hong Tasi, / Hung-Xin Zhao, et al. | 2003
- 191
-
Intrepid MicroTrack leaky cable sensorHarman, R.K. et al. | 2002
- 196
-
A Risk Assessment System for FacilitiesWood, T. M. / King, S. G. / Institute of Electrical and Electronics Engineers et al. | 2003
- 196
-
A risk assessment system for multi-facility organizationsWood, T.M. / King, S.G. / Kennon, J.W. et al. | 2003
- 198
-
Some remarks on very high-rate image compression and its impact on security image data subjective evaluationKlima, M. / Kloucek, V. et al. | 2002
- 200
-
An Auto Bi-Directional Passing-People Counting Method Based on Color Image ProcessingChen, T. H. / Hsu, C. W. / Institute of Electrical and Electronics Engineers et al. | 2003
- 200
-
An automatic bi-directional passing-people counting method based on color image processingThou-Ho Chen, et al. | 2003
- 202
-
AMETHYST: automatic alarm assessmentMockler, S. / Clarke, N. et al. | 2002
- 208
-
Motion tracking of multi-objects for access surveillance based on the panoramic imaging systemMin-Cheng Pan, / Yau-Liang Tsai, / Ying-Jieh Huang, et al. | 2003
- 209
-
CATV security architectureVolner, R. et al. | 2002
- 216
-
Linescan imaging of ballistics projectile markings for identificationSmith, C.L. et al. | 2002
- 216
-
A new security key exchange channel for 802.11 WLANsYen-Chieh Ouyang, / Reay-Lin Chang, / Ji-Hau Chiu, et al. | 2003
- 222
-
Application of certificate on the ECC authentication protocol for point-to-point communicationsJeich Mar, / Ko-Ming Lee, et al. | 2003
- 223
-
Digital video recorder selection for a casinoBurleson-Webb, K. et al. | 2002
- 225
-
Design and implementation of smartcard-based secure e-mail communicationHsien-Hau Chen, / Yung-Sheng Chen, / Hsia-Ling Chiang, / Chung-Huang Yang, et al. | 2003
- 228
-
Multi-camera video surveillanceEllis, T. et al. | 2002
- 232
-
Hiding binary images behind noise with authentication capability: a new approach to covert communicationChih-Hsuan Tzeng, / Wen-Hsiang Tsai, et al. | 2003
- 232
-
Hiding Binary Images behind Noise with Authentication Capability -A New Approach to Convert CommunicationTzeng, C. H. / Tsai, W. H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 237
-
Integrate the structure of negotiation certification of set and the intelligent mobile agentPo-Hsian Huang, et al. | 2003
- 245
-
Light-weight authentication and billing in mobile communicationsHsing-Bai Chen, / Sue-Chen Hsueh, et al. | 2003
- 253
-
A group digital signature technique for authenticationChin-Ming Hsu, et al. | 2003
- 257
-
A knowledge-based model for defending distributed DoSShui-Sheng Lin, / Shun-Chieh Lin, / Shian-Shyong Tseng, et al. | 2003
- 257
-
A Knowledge-Based Model for Defending DDoSLin, S. S. / Lin, S. C. / Tseng, S. S. / Institute of Electrical and Electronics Engineers et al. | 2003
- 264
-
A novel public digital watermarking for still images based on encryption algorithmGwo-Chin Tai, / Long-Wen Chang, et al. | 2003
- 268
-
A new proxy signature scheme based on dual complexitiesChen, J.J.-R. / Pin-Tai Sun, / Chih-Lin Lin, et al. | 2003
- 273
-
Integration of trusted operating system from open sourceYung-Feng Lu, / Chin-Fu Kuo, / Chung-Hsin Chen, et al. | 2003
- 281
-
Automatic biometric identification system by hand geometryGonzalez, S. / Travieso, C.M. / Alonso, J.B. / Ferrer, M.A. et al. | 2003
- 285
-
Facial image database for law enforcement application: an implementationPo-Jen Lai, / Jau-Hwang Wang, et al. | 2003
- 290
-
Face Recognition in Transformed DomainZanuy, M. F. / Institute of Electrical and Electronics Engineers et al. | 2003
- 290
-
Face recognition in a transformed domainFaundez-Zanuy, M. et al. | 2003
- 298
-
3D visualization to support airport security operationsKoch, D.B. et al. | 2003
- 305
-
Airport access control standardsWilkinson, C. / Rao, E. et al. | 2003
- 314
-
Secure identity authentication and logical access control for airport information systemsDavid, M.W. / Hussein, G.A. / Sakurai, K. et al. | 2003
- 314
-
Secure Identity Authentication and Logical Access Control for Airport Info SystemDavid, M. W. / Hussein, G. / Sakurai, K. / Institute of Electrical and Electronics Engineers et al. | 2003
- 321
-
A wavelet-based public key image authentication watermarkingChien-Chang Chen, / Kang-Chih Fan, / Sheng-Wen Wang, et al. | 2003
- 325
-
Adaptive digital watermarking using neural network techniqueDer-Chyuan Lou, / Jiang-Lung Liu, / Ming-Chiang Hu, et al. | 2003
- 333
-
Defining requirements for network solution in protection profilesYune Gie Sung, / Eun-Kyoung Yi, / Byung-Gyu No, / Jae Sung Kim, et al. | 2003
- 333
-
Defining Requirement for Network Solution in Protection ProfilesSung, Y. G. / Yi, E. K. / No, B. G. / Kim, J. S. / Institute of Electrical and Electronics Engineers et al. | 2003
- 337
-
Assigning cryptographic keys to access control in a multi-attribute hierarchyBao-Chyuan Guan, / Ping Wang, / Yen-Fu Chen, / Ray-I Chang, et al. | 2003
- 341
-
Constructing auditing rules from ERP system: a business process flow approachYi-Hsuan Hung, et al. | 2003
- 349
-
Cryptanalysis of a fingerprint-based remote user authentication scheme using smart cardsBin-Tsan Hsieh, / Her-Tyan Yeh, / Hung-Min Sun, et al. | 2003
- 351
-
Countermeasures in Curbing Gambling Activities on Internet in TaiwanWang, S. J. / Ke, H. J. / Institute of Electrical and Electronics Engineers et al. | 2003
- 351
-
Countermeasures in curbing gambling activities on the Internet in TaiwanShiuh-Jeng Wang, / Hung-Jui Ke, et al. | 2003
- 354
-
Firearm dataloggersSutcliff, J. et al. | 2003
- 358
-
The Analysis of Primer Mixtures and Gunshot Residues Using Scanning Electron Microscop / Energy Dispersive X-ray AnalysisMeng, H. H. / Lee, H. C. / Chen, Y. L. / Institute of Electrical and Electronics Engineers et al. | 2003
- 358
-
The analysis of primer mixtures and gunshot residues using scanning electron microscopy/energy dispersive X-ray analysisHsien-Hui Meng, / Hsei-Chang Lee, / Yu-Liang Chen, et al. | 2003
- 364
-
The safety helmet detection for ATM's surveillance system via the modified Hough transformChe-Yen Wen, / Shih-Hsuan Chiu, / Jiun-Jian Liaw, / Chuan-Pin Lu, et al. | 2003
- 364
-
The Safety Helmet Detection for ATM's Surveillance System via Modified Hough TransformWen, C. Y. / Chiu, S. H. / Liaw, J. J. / Lu, C. P. / Institute of Electrical and Electronics Engineers et al. | 2003
- 370
-
Digital watermarking using multiresolution wavelet transformDer-Chyuan Lou, / Jiang-Lung Liu, / Ming-Chang Chang, et al. | 2003
- 378
-
Recommendation of Information Sharing and Analysis Center-A Suggestion of Defensive Mechanism against Mainland China Hacker EventsFarn, K. J. / Fung, A. R. W. / Lin, A. C. / Institute of Electrical and Electronics Engineers et al. | 2003
- 378
-
Recommendation of information sharing and analysis centerFarn, K.-J. / Fung, A.R.-W. / Lin, A.C. et al. | 2003
- 386
-
A study of information and communication security forensic technology capability in TaiwanI-Long Lin, / Hong-Cheng Yang, / Guo-Long Gu, / Lin, A.C. et al. | 2003
- 394
-
Robust image watermarking based on hybrid transformationDer-Chyuan Lou, / Chia-Hung Sung, et al. | 2003
- 400
-
A robust watermarking and image authentication techniqueKung, C.M. / Truong, T.K. / Jeng, J.H. et al. | 2003
- 405
-
The development of PKI interoperability in TaiwanGwo-Chin Tai, / Chung-Ming Ou, et al. | 2003
- 410
-
Video watermarking synchronization based on profile statisticsShih-Wei Sun, / Pao-Chi Chang, et al. | 2003
- 414
-
Vulnerability assessment system (VAS)Cabin Ying, / Tsai, A. / Yu, H. et al. | 2003
- 414
-
Vulnerability Assessment SystemYing, C. / Tsai, A. / Chang, T. / Yu, H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 422
-
Visual robust oblivious watermarking techniqueKung, C.H. / Hsiao, H.H. / Cheng, W.S. / Yan, Y.H. et al. | 2003
- 428
-
A hybrid intelligent intrusion detection system to recognize novel attacksDwen-Ren Tsai, / Wen-Pin Tai, / Chi-Fang Chang, et al. | 2003
- 435
-
Securing a restricted site - biometric authentication at entry pointKukula, E.P. / Elliott, S.J. et al. | 2003
- 440
-
Performance evaluation and improvement of speaker recognition over GSM environmentTan-Hsu Tan, / Shih-Wei Chang, / Chung-Ho Yang, et al. | 2003
- 444
-
Securing the biometric modelLeniski, A.C. / Skinner, R.C. / McGann, S.F. / Elliott, S.J. et al. | 2003
- 450
-
Trace copy forgery detection for handwritten signature verificationPeter Shaohua Deng, / Li-Jing Jaw, / Jau-Hwang Wang, / Cheng-Tan Tung, et al. | 2003
- 456
-
Efficient method for security image data compressionPata, P. / Klima, M. et al. | 2003
- 460
-
Detecting offensive routers: a straightforward approachWang, B.-T. / Schulzrinne, H. et al. | 2003
- 468
-
SIM-based subscriber authentication for wireless local area networksYuh-Ren Tsai, / Cheng-Ju Chang, et al. | 2003
- 474
-
Cryptanalysis of a strong proxy signature scheme with proxy signer privacy protectionHung-Min Sun, / Bin-Tsan Hsieh, et al. | 2003
- 477
-
Building intrusion pattern miner for snort network intrusion detection systemLih-Chyau Wuu, / Sout-Fong Chen, et al. | 2003
- 485
-
Design of an Active Intrusion Monitor SystemI-Hsuan Huang, / Cheng-Zen Yang, et al. | 2003
- 493
-
Protocol based foresight anomaly intrusion detection systemMeng-Kai Tsai, / Shun-Chieh Lin, / Shian-Shyong Tseng, et al. | 2003
- 501
-
The neuron security of joint defense for network intrusion detectionJain-Shing Wu, et al. | 2003
- 508
-
The use of laser scanning technology for perimeter protectionHosmer, P. et al. | 2003
- 515
-
External second gate Fourier transform ion mobility spectrometry: parametric optimization for detection of weapons of mass destructionTarver, E.E. et al. | 2003
- 523
-
Specification of a video test imagery library (VITAL)Baker, D. / Thomas, N. et al. | 2003
- 527
-
Face recognition for images from the same unknown personYea-Shuan Huang, / Yao-Hong Tsai, / Hong-Hsin Chao, / Yi-Tsung Chien, et al. | 2003
- 531
-
Facial Recognition at Purdue University Airport-2003-2008Morton, J. M. / Portell, C. M. / Elliott, S. J. / Kukula, E. P. / Institute of Electrical and Electronics Engineers et al. | 2003
- 531
-
Facial recognition at Purdue University's airport - 2003-2008Morton, J.M. / Portell, C.M. / Elliott, S.J. / Kukula, E.P. et al. | 2003
- 535
-
Contingency planning: emergency preparedness for terrorist attacksWang, H.-M. et al. | 2003
- 544
-
TSRG randomized cryptosystemHussein, G.A. / David, M.W. et al. | 2003
- 552
-
Audio content based feature extraction on subband domainShieh, J.-R.J. et al. | 2003
- 556
-
ID-based cryptographic schemes based on factoring and discrete logarithmsPin-Chang Su, / Erl-Huei Lu, / Henry Ker-Chang Chang, et al. | 2003
- 564
-
An encryption scheme for large Chinese textsBao-Chyuan Guan, / Ray-I Chang, / Yung Chung Wei, / Chia-Ling Hu, / Yu-Lin Chiu, et al. | 2003
- 569
-
Implementing the RSA algorithm on the TI TMS320C55x familyRen-Junn Hwang, / Feng-Fu Su, / Loang-Shing Huang, / Jen-Kang Peng, et al. | 2003
- 573
-
Fast implementation of AES cryptographic algorithms in smart cardsChi-Feng Lu, / Yan-Shun Kao, / Hsia-Ling Chiang, / Chung-Huang Yang, et al. | 2003
- 580
-
A host-based real-time intrusion detection system with data mining and forensic techniquesFang-Yie Leu, / Tzu-Yi Yang, et al. | 2003
- 587
-
Proxy certificates-based digital fingerprinting scheme for mobile communicationJae-Gwi Choi, / Kouichi Sakurai, / Ji-Hwan Park, et al. | 2003
- 595
-
A robust method for software self-defensePeter Shaohua Deng, / Wen-Gong Shieh, / Jau-Hwang Wang, / Cheng-Tan Tung, / Chih-Pin Yen, et al. | 2003
- 600
-
Intelligent automatic malicious code signatures extractionPeter Shaohua Deng, / Jau-Hwang Wang, / Wen-Gong Shieh, / Chin-Pin Yen, / Cheng-Tan Tung, et al. | 2003
-
Proceedings. IEEE 37th Annual 2003 International Carnahan Conference on Security Technology (IEEE Cat. No.03CH37458)| 2003
-
Proceedings IEEE 36th Annual 2002 International Carnahan Conference on Security Technology (Cat. No.02CH37348)| 2002