Structural Properties of Cryptographic Sequences (Englisch)
- Neue Suche nach: Fuster-Sabater, A.
- Neue Suche nach: Fuster-Sabater, A.
- Neue Suche nach: Herrero, A.
- Neue Suche nach: Corchado, E.
In:
International Workshop on Computational Intelligence in Security for Information Systems
;
127-134
;
2011
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Structural Properties of Cryptographic Sequences
-
Beteiligte:
-
Kongress:4th, International Workshop on Computational Intelligence in Security for Information Systems ; 2011 ; Torremolinos, Spain
-
Erschienen in:LECTURE NOTES IN COMPUTER SCIENCE ; 6694 ; 127-134
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Heidelberg
-
Erscheinungsdatum:01.01.2011
-
Format / Umfang:8 pages
-
Anmerkungen:Includes bibliographical references and author index
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Collective Classification for Spam FilteringLaorden, C. / Sanz, B. / Santos, I. / Galan-Garcia, P. / Bringas, P.G. et al. | 2011
- 9
-
Detecting Bad-Mouthing Attacks on Reputation Systems Using Self-Organizing MapsBankovic, Z. / Vallejo, J.C. / Fraga, D. / Moya, J.M. et al. | 2011
- 17
-
Approach Based Ensemble Methods for Better and Faster Intrusion DetectionBahri, E. / Harbi, N. / Huu, H.N. et al. | 2011
- 25
-
Application of the Generic Feature Selection Measure in Detection of Web AttacksNguyen, H.T. / Torrano-Gimenez, C. / Alvarez, G. / Petrovic, S. / Franke, K. et al. | 2011
- 33
-
Data Aggregation Based on Fuzzy Logic for VANETsCaballero-Gil, P. / Molina-Gil, J. / Caballero-Gil, C. et al. | 2011
- 41
-
Digging into IP Flow Records with a Visual Kernel MethodWagner, C. / Wagener, G. / State, R. / Engel, T. et al. | 2011
- 50
-
Opcode-Sequence-Based Semi-supervised Unknown Malware DetectionSantos, I. / Sanz, B. / Laorden, C. / Brezo, F. / Bringas, P.G. et al. | 2011
- 58
-
A New Alert Correlation Algorithm Based on Attack GraphRoschke, S. / Cheng, F. / Meinel, C. et al. | 2011
- 68
-
A Qualitative Survey of Active TCP/IP Fingerprinting Tools and Techniques for Operating Systems IdentificationMedeiros, J.P.S. / de Medeiros Brito Junior, A. / Pires, P.S.M. et al. | 2011
- 76
-
Security Alert Correlation Using Growing Neural GasMora-Gimeno, F.J. / Macia-Perez, F. / Lorenzo-Fonseca, I. / Gil-Martinez-Abarca, J.A. / Marcos-Jorquera, D. / Gilart-Iglesias, V. et al. | 2011
- 84
-
A Comparative Performance Evaluation of DNS Tunneling ToolsMerlo, A. / Papaleo, G. / Veneziano, S. / Aiello, M. et al. | 2011
- 92
-
Security Analysis and Complexity Comparison of Some Recent Lightweight RFID ProtocolsVahedi, E. / Ward, R.K. / Blake, I.F. et al. | 2011
- 100
-
A Secure and Efficient Searching Scheme for Trusted Nodes in a Peer-to-Peer NetworkSen, J. et al. | 2011
- 109
-
Testing Ensembles for Intrusion Detection: On the Identification of Mutated Network ScansGonzalez, S. / Sedano, J. / Herrero, A. / Baruque, B. / Corchado, E. et al. | 2011
- 118
-
An Intelligent Information Security Mechanism for the Network Layer of WSN: BIOSARPSaleem, K. / Fisal, N. / Hafizah, S. / Rashid, R.A. et al. | 2011
- 127
-
Structural Properties of Cryptographic SequencesFuster-Sabater, A. et al. | 2011
- 135
-
A Multisignature Scheme Based on the SDLP and on the IFPDiaz, R.D. / Encinas, L.H. / Masque, J.M. et al. | 2011
- 143
-
A Group Signature Scheme Based on the Integer Factorization and the Subgroup Discrete Logarithm ProblemsDiaz, R.D. / Encinas, L.H. / Masque, J.M. et al. | 2011
- 151
-
Keeping Group Communications Private: An Up-to-Date Review on Centralized Secure MulticastNaranjo, J.A.M. / Casado, L.G. et al. | 2011
- 160
-
Java Card Implementation of the Elliptic Curve Integrated Encryption Scheme Using Prime and Binary Finite FieldsMartinez, V.G. / Encinas, L.H. / Avila, C.S. et al. | 2011
- 168
-
Comprehensive Protection of RFID Traceability Information Systems Using Aggregate SignaturesAzuara, G. / Salazar, J.L. et al. | 2011
- 177
-
Cryptanalysis of Multicast Protocols with Key Refreshment Based on the Extended Euclidean AlgorithmPeinado, A. / Ortiz, A. et al. | 2011
- 183
-
Improving the Message Expansion of the Tangle Hash FunctionAlvarez, R. / Vicent, J.-F. / Zamora, A. et al. | 2011
- 190
-
Cryptosystem with One Dimensional Chaotic MapsMartinez-Nonthe, J.A. / Diaz-Mendez, A. / Cruz-Irisson, M. / Palacios-Luengas, L. / Del-Rio-Correa, J.L. / Vazquez-Medina, R. et al. | 2011
- 198
-
A Quantitative Analysis into the Economics of Correcting Software BugsWright, C.S. / Zia, T.A. et al. | 2011
- 206
-
Rationally Opting for the Insecure Alternative: Negative Externalities and the Selection of Security ControlsWright, C.S. / Zia, T.A. et al. | 2011
- 214
-
An Approach for Adapting Moodle into a Secure InfrastructureDiaz, J. / Arroyo, D. / Rodriguez, F.B. et al. | 2011
- 222
-
On Secure JAVA Application in SOA-Based PKI Mobile Government SystemsMarkovic, M. / Dordevic, G. et al. | 2011
- 230
-
Structural Feature Based Anomaly Detection for Packed Executable IdentificationUgarte-Pedrero, X. / Santos, I. / Bringas, P.G. et al. | 2011
- 238
-
Produre: A Novel Proximity Discovery Mechanism in Location Tagging SystemHu, J. / Wang, Y. / Yang, T. / Guan, Z. / Gui, N. / Chen, Z. et al. | 2011
- 246
-
Scientific Gateway and Visualization ToolPajorova, E. / Hluchy, L. et al. | 2011
- 251
-
An Innovative Framework for Securing Unstructured DocumentsAmato, F. / Casola, V. / Mazzeo, A. / Romano, S. et al. | 2011
- 259
-
Use of Schema Associative Mapping for Synchronization of the Virtual Machine Audit LogsThorpe, S. / Ray, I. / Grandison, T. et al. | 2011
- 265
-
Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping TechniquesThorpe, S. / Ray, I. / Grandison, T. et al. | 2011
- 272
-
Evaluating User-Centered Privacy Model (UPM) in Pervasive Computing SystemsDehghantanha, A. / Udzir, N.I. / Mahmod, R. et al. | 2011
- 285
-
An Innovative Linkage Learning Based on Differences in Local OptimumsParvin, H. / Minaei-Bidgoli, B. / Helmi, B.H. et al. | 2011
- 293
-
A New Particle Swarm Optimization for Dynamic EnvironmentsParvin, H. / Minaei, B. / Ghatei, S. et al. | 2011
- 301
-
A Classifier Ensemble for Face Recognition Using Gabor Wavelet FeaturesParvin, H. / Mozayani, N. / Beigi, A. et al. | 2011