Improving the Message Expansion of the Tangle Hash Function (Englisch)
- Neue Suche nach: Álvarez, Rafael
- Neue Suche nach: Vicent, José-Francisco
- Neue Suche nach: Zamora, Antonio
- Neue Suche nach: Álvarez, Rafael
- Neue Suche nach: Vicent, José-Francisco
- Neue Suche nach: Zamora, Antonio
In:
Computational Intelligence in Security for Information Systems
3
;
183-189
;
2011
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Improving the Message Expansion of the Tangle Hash Function
-
Beteiligte:
-
Erschienen in:Lecture Notes in Computer Science ; 6694, 3 ; 183-189
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2011
-
Format / Umfang:7 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Collective Classification for Spam FilteringLaorden, Carlos / Sanz, Borja / Santos, Igor / Galán-García, Patxi / Bringas, Pablo G. et al. | 2011
- 9
-
Detecting Bad-Mouthing Attacks on Reputation Systems Using Self-Organizing MapsBanković, Z. / Vallejo, J. C. / Fraga, D. / Moya, J. M. et al. | 2011
- 17
-
Approach Based Ensemble Methods for Better and Faster Intrusion DetectionBahri, Emna / Harbi, Nouria / Huu, Hoa Nguyen et al. | 2011
- 25
-
Application of the Generic Feature Selection Measure in Detection of Web AttacksNguyen, Hai Thanh / Torrano-Gimenez, Carmen / Alvarez, Gonzalo / Petrović, Slobodan / Franke, Katrin et al. | 2011
- 33
-
Data Aggregation Based on Fuzzy Logic for VANETsCaballero-Gil, P. / Molina-Gil, J. / Caballero-Gil, C. et al. | 2011
- 41
-
Digging into IP Flow Records with a Visual Kernel MethodWagner, Cynthia / Wagener, Gerard / State, Radu / Engel, Thomas et al. | 2011
- 50
-
Opcode-Sequence-Based Semi-supervised Unknown Malware DetectionSantos, Igor / Sanz, Borja / Laorden, Carlos / Brezo, Felix / Bringas, Pablo G. et al. | 2011
- 58
-
A New Alert Correlation Algorithm Based on Attack GraphRoschke, Sebastian / Cheng, Feng / Meinel, Christoph et al. | 2011
- 68
-
A Qualitative Survey of Active TCP/IP Fingerprinting Tools and Techniques for Operating Systems IdentificationMedeiros, João Paulo S. / Medeiros Brito Júnior, Agostinho / Motta Pires, Paulo S. et al. | 2011
- 76
-
Security Alert Correlation Using Growing Neural GasMora-Gimeno, Francisco José / Maciá-Pérez, Francisco / Lorenzo-Fonseca, Iren / Gil-Martínez-Abarca, Juan Antonio / Marcos-Jorquera, Diego / Gilart-Iglesias, Virgilio et al. | 2011
- 84
-
A Comparative Performance Evaluation of DNS Tunneling ToolsMerlo, Alessio / Papaleo, Gianluca / Veneziano, Stefano / Aiello, Maurizio et al. | 2011
- 92
-
Security Analysis and Complexity Comparison of Some Recent Lightweight RFID ProtocolsVahedi, Ehsan / Ward, Rabab K. / Blake, Ian F. et al. | 2011
- 100
-
A Secure and Efficient Searching Scheme for Trusted Nodes in a Peer-to-Peer NetworkSen, Jaydip et al. | 2011
- 109
-
Testing Ensembles for Intrusion Detection: On the Identification of Mutated Network ScansGonzález, Silvia / Sedano, Javier / Herrero, Álvaro / Baruque, Bruno / Corchado, Emilio et al. | 2011
- 118
-
An Intelligent Information Security Mechanism for the Network Layer of WSN: BIOSARPSaleem, Kashif / Fisal, Norsheila / Hafizah, Sharifah / Rashid, Rozeha A. et al. | 2011
- 127
-
Structural Properties of Cryptographic SequencesFúster-Sabater, A. et al. | 2011
- 135
-
A Multisignature Scheme Based on the SDLP and on the IFPDurán Díaz, R. / Hernández Encinas, L. / Muñoz Masqué, J. et al. | 2011
- 143
-
A Group Signature Scheme Based on the Integer Factorization and the Subgroup Discrete Logarithm ProblemsDurán Díaz, R. / Hernández Encinas, L. / Muñoz Masqué, J. et al. | 2011
- 151
-
Keeping Group Communications Private: An Up-to-Date Review on Centralized Secure MulticastNaranjo, J. A. M. / Casado, L. G. et al. | 2011
- 160
-
Java Card Implementation of the Elliptic Curve Integrated Encryption Scheme Using Prime and Binary Finite FieldsGayoso Martínez, V. / Hernández Encinas, L. / Sánchez Ávila, C. et al. | 2011
- 168
-
Comprehensive Protection of RFID Traceability Information Systems Using Aggregate SignaturesAzuara, Guillermo / Salazar, José Luis et al. | 2011
- 177
-
Cryptanalysis of Multicast Protocols with Key Refreshment Based on the Extended Euclidean AlgorithmPeinado, Alberto / Ortiz, Andrés et al. | 2011
- 183
-
Improving the Message Expansion of the Tangle Hash FunctionÁlvarez, Rafael / Vicent, José-Francisco / Zamora, Antonio et al. | 2011
- 190
-
Cryptosystem with One Dimensional Chaotic MapsMartínez-Ñonthe, J. A. / Díaz-Méndez, A. / Cruz-Irisson, M. / Palacios-Luengas, L. / Del-Río-Correa, J. L. / Vázquez-Medina, R. et al. | 2011
- 198
-
A Quantitative Analysis into the Economics of Correcting Software BugsWright, Craig S. / Zia, Tanveer A. et al. | 2011
- 206
-
Rationally Opting for the Insecure Alternative: Negative Externalities and the Selection of Security ControlsWright, Craig S. / Zia, Tanveer A. et al. | 2011
- 214
-
An Approach for Adapting Moodle into a Secure InfrastructureDiaz, Jesus / Arroyo, David / Rodriguez, Francisco B. et al. | 2011
- 222
-
On Secure JAVA Application in SOA-Based PKI Mobile Government SystemsMarković, Milan / Đorđević, Goran et al. | 2011
- 230
-
Structural Feature Based Anomaly Detection for Packed Executable IdentificationUgarte-Pedrero, Xabier / Santos, Igor / Bringas, Pablo G. et al. | 2011
- 238
-
Produre: A Novel Proximity Discovery Mechanism in Location Tagging SystemHu, Jianbin / Wang, Yonggang / Yang, Tao / Guan, Zhi / Gui, Nike / Chen, Zhong et al. | 2011
- 246
-
Scientific Gateway and Visualization ToolPajorová, Eva / Hluchý, Ladislav et al. | 2011
- 251
-
An Innovative Framework for Securing Unstructured DocumentsAmato, Flora / Casola, Valentina / Mazzeo, Antonino / Romano, Sara et al. | 2011
- 259
-
Use of Schema Associative Mapping for Synchronization of the Virtual Machine Audit LogsThorpe, Sean / Ray, Indrajit / Grandison, Tyrone et al. | 2011
- 265
-
Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping TechniquesThorpe, Sean / Ray, Indrajit / Grandison, Tyrone et al. | 2011
- 272
-
Evaluating User-Centered Privacy Model (UPM) in Pervasive Computing SystemsDehghantanha, Ali / Udzir, Nur Izura / Mahmod, Ramlan et al. | 2011
- 285
-
An Innovative Linkage Learning Based on Differences in Local OptimumsParvin, Hamid / Minaei-Bidgoli, Behrouz / Helmi, B. Hoda et al. | 2011
- 293
-
A New Particle Swarm Optimization for Dynamic EnvironmentsParvin, Hamid / Minaei, Behrouz / Ghatei, Sajjad et al. | 2011
- 301
-
A Classifier Ensemble for Face Recognition Using Gabor Wavelet FeaturesParvin, Hamid / Mozayani, Nasser / Beigi, Akram et al. | 2011