Representation of Weather and Terrain Effects on Intrusion Detection (English)
- New search for: Peck, L.
- New search for: Institute of Electrical and Electronics Engineers
- New search for: Peck, L.
- New search for: Sanson, L. D.
- New search for: Institute of Electrical and Electronics Engineers
In:
Security technology
;
179-190
;
2002
-
ISBN:
- Conference paper / Print
-
Title:Representation of Weather and Terrain Effects on Intrusion Detection
-
Contributors:
-
Conference:Annual international Carnahan conference; 36th, Security technology ; 2002 ; Atlantic City, NJ
-
Published in:Security technology ; 179-190
-
Publisher:
- New search for: IEEE
-
Publication date:2002-01-01
-
Size:12 pages
-
Remarks:IEEE Cat no 02CH37348
-
ISBN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Testing and Evaluation Counterterrorism TechnologyKing, S. G. / Wood, T. M. / Stewart, J. W. / Institute of Electrical and Electronics Engineers et al. | 2003
- 8
-
Understanding Concepts in the Defence in Depth StrategySmith, C. L. / Institute of Electrical and Electronics Engineers et al. | 2003
- 15
-
Author index| 2002
- 17
-
IntelliFIBER Fiber Optic Fence Sensor DevelopmentsMak, M. / Weese, J. / Institute of Electrical and Electronics Engineers et al. | 2003
- 17
-
The Center for Civil Force ProtectionSmith, G.J. et al. | 2002
- 19
-
US Department of Energy security technologiesBowser, G.H. / Piechowski, C.J. / Pocratsky, C.A. / Sparks, M.H. et al. | 2002
- 23
-
A Research of Information and Communication Security Forensic Mechanism in TaiwanLin, I. L. / Lan, T. S. / Wu, J. C. / Institute of Electrical and Electronics Engineers et al. | 2003
- 25
-
Secure Flow: a totally integrated transportation security systemPolillo, R.R. et al. | 2002
- 29
-
An infrastructure vulnerability assessment methodology for metropolitan areasBiersack, W.M. / Hyder, C.B. / James, J.W. / King, S.G. / Kruse, E.M. / Veatch, J.D. / Wood, T.M. et al. | 2002
- 30
-
Intelligence Security Home NetworkVolner, R. / Pousek, L. / Institute of Electrical and Electronics Engineers et al. | 2003
- 35
-
Multiscale analysis for iris biometricsSanchez-Avila, C. / Sanchez-Reillo, R. et al. | 2002
- 38
-
Design of SPS Model Using Mobile Agent SystemPark, J. / Chung, J. / Institute of Electrical and Electronics Engineers et al. | 2003
- 39
-
Biometric identification system by lip shapeGomez, E. / Travieso, C.M. / Briceno, J.C. / Ferrer, M.A. et al. | 2002
- 43
-
Mathematical Morphology Approaches for Fingerprints ThinningEspinosa-Duro, V. / Institute of Electrical and Electronics Engineers et al. | 2002
- 43
-
Pocket Device for Authentication and Data Integrity on Internet Banking Applicationsde la Puente, F. / Sandoval, J. D. / Hernandez, P. / Institute of Electrical and Electronics Engineers et al. | 2003
- 43
-
Mathematical morphology approaches for fingerprint thinningEspinosa-Duro, V. et al. | 2002
- 46
-
Microprocessor smart cards with fingerprint user authenticationSanchez-Reillo, R. / Sanchez-Avila, C. / Mengibar-Pozo, L. et al. | 2002
- 50
-
A system and method for enhanced psychophysiological detection of deceptionMcClure, J. / Ames, W.I. / McGraw, T.F. / Gouin, J.-L. et al. | 2002
- 51
-
On the Security of Multimedia Video InformationShieh, J. J. R. / Institute of Electrical and Electronics Engineers et al. | 2003
- 57
-
An Extended Object-Oriented Security Model for High Secure Office EnvironmentsGaun, B. C. / Wang, P. / Chen, S. J. / Chang, R. I. / Institute of Electrical and Electronics Engineers et al. | 2003
- 60
-
Motion signature analysis for microwave detection systemsLester, A.J. / Smith, C.L. et al. | 2002
- 62
-
Progressive Watermarking Techniques with Genetic AlgorithmsHuang, H. C. / Pan, J. S. / Shieh, C. S. / Wang, F. H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 66
-
Vessel Identification and Monitoring Systems for Maritime SecurityChang, S. J. / Institute of Electrical and Electronics Engineers et al. | 2003
- 71
-
A novel sensor application to increase security of prisoners in community hospitalsTucknutt, M.D. et al. | 2002
- 71
-
Virus Detection Using Data Mining TechniquesWang, J. H. / Deng, P. S. / Fan, Y. S. / Jaw, L. J. / Liu, Y. C. / Institute of Electrical and Electronics Engineers et al. | 2003
- 75
-
Man portable sensor technology for use in dynamic environments with multiple areas for concealmentRoberts, M.K. et al. | 2002
- 77
-
New Development in Portable Sensor Allows Low-Cost Component to be Left Behind (Disposable)Andre, G. / Institute of Electrical and Electronics Engineers et al. | 2003
- 80
-
Intrepid MicroPoint system - European fence experienceBackx, A.J. / Harman, R.K. et al. | 2002
- 83
-
And-CFAR and Or-CFAR Detectors Design in Weibull BackgroundLiu, X. H. / Liu, W. X. / Institute of Electrical and Electronics Engineers et al. | 2003
- 87
-
Critical asset protection, perimeter monitoring and threat detection using automated video surveillance - a technology overview with case studiesHeartwell, C.H. / Lipton, A.J. et al. | 2002
- 87
-
A Detection Algorithm for Road Feature Extraction Using EO-1 Hyperspectral ImagesSun, T. L. / Institute of Electrical and Electronics Engineers et al. | 2003
- 88
-
First response to terrorist bombingsKing, S.G. / Wood, T.M. / Priem, R.G. et al. | 2002
- 94
-
September 11, 2001 - response to the PentagonWood, T.M. / King, S.G. et al. | 2002
- 96
-
Millimeter Wave Control Switch for Secure Giga-Scale SystemFu, J. S. / Cai, C. / Lu, Y. / Shen, Z. X. / Institute of Electrical and Electronics Engineers et al. | 2003
- 100
-
Secure 77GHz Vivaldi Antenna for Millimeter Wave CommunicationChong, L. P. / Ng, P. T. / Fu, J. S. / Institute of Electrical and Electronics Engineers et al. | 2003
- 102
-
A First Step Toward Automatic Hoax DetectionHernandez, J. C. / Hernandez, C. J. / Sierra, J. M. / Ribagorda, A. / Institute of Electrical and Electronics Engineers et al. | 2002
- 102
-
A first step towards automatic hoax detectionHernandez, J.C. / Hernandez, C.J. / Sierra, J.M. / Ribagorda, A. et al. | 2002
- 104
-
An Intelligent Real Time Fire-Detection Method Based on Video ProcessingChen, T. H. / Kao, C. L. / Chang, S. M. / Institute of Electrical and Electronics Engineers et al. | 2003
- 112
-
Security of ZLYH-Key Authentication SchemeLee, J. M. / Ryu, E. K. / Kim, K. W. / Lee, H. M. / Yoo, K. Y. / Institute of Electrical and Electronics Engineers et al. | 2003
- 115
-
A New Convertible Group Signature Scheme on the Basis of Dual ComplexitiesChen, J. J. R. / Lin, W. M. / Chen, A. P. / Institute of Electrical and Electronics Engineers et al. | 2003
- 115
-
On the use of trusted objects to enforce isolation between processes and dataTarman, T.D. / Witzke, E.L. / Pierson, L.G. / Campbell, P.L. et al. | 2002
- 120
-
Improving security in information technology using cryptographic hardware modulesSanchez-Reillo, R. / Sanchez-Avila, C. / Lopez-Ongil, C. / Entrena-Arrontes, L. et al. | 2002
- 123
-
A Novel Blind Signature Scheme Possessed with Dual ProtectionsChen, J. J. R. / Chen, A. P. / Lin, R. W. M. / Institute of Electrical and Electronics Engineers et al. | 2003
- 124
-
Compulsive votingHernandez, J.C. / Sierra, J.M. / Hernandez, C.J. / Ribagorda, A. et al. | 2002
- 128
-
A Simple Key Agreement ProtocolRyu, E. K. / Kim, K. W. / Yoo, K. Y. / Institute of Electrical and Electronics Engineers et al. | 2003
- 132
-
A Novel Round Function Architecture for AES Encryption/Decryption Utilizing Look-Up TableWang, J. F. / Chang, S. W. / Lin, P. C. / Institute of Electrical and Electronics Engineers et al. | 2003
- 134
-
Migration of Internet security protocols to the IPSEC frameworkSierra, J.M. / Hernandez, J.C. / Ribagorda, A. / Jayaram, N. et al. | 2002
- 137
-
An Integrated User Authentication and Access Control Scheme without PublicChien, H. Y. / Jan, J. K. / Institute of Electrical and Electronics Engineers et al. | 2003
- 144
-
Security system throughput modelingLeone, K. et al. | 2002
- 144
-
An Authorization Mechanism for Web Services Using Attribute CertificateKim, K. N. / Kang, M. H. / Ryou, H. B. / Institute of Electrical and Electronics Engineers et al. | 2003
- 151
-
Achieving Database Accountability and Traceability Using the Bitemporal RelationChen, H. H. / Farn, K. J. / Tsai, D. R. / Institute of Electrical and Electronics Engineers et al. | 2003
- 151
-
IP@SS - Integrated Passenger Security SolutionsYahav, Y. / Institute of Electrical and Electronics Engineers et al. | 2002
- 154
-
Information systems security in an airport environmentWilson, D.L. et al. | 2002
- 157
-
Design of a Computer-Aided System for Risk Assessment on Information SystemsLiao, G. Y. / Song, C. H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 158
-
Smart card technology with case studiesCarr, M.R. et al. | 2002
- 160
-
Interface and usability assessment of imaging systemsKlock, B.A. et al. | 2002
- 162
-
Millimetre wave aviation security scannerMurphy, K.S.J. / Appleby, R. / Sinclair, G. / McClumpha, A. / Tatlock, K. / Doney, R. / Hutcheson, I. et al. | 2002
- 163
-
An Electronic Voting Scheme Based on Undeniable Blind Signature SchemeYun, S. H. / Lee, S. J. / Institute of Electrical and Electronics Engineers et al. | 2003
- 167
-
Detection of illegal passengers in lorries using a passive millimetre wave scannerSinclair, G.N. / Coward, P.R. / Anderton, R.N. / Appleby, R. / Seys, T. / Southwood, P. et al. | 2002
- 168
-
Evaluation of Info Security Related Risks of an Organization-The Application of the Multi-Criteria Decision Making MethodGuan, B. C. / Lo, C. C. / Wang, P. / Hwang, J. S. / Institute of Electrical and Electronics Engineers et al. | 2003
- 171
-
Field testing of outdoor intrusion detection sensorsMaki, M. / Nieh, R. / Dickie, M. et al. | 2002
- 176
-
From Web Server Security to Web Components SecurityLin, S. K. / Institute of Electrical and Electronics Engineers et al. | 2003
- 179
-
Representation of weather and terrain effects on intrusion detectionPeck, L. et al. | 2002
- 183
-
A Panoramic Stabilized Periscope with Common Optical PathChen, P. H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 190
-
A Real-time Security Surveillance System for Personal AuthenticationChien, Y. T. / Huang, Y. S. / Jeng, S. W. / Tasi, Y. H. / Zhao, H. X. / Institute of Electrical and Electronics Engineers et al. | 2003
- 191
-
Intrepid MicroTrack leaky cable sensorHarman, R.K. et al. | 2002
- 196
-
A Risk Assessment System for FacilitiesWood, T. M. / King, S. G. / Institute of Electrical and Electronics Engineers et al. | 2003
- 198
-
Some remarks on very high-rate image compression and its impact on security image data subjective evaluationKlima, M. / Kloucek, V. et al. | 2002
- 200
-
An Auto Bi-Directional Passing-People Counting Method Based on Color Image ProcessingChen, T. H. / Hsu, C. W. / Institute of Electrical and Electronics Engineers et al. | 2003
- 202
-
AMETHYST: automatic alarm assessmentMockler, S. / Clarke, N. et al. | 2002
- 208
-
Motion Tracking of Multi-Objects for Access Surveillance Based on the Panoramic Imaging SystemPan, M. C. / Tsai, Y. L. / Huang, Y. J. / Institute of Electrical and Electronics Engineers et al. | 2003
- 209
-
CATV security architectureVolner, R. et al. | 2002
- 216
-
Linescan imaging of ballistics projectile markings for identificationSmith, C.L. et al. | 2002
- 216
-
A New Security Key Exchange Channel for 802.11 WLANsOuyang, Y. C. / Chang, R. L. / Chiu, J. H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 222
-
Application of Certificate on the ECC Authentication Protocol for Point-to-Point CommunicationsMar, J. / Lee, K. M. / Institute of Electrical and Electronics Engineers et al. | 2003
- 223
-
Digital video recorder selection for a casinoBurleson-Webb, K. et al. | 2002
- 225
-
Design and Implementation of Smartcard-Based Secure E-Mail CommunicationChen, H. H. / Chen, Y. S. / Chiang, H. L. / Yang, C. H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 228
-
Multi-camera video surveillanceEllis, T. et al. | 2002
- 232
-
Hiding Binary Images behind Noise with Authentication Capability -A New Approach to Convert CommunicationTzeng, C. H. / Tsai, W. H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 237
-
Integrate the Structure of Negotiation Certification of SET and the Intelligent Mobile AgentHuang, P. H. / Yen, J. H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 245
-
Light-Weight Authentication and Billing in Mobile CommunicationsChen, H. B. / Hsueh, S. C. / Institute of Electrical and Electronics Engineers et al. | 2003
- 253
-
A Group Digital Signature Technique for AuthenticationHsu, C. M. / Twu, S. H. / Chao, H. M. / Institute of Electrical and Electronics Engineers et al. | 2003
- 257
-
A Knowledge-Based Model for Defending DDoSLin, S. S. / Lin, S. C. / Tseng, S. S. / Institute of Electrical and Electronics Engineers et al. | 2003
- 264
-
A Novel Public Digital Watermarking for Still Images Based on Encryption AlgorithmTai, G. C. / Chang, L. W. / Institute of Electrical and Electronics Engineers et al. | 2003
- 268
-
A New Proxy Signature Scheme Based on Dual ComplexitiesSun, P. T. / Lin, C. L. / Chen, J. J. R. / Institute of Electrical and Electronics Engineers et al. | 2003
- 273
-
Integration of Trusted Operating System from Open SourceLu, Y. F. / Kuo, C. F. / Institute of Electrical and Electronics Engineers et al. | 2003
- 281
-
Automatic Biometric Identification System by Hand Geometrylez, S. G. / Travieso, C. M. / Alonso, J. B. / Ferrer, M. A. / Institute of Electrical and Electronics Engineers et al. | 2003
- 285
-
Facial Image Database for Law Enforcement Application An ImplementationLai, P. J. / Wang, J. H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 290
-
Face Recognition in Transformed DomainZanuy, M. F. / Institute of Electrical and Electronics Engineers et al. | 2003
- 298
-
3D Visualization to Support Airport Security OperationsKoch, D. B. / Institute of Electrical and Electronics Engineers et al. | 2003
- 305
-
Airport Access Control StandardsWilkinson, C. / Rao, E. / Institute of Electrical and Electronics Engineers et al. | 2003
- 314
-
Secure Identity Authentication and Logical Access Control for Airport Info SystemDavid, M. W. / Hussein, G. / Sakurai, K. / Institute of Electrical and Electronics Engineers et al. | 2003
- 321
-
A Wavelet-Based Public Key Image Authentication WatermarkingFan, K. C. / Wang, S. W. / Chen, C. C. / Institute of Electrical and Electronics Engineers et al. | 2003
- 325
-
Adaptive Digital Watermarking Using Neural Network TechniqueLou, D. C. / Hu, M. C. / Liu, J. L. / Institute of Electrical and Electronics Engineers et al. | 2003
- 333
-
Defining Requirement for Network Solution in Protection ProfilesSung, Y. G. / Yi, E. K. / No, B. G. / Kim, J. S. / Institute of Electrical and Electronics Engineers et al. | 2003
- 337
-
Assigning Cryptographic Keys to Access Control in a Multi-Attribute HierarchyGuan, B. C. / Wang, P. / Chen, Y. F. / Chang, R. I. / Institute of Electrical and Electronics Engineers et al. | 2003
- 341
-
Constructing Auditing Rules from ERP System: A Business Process Flow ApproachHung, Y. H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 349
-
Cryptanalysis of a Fingerprint-based Remote User Authentication Scheme Using Smart CardsHsieh, B. T. / Yeh, H. T. / Sun, H. M. / Lin, C. T. / Institute of Electrical and Electronics Engineers et al. | 2003
- 351
-
Countermeasures in Curbing Gambling Activities on Internet in TaiwanWang, S. J. / Ke, H. J. / Institute of Electrical and Electronics Engineers et al. | 2003
- 354
-
Firearm DataloggersSutcliff, J. D. / Institute of Electrical and Electronics Engineers et al. | 2003
- 358
-
The Analysis of Primer Mixtures and Gunshot Residues Using Scanning Electron Microscop / Energy Dispersive X-ray AnalysisMeng, H. H. / Lee, H. C. / Chen, Y. L. / Institute of Electrical and Electronics Engineers et al. | 2003
- 364
-
The Safety Helmet Detection for ATM's Surveillance System via Modified Hough TransformWen, C. Y. / Chiu, S. H. / Liaw, J. J. / Lu, C. P. / Institute of Electrical and Electronics Engineers et al. | 2003
- 370
-
Digital Watermarking Using Multiresolution Wavelet TransformLou, D. C. / Chang, M. C. / Liu, J. L. / Institute of Electrical and Electronics Engineers et al. | 2003
- 378
-
Recommendation of Information Sharing and Analysis Center-A Suggestion of Defensive Mechanism against Mainland China Hacker EventsFarn, K. J. / Fung, A. R. W. / Lin, A. C. / Institute of Electrical and Electronics Engineers et al. | 2003
- 386
-
A Study of Information and Communication Security Forensic Technology Capability in TaiwanLin, I. L. / Yang, H. C. / Gu, G. L. / Liu, A. C. / Institute of Electrical and Electronics Engineers et al. | 2003
- 394
-
Robust Image Watermarking Based on Hybrid TransformationLou, D. C. / Sung, C. H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 400
-
A Robust Watermarking and Image Authentication TechniqueTruong, T. K. / Kung, C. M. / Jeng, J. H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 405
-
The Development of PKI Interoperability in TaiwanTai, G. C. / Ou, C. M. / Institute of Electrical and Electronics Engineers et al. | 2003
- 410
-
Video Watermarking Synchronization Based on Profile StatisticsSun, S. W. / Chang, P. C. / Institute of Electrical and Electronics Engineers et al. | 2003
- 414
-
Vulnerability Assessment SystemYing, C. / Tsai, A. / Chang, T. / Yu, H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 422
-
Visual Robust Oblivious Watermarking TechniqueKung, C. H. / Jeng, J. H. / Hsiao, H. H. / Yan, Y. H. / Cheng, W. S. / Institute of Electrical and Electronics Engineers et al. | 2003
- 428
-
A Hybrid Intelligent Intrusion Detection System to Recognize Novel AttacksTsai, D. R. / Tai, W. P. / Chang, C. F. / Institute of Electrical and Electronics Engineers et al. | 2003
- 435
-
Securing a Restricted Site-Biometric Authentication at Entry PointKulula, E. / Elliott, S. J. / Institute of Electrical and Electronics Engineers et al. | 2003
- 440
-
Performance Evaluation and Improvement of Speaker Recognition over GSM EnvironmentTan, T. H. / Chang, S. W. / Yang, C. H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 444
-
Securing the Biometric ModelElliott, S. J. / Leniski, A. C. / McGann, S. F. / Skinner, R. C. / Institute of Electrical and Electronics Engineers et al. | 2003
- 450
-
Trace Copy Forgery Detection for Handwritten Signature VerificationDeng, P. S. / Jaw, L. J. / Wang, J. H. / Tung, C. T. / Institute of Electrical and Electronics Engineers et al. | 2003
- 456
-
Efficient Method for Security Image Data CompressionKlima, M. / Pata, P. / Institute of Electrical and Electronics Engineers et al. | 2003
- 460
-
Detecting Offensive Routers - A Straightforward ApproachWang, B. T. / Schulzrinne, H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 468
-
SIM Based Subscriber Authentication for Wireless Local Area NetworksTsai, Y. R. / Chang, C. J. / Institute of Electrical and Electronics Engineers et al. | 2003
- 474
-
Cryptanalysis of a Strong Proxy Signature Scheme with Proxy Signer Privacy ProtectionSun, H. M. / Hsieh, B. T. / Institute of Electrical and Electronics Engineers et al. | 2003
- 477
-
Building Intrusion Pattern Miner for Snort Network Intrusion Detection SystemChen, S. F. / Wu, L. C. / Institute of Electrical and Electronics Engineers et al. | 2003
- 485
-
Design of an Active Intrusion Monitor SystemHuang, I. H. / Yang, C. Z. / Institute of Electrical and Electronics Engineers et al. | 2003
- 493
-
Protocol Based Foresight Anomaly Intrusion Detection SystemTsai, M. K. / Lin, S. C. / Tseng, S. S. / Institute of Electrical and Electronics Engineers et al. | 2003
- 501
-
The Neuron Security of Joint Defense for Network Intrusion DetectionWu, J. S. / Institute of Electrical and Electronics Engineers et al. | 2003
- 508
-
The Use of Laser Scanning Technology for Perimeter ProtectionHosmer, P. / Institute of Electrical and Electronics Engineers et al. | 2003
- 515
-
External Second Gate, Fourier Transform Ion Mobility Spectrometry: Parametric Optimization for Detection of Weapons of Mass DestructionTarver, E. E. / Institute of Electrical and Electronics Engineers et al. | 2003
- 523
-
Specification of a Video Test Imagery Library (VITAL)Baker, D. / Thomas, N. / Institute of Electrical and Electronics Engineers et al. | 2003
- 527
-
Face Recognition for Images from the Same Unknown PersonHuang, Y. S. / Tsai, Y. H. / Chao, H. H. / Chien, Y. T. / Institute of Electrical and Electronics Engineers et al. | 2003
- 531
-
Facial Recognition at Purdue University Airport-2003-2008Morton, J. M. / Portell, C. M. / Elliott, S. J. / Kukula, E. P. / Institute of Electrical and Electronics Engineers et al. | 2003
- 535
-
Contingency Planning: Emergency Preparedness for Terrorist AttacksWang, H. M. / Institute of Electrical and Electronics Engineers et al. | 2003
- 544
-
TSRG Randomized CryptosystemHussein, G. A. / David, M. W. / Institute of Electrical and Electronics Engineers et al. | 2003
- 552
-
Audio Content Based Feature Extraction on Subband DomainShieh, J. J. R. / Institute of Electrical and Electronics Engineers et al. | 2003
- 556
-
ID-Based Cryptographic Schemes Based on Factoring and Discrete LogarithmsSu, P. C. / Lu, E. H. / Chang, H. K. C. / Institute of Electrical and Electronics Engineers et al. | 2003
- 564
-
An Encryption Scheme for Large Chinese TextsGuan, B. C. / Wei, Y. C. / Hu, C. L. / Chiu, Y. L. / Chang, R. I. / Institute of Electrical and Electronics Engineers et al. | 2003
- 569
-
Implementing the RSA Algorithm on the TI TMS320C55x FamilyHwang, R. J. / Su, F. F. / Huang, L. S. / Peng, J. K. / Institute of Electrical and Electronics Engineers et al. | 2003
- 573
-
Fast Implementation of AES Cryptographic Algorithms in Smart CardsLu, C. F. / Chiang, H. L. / Yang, C. H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 580
-
A Host-Based Real-Time Intrusion Detection System with Data Mining and Forensic TechniquesLeu, F. Y. / Yang, T. Y. / Institute of Electrical and Electronics Engineers et al. | 2003
- 587
-
Proxy Certificates Based Digital Fingerprinting Scheme for Mobile CommunicationChoi, J. G. / Sakurai, K. C. / Park, J. H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 595
-
A Robust Method for Software Self-DefenseDeng, P. S. / Shieh, W. G. / Wang, J. H. / Tung, C. T. / Yen, C. P. / Institute of Electrical and Electronics Engineers et al. | 2003
- 600
-
Intelligent Automatic Malicious Code Signatures ExtractionDeng, P. S. / Wang, J. H. / Shieh, W. G. / Yen, C. P. / Tung, C. T. / Institute of Electrical and Electronics Engineers et al. | 2003
-
Proceedings IEEE 36th Annual 2002 International Carnahan Conference on Security Technology (Cat. No.02CH37348)| 2002