A Risk Assessment System for Facilities (English)
- New search for: Wood, T. M.
- New search for: King, S. G.
- New search for: Institute of Electrical and Electronics Engineers
- New search for: Wood, T. M.
- New search for: King, S. G.
- New search for: Sanson, L. D.
- New search for: Institute of Electrical and Electronics Engineers
In:
Security technology
;
196-199
;
2003
-
ISBN:
- Conference paper / Print
-
Title:A Risk Assessment System for Facilities
-
Contributors:Wood, T. M. ( author ) / King, S. G. ( author ) / Sanson, L. D. / Institute of Electrical and Electronics Engineers
-
Conference:Annual international Carnahan conference; 36th, Security technology ; 2003 ; Taipei, Taiwan
-
Published in:Security technology ; 196-199
-
Publisher:
- New search for: IEEE
-
Publication date:2003-01-01
-
Size:4 pages
-
Remarks:IEEE Cat no 02CH37348
-
ISBN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Testing and Evaluation Counterterrorism TechnologyKing, S. G. / Wood, T. M. / Stewart, J. W. / Institute of Electrical and Electronics Engineers et al. | 2003
- 1
-
Testing and evaluating counterterrorism technologyKing, S.G. / Stewart, J.W. / Wood, T.M. et al. | 2003
- 8
-
Understanding concepts in the defence in depth strategySmith, C.L. et al. | 2003
- 15
-
Author index| 2002
- 17
-
The Center for Civil Force ProtectionSmith, G.J. et al. | 2002
- 17
-
IntelliFIBER/spl trade/: fiber optic fence sensor developmentsMaki, M.C. / Weese, J.K. et al. | 2003
- 17
-
IntelliFIBER Fiber Optic Fence Sensor DevelopmentsMak, M. / Weese, J. / Institute of Electrical and Electronics Engineers et al. | 2003
- 19
-
US Department of Energy security technologiesBowser, G.H. / Piechowski, C.J. / Pocratsky, C.A. / Sparks, M.H. et al. | 2002
- 23
-
A research of information and communication security forensic mechanism in TaiwanI-Long Lin, / Tian-Shing Lan, / Jia-Chyi Wu, et al. | 2003
- 25
-
Secure Flow: a totally integrated transportation security systemPolillo, R.R. et al. | 2002
- 29
-
An infrastructure vulnerability assessment methodology for metropolitan areasBiersack, W.M. / Hyder, C.B. / James, J.W. / King, S.G. / Kruse, E.M. / Veatch, J.D. / Wood, T.M. et al. | 2002
- 30
-
Intelligence security home networkVolner, R. / Pousek, L. et al. | 2003
- 35
-
Multiscale analysis for iris biometricsSanchez-Avila, C. / Sanchez-Reillo, R. et al. | 2002
- 38
-
Design of SPS model using mobile agent systemJin-Ho Park, / Jin-Wook Chung, et al. | 2003
- 39
-
Biometric identification system by lip shapeGomez, E. / Travieso, C.M. / Briceno, J.C. / Ferrer, M.A. et al. | 2002
- 43
-
Pocket device for authentication and data integrity on Internet banking applicationsde la Puente, F. / Sandoval, J.D. / Hernandez, P. et al. | 2003
- 43
-
Mathematical Morphology Approaches for Fingerprints ThinningEspinosa-Duro, V. / Institute of Electrical and Electronics Engineers et al. | 2002
- 43
-
Mathematical morphology approaches for fingerprint thinningEspinosa-Duro, V. et al. | 2002
- 46
-
Microprocessor smart cards with fingerprint user authenticationSanchez-Reillo, R. / Sanchez-Avila, C. / Mengibar-Pozo, L. et al. | 2002
- 50
-
A system and method for enhanced psychophysiological detection of deceptionMcClure, J. / Ames, W.I. / McGraw, T.F. / Gouin, J.-L. et al. | 2002
- 51
-
On the security of multimedia video informationShieh, J.-R.J. et al. | 2003
- 57
-
An extended object-oriented security model for high secure office environmentsBao-Chyuan Guan, / Ping Wang, / Chen, S.-J. / Chang, R.-I. et al. | 2003
- 60
-
Motion signature analysis for microwave detection systemsLester, A.J. / Smith, C.L. et al. | 2002
- 62
-
Progressive watermarking techniques with genetic algorithmsHuang, H.-C. / Pan, J.-S. / Shieh, C.-S. / Wang, F.-H. et al. | 2003
- 66
-
Vessel identification and monitoring systems for maritime securityShwu-Jing Chang, et al. | 2003
- 71
-
Virus detection using data mining techinquesJau-Hwang Wang, / Deng, P.S. / Yi-Shen Fan, / Li-Jing Jaw, / Yu-Ching Liu, et al. | 2003
- 71
-
Virus Detection Using Data Mining TechniquesWang, J. H. / Deng, P. S. / Fan, Y. S. / Jaw, L. J. / Liu, Y. C. / Institute of Electrical and Electronics Engineers et al. | 2003
- 71
-
A novel sensor application to increase security of prisoners in community hospitalsTucknutt, M.D. et al. | 2002
- 75
-
Man portable sensor technology for use in dynamic environments with multiple areas for concealmentRoberts, M.K. et al. | 2002
- 77
-
New Development in Portable Sensor Allows Low-Cost Component to be Left Behind (Disposable)Andre, G. / Institute of Electrical and Electronics Engineers et al. | 2003
- 77
-
New development in portable sensor allows low-cost components to be left behind (disposable)Gagnon, A. et al. | 2003
- 80
-
Intrepid MicroPoint system - European fence experienceBackx, A.J. / Harman, R.K. et al. | 2002
- 83
-
And-CFAR and Or-CFAR detectors design in Weibull backgroundLiu, W. / Liu, X. et al. | 2003
- 87
-
Critical asset protection, perimeter monitoring and threat detection using automated video surveillance - a technology overview with case studiesHeartwell, C.H. / Lipton, A.J. et al. | 2002
- 87
-
A detection algorithm for road feature extraction using EO-1 hyperspectral imagesTzu-Lung Sun, et al. | 2003
- 88
-
First response to terrorist bombingsKing, S.G. / Wood, T.M. / Priem, R.G. et al. | 2002
- 94
-
September 11, 2001 - response to the PentagonWood, T.M. / King, S.G. et al. | 2002
- 96
-
Millimeter wave control switch for secure giga-scale systemFu, J.S. / Cai, C. / Lu, Y. / Shen, Z. et al. | 2003
- 100
-
Secure 77GHz Vivaldi antenna for millimeter wave communicationChong, L.P. / Ng, P.T. / Fu, J.S. et al. | 2003
- 102
-
A first step towards automatic hoax detectionHernandez, J.C. / Hernandez, C.J. / Sierra, J.M. / Ribagorda, A. et al. | 2002
- 102
-
A First Step Toward Automatic Hoax DetectionHernandez, J. C. / Hernandez, C. J. / Sierra, J. M. / Ribagorda, A. / Institute of Electrical and Electronics Engineers et al. | 2002
- 104
-
An intelligent real-time fire-detection method based on video processingThou-Ho Chen, / Cheng-Liang Kao, / Sju-Mo Chang, et al. | 2003
- 112
-
Security of ZLYH-key authentication schemeJae-Min Lee, / Kee-Won Kim, / Eun-Kyung Ryu, / Hyung-Mok Lee, / Kee-Young Yoo, et al. | 2003
- 115
-
On the use of trusted objects to enforce isolation between processes and dataTarman, T.D. / Witzke, E.L. / Pierson, L.G. / Campbell, P.L. et al. | 2002
- 115
-
A new convertible group signature scheme on the basis of dual complexitiesJonathan Jen-Rong Chen, / Richard Wen-Mao Lin, / An-Pin Chen, et al. | 2003
- 120
-
Improving security in information technology using cryptographic hardware modulesSanchez-Reillo, R. / Sanchez-Avila, C. / Lopez-Ongil, C. / Entrena-Arrontes, L. et al. | 2002
- 123
-
A novel blind signature scheme possessed with dual protectionsJen-Rong Chen, J. / An-Pin Chen, / Wen-Mao Lin, R. et al. | 2003
- 124
-
Compulsive votingHernandez, J.C. / Sierra, J.M. / Hernandez, C.J. / Ribagorda, A. et al. | 2002
- 128
-
A simple key agreement protocolEun-Kyung Ryu, / Kee-Won Kim, / Kee-Young Yoo, et al. | 2003
- 132
-
A novel round function architecture for AES encryption/decryption utilizing look-up tableJhing-Fa Wang, / Sun-Wei Chang, / Po-Chuan Lin, et al. | 2003
- 134
-
Migration of Internet security protocols to the IPSEC frameworkSierra, J.M. / Hernandez, J.C. / Ribagorda, A. / Jayaram, N. et al. | 2002
- 137
-
An Integrated User Authentication and Access Control Scheme without PublicChien, H. Y. / Jan, J. K. / Institute of Electrical and Electronics Engineers et al. | 2003
- 137
-
An integrated user authentication and access control scheme without public key cryptographyHung-Yu Chien, / Jinn-Ke Jan, et al. | 2003
- 144
-
An authorization mechanism for Web services using an attribute certificateMyung-Hee Kang, / Kyung-Nam Kim, / Hwang-Bin Ryou, et al. | 2003
- 144
-
Security system throughput modelingLeone, K. et al. | 2002
- 144
-
An Authorization Mechanism for Web Services Using Attribute CertificateKim, K. N. / Kang, M. H. / Ryou, H. B. / Institute of Electrical and Electronics Engineers et al. | 2003
- 151
-
Achieving database accountability and traceability using the bitemporal relationHsiang-Hui Chen, / Kwo-Jean Farn, / Dwen-Ren Tsai, et al. | 2003
- 151
-
IP@SS - Integrated Passenger Security SolutionsYahav, Y. / Institute of Electrical and Electronics Engineers et al. | 2002
- 154
-
Information systems security in an airport environmentWilson, D.L. et al. | 2002
- 157
-
Design of a computer-aided system for risk assessment on information systemsGen-Yih Liao, / Chen-Hwa Song, et al. | 2003
- 158
-
Smart card technology with case studiesCarr, M.R. et al. | 2002
- 160
-
Interface and usability assessment of imaging systemsKlock, B.A. et al. | 2002
- 162
-
Millimetre wave aviation security scannerMurphy, K.S.J. / Appleby, R. / Sinclair, G. / McClumpha, A. / Tatlock, K. / Doney, R. / Hutcheson, I. et al. | 2002
- 163
-
An electronic voting scheme based on undeniable blind signature schemeSung-Hyun Yun, / Sung-Jin Lee, et al. | 2003
- 167
-
Detection of illegal passengers in lorries using a passive millimetre wave scannerSinclair, G.N. / Coward, P.R. / Anderton, R.N. / Appleby, R. / Seys, T. / Southwood, P. et al. | 2002
- 168
-
Evaluation of Info Security Related Risks of an Organization-The Application of the Multi-Criteria Decision Making MethodGuan, B. C. / Lo, C. C. / Wang, P. / Hwang, J. S. / Institute of Electrical and Electronics Engineers et al. | 2003
- 168
-
Evaluation of information security related risks of an organization: the application of the multicriteria decision-making methodBao-Chyuan Guan, / Chi-Chun Lo, / Ping Wang, / Jaw-Shi Hwang, et al. | 2003
- 171
-
Field testing of outdoor intrusion detection sensorsMaki, M. / Nieh, R. / Dickie, M. et al. | 2002
- 176
-
From Web server security to Web components securitySheng-Kang Lin, et al. | 2003
- 179
-
Representation of weather and terrain effects on intrusion detectionPeck, L. et al. | 2002
- 183
-
A panoramic stabilized periscope with common optical pathPing-Ho Chen, et al. | 2003
- 190
-
A real-time security surveillance system for personal authenticationYi-Tsung Chien, / Yea-Shuan Huang, / Sheng-Wen Jeng, / Yao-Hong Tasi, / Hung-Xin Zhao, et al. | 2003
- 191
-
Intrepid MicroTrack leaky cable sensorHarman, R.K. et al. | 2002
- 196
-
A Risk Assessment System for FacilitiesWood, T. M. / King, S. G. / Institute of Electrical and Electronics Engineers et al. | 2003
- 196
-
A risk assessment system for multi-facility organizationsWood, T.M. / King, S.G. / Kennon, J.W. et al. | 2003
- 198
-
Some remarks on very high-rate image compression and its impact on security image data subjective evaluationKlima, M. / Kloucek, V. et al. | 2002
- 200
-
An automatic bi-directional passing-people counting method based on color image processingThou-Ho Chen, et al. | 2003
- 200
-
An Auto Bi-Directional Passing-People Counting Method Based on Color Image ProcessingChen, T. H. / Hsu, C. W. / Institute of Electrical and Electronics Engineers et al. | 2003
- 202
-
AMETHYST: automatic alarm assessmentMockler, S. / Clarke, N. et al. | 2002
- 208
-
Motion tracking of multi-objects for access surveillance based on the panoramic imaging systemMin-Cheng Pan, / Yau-Liang Tsai, / Ying-Jieh Huang, et al. | 2003
- 209
-
CATV security architectureVolner, R. et al. | 2002
- 216
-
A new security key exchange channel for 802.11 WLANsYen-Chieh Ouyang, / Reay-Lin Chang, / Ji-Hau Chiu, et al. | 2003
- 216
-
Linescan imaging of ballistics projectile markings for identificationSmith, C.L. et al. | 2002
- 222
-
Application of certificate on the ECC authentication protocol for point-to-point communicationsJeich Mar, / Ko-Ming Lee, et al. | 2003
- 223
-
Digital video recorder selection for a casinoBurleson-Webb, K. et al. | 2002
- 225
-
Design and implementation of smartcard-based secure e-mail communicationHsien-Hau Chen, / Yung-Sheng Chen, / Hsia-Ling Chiang, / Chung-Huang Yang, et al. | 2003
- 228
-
Multi-camera video surveillanceEllis, T. et al. | 2002
- 232
-
Hiding binary images behind noise with authentication capability: a new approach to covert communicationChih-Hsuan Tzeng, / Wen-Hsiang Tsai, et al. | 2003
- 232
-
Hiding Binary Images behind Noise with Authentication Capability -A New Approach to Convert CommunicationTzeng, C. H. / Tsai, W. H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 237
-
Integrate the structure of negotiation certification of set and the intelligent mobile agentPo-Hsian Huang, et al. | 2003
- 245
-
Light-weight authentication and billing in mobile communicationsHsing-Bai Chen, / Sue-Chen Hsueh, et al. | 2003
- 253
-
A group digital signature technique for authenticationChin-Ming Hsu, et al. | 2003
- 257
-
A knowledge-based model for defending distributed DoSShui-Sheng Lin, / Shun-Chieh Lin, / Shian-Shyong Tseng, et al. | 2003
- 257
-
A Knowledge-Based Model for Defending DDoSLin, S. S. / Lin, S. C. / Tseng, S. S. / Institute of Electrical and Electronics Engineers et al. | 2003
- 264
-
A novel public digital watermarking for still images based on encryption algorithmGwo-Chin Tai, / Long-Wen Chang, et al. | 2003
- 268
-
A new proxy signature scheme based on dual complexitiesChen, J.J.-R. / Pin-Tai Sun, / Chih-Lin Lin, et al. | 2003
- 273
-
Integration of trusted operating system from open sourceYung-Feng Lu, / Chin-Fu Kuo, / Chung-Hsin Chen, et al. | 2003
- 281
-
Automatic biometric identification system by hand geometryGonzalez, S. / Travieso, C.M. / Alonso, J.B. / Ferrer, M.A. et al. | 2003
- 285
-
Facial image database for law enforcement application: an implementationPo-Jen Lai, / Jau-Hwang Wang, et al. | 2003
- 290
-
Face recognition in a transformed domainFaundez-Zanuy, M. et al. | 2003
- 290
-
Face Recognition in Transformed DomainZanuy, M. F. / Institute of Electrical and Electronics Engineers et al. | 2003
- 298
-
3D visualization to support airport security operationsKoch, D.B. et al. | 2003
- 305
-
Airport access control standardsWilkinson, C. / Rao, E. et al. | 2003
- 314
-
Secure identity authentication and logical access control for airport information systemsDavid, M.W. / Hussein, G.A. / Sakurai, K. et al. | 2003
- 314
-
Secure Identity Authentication and Logical Access Control for Airport Info SystemDavid, M. W. / Hussein, G. / Sakurai, K. / Institute of Electrical and Electronics Engineers et al. | 2003
- 321
-
A wavelet-based public key image authentication watermarkingChien-Chang Chen, / Kang-Chih Fan, / Sheng-Wen Wang, et al. | 2003
- 325
-
Adaptive digital watermarking using neural network techniqueDer-Chyuan Lou, / Jiang-Lung Liu, / Ming-Chiang Hu, et al. | 2003
- 333
-
Defining requirements for network solution in protection profilesYune Gie Sung, / Eun-Kyoung Yi, / Byung-Gyu No, / Jae Sung Kim, et al. | 2003
- 333
-
Defining Requirement for Network Solution in Protection ProfilesSung, Y. G. / Yi, E. K. / No, B. G. / Kim, J. S. / Institute of Electrical and Electronics Engineers et al. | 2003
- 337
-
Assigning cryptographic keys to access control in a multi-attribute hierarchyBao-Chyuan Guan, / Ping Wang, / Yen-Fu Chen, / Ray-I Chang, et al. | 2003
- 341
-
Constructing auditing rules from ERP system: a business process flow approachYi-Hsuan Hung, et al. | 2003
- 349
-
Cryptanalysis of a fingerprint-based remote user authentication scheme using smart cardsBin-Tsan Hsieh, / Her-Tyan Yeh, / Hung-Min Sun, et al. | 2003
- 351
-
Countermeasures in curbing gambling activities on the Internet in TaiwanShiuh-Jeng Wang, / Hung-Jui Ke, et al. | 2003
- 351
-
Countermeasures in Curbing Gambling Activities on Internet in TaiwanWang, S. J. / Ke, H. J. / Institute of Electrical and Electronics Engineers et al. | 2003
- 354
-
Firearm dataloggersSutcliff, J. et al. | 2003
- 358
-
The Analysis of Primer Mixtures and Gunshot Residues Using Scanning Electron Microscop / Energy Dispersive X-ray AnalysisMeng, H. H. / Lee, H. C. / Chen, Y. L. / Institute of Electrical and Electronics Engineers et al. | 2003
- 358
-
The analysis of primer mixtures and gunshot residues using scanning electron microscopy/energy dispersive X-ray analysisHsien-Hui Meng, / Hsei-Chang Lee, / Yu-Liang Chen, et al. | 2003
- 364
-
The safety helmet detection for ATM's surveillance system via the modified Hough transformChe-Yen Wen, / Shih-Hsuan Chiu, / Jiun-Jian Liaw, / Chuan-Pin Lu, et al. | 2003
- 364
-
The Safety Helmet Detection for ATM's Surveillance System via Modified Hough TransformWen, C. Y. / Chiu, S. H. / Liaw, J. J. / Lu, C. P. / Institute of Electrical and Electronics Engineers et al. | 2003
- 370
-
Digital watermarking using multiresolution wavelet transformDer-Chyuan Lou, / Jiang-Lung Liu, / Ming-Chang Chang, et al. | 2003
- 378
-
Recommendation of Information Sharing and Analysis Center-A Suggestion of Defensive Mechanism against Mainland China Hacker EventsFarn, K. J. / Fung, A. R. W. / Lin, A. C. / Institute of Electrical and Electronics Engineers et al. | 2003
- 378
-
Recommendation of information sharing and analysis centerFarn, K.-J. / Fung, A.R.-W. / Lin, A.C. et al. | 2003
- 386
-
A study of information and communication security forensic technology capability in TaiwanI-Long Lin, / Hong-Cheng Yang, / Guo-Long Gu, / Lin, A.C. et al. | 2003
- 394
-
Robust image watermarking based on hybrid transformationDer-Chyuan Lou, / Chia-Hung Sung, et al. | 2003
- 400
-
A robust watermarking and image authentication techniqueKung, C.M. / Truong, T.K. / Jeng, J.H. et al. | 2003
- 405
-
The development of PKI interoperability in TaiwanGwo-Chin Tai, / Chung-Ming Ou, et al. | 2003
- 410
-
Video watermarking synchronization based on profile statisticsShih-Wei Sun, / Pao-Chi Chang, et al. | 2003
- 414
-
Vulnerability assessment system (VAS)Cabin Ying, / Tsai, A. / Yu, H. et al. | 2003
- 414
-
Vulnerability Assessment SystemYing, C. / Tsai, A. / Chang, T. / Yu, H. / Institute of Electrical and Electronics Engineers et al. | 2003
- 422
-
Visual robust oblivious watermarking techniqueKung, C.H. / Hsiao, H.H. / Cheng, W.S. / Yan, Y.H. et al. | 2003
- 428
-
A hybrid intelligent intrusion detection system to recognize novel attacksDwen-Ren Tsai, / Wen-Pin Tai, / Chi-Fang Chang, et al. | 2003
- 435
-
Securing a restricted site - biometric authentication at entry pointKukula, E.P. / Elliott, S.J. et al. | 2003
- 440
-
Performance evaluation and improvement of speaker recognition over GSM environmentTan-Hsu Tan, / Shih-Wei Chang, / Chung-Ho Yang, et al. | 2003
- 444
-
Securing the biometric modelLeniski, A.C. / Skinner, R.C. / McGann, S.F. / Elliott, S.J. et al. | 2003
- 450
-
Trace copy forgery detection for handwritten signature verificationPeter Shaohua Deng, / Li-Jing Jaw, / Jau-Hwang Wang, / Cheng-Tan Tung, et al. | 2003
- 456
-
Efficient method for security image data compressionPata, P. / Klima, M. et al. | 2003
- 460
-
Detecting offensive routers: a straightforward approachWang, B.-T. / Schulzrinne, H. et al. | 2003
- 468
-
SIM-based subscriber authentication for wireless local area networksYuh-Ren Tsai, / Cheng-Ju Chang, et al. | 2003
- 474
-
Cryptanalysis of a strong proxy signature scheme with proxy signer privacy protectionHung-Min Sun, / Bin-Tsan Hsieh, et al. | 2003
- 477
-
Building intrusion pattern miner for snort network intrusion detection systemLih-Chyau Wuu, / Sout-Fong Chen, et al. | 2003
- 485
-
Design of an Active Intrusion Monitor SystemI-Hsuan Huang, / Cheng-Zen Yang, et al. | 2003
- 493
-
Protocol based foresight anomaly intrusion detection systemMeng-Kai Tsai, / Shun-Chieh Lin, / Shian-Shyong Tseng, et al. | 2003
- 501
-
The neuron security of joint defense for network intrusion detectionJain-Shing Wu, et al. | 2003
- 508
-
The use of laser scanning technology for perimeter protectionHosmer, P. et al. | 2003
- 515
-
External second gate Fourier transform ion mobility spectrometry: parametric optimization for detection of weapons of mass destructionTarver, E.E. et al. | 2003
- 523
-
Specification of a video test imagery library (VITAL)Baker, D. / Thomas, N. et al. | 2003
- 527
-
Face recognition for images from the same unknown personYea-Shuan Huang, / Yao-Hong Tsai, / Hong-Hsin Chao, / Yi-Tsung Chien, et al. | 2003
- 531
-
Facial Recognition at Purdue University Airport-2003-2008Morton, J. M. / Portell, C. M. / Elliott, S. J. / Kukula, E. P. / Institute of Electrical and Electronics Engineers et al. | 2003
- 531
-
Facial recognition at Purdue University's airport - 2003-2008Morton, J.M. / Portell, C.M. / Elliott, S.J. / Kukula, E.P. et al. | 2003
- 535
-
Contingency planning: emergency preparedness for terrorist attacksWang, H.-M. et al. | 2003
- 544
-
TSRG randomized cryptosystemHussein, G.A. / David, M.W. et al. | 2003
- 552
-
Audio content based feature extraction on subband domainShieh, J.-R.J. et al. | 2003
- 556
-
ID-based cryptographic schemes based on factoring and discrete logarithmsPin-Chang Su, / Erl-Huei Lu, / Henry Ker-Chang Chang, et al. | 2003
- 564
-
An encryption scheme for large Chinese textsBao-Chyuan Guan, / Ray-I Chang, / Yung Chung Wei, / Chia-Ling Hu, / Yu-Lin Chiu, et al. | 2003
- 569
-
Implementing the RSA algorithm on the TI TMS320C55x familyRen-Junn Hwang, / Feng-Fu Su, / Loang-Shing Huang, / Jen-Kang Peng, et al. | 2003
- 573
-
Fast implementation of AES cryptographic algorithms in smart cardsChi-Feng Lu, / Yan-Shun Kao, / Hsia-Ling Chiang, / Chung-Huang Yang, et al. | 2003
- 580
-
A host-based real-time intrusion detection system with data mining and forensic techniquesFang-Yie Leu, / Tzu-Yi Yang, et al. | 2003
- 587
-
Proxy certificates-based digital fingerprinting scheme for mobile communicationJae-Gwi Choi, / Kouichi Sakurai, / Ji-Hwan Park, et al. | 2003
- 595
-
A robust method for software self-defensePeter Shaohua Deng, / Wen-Gong Shieh, / Jau-Hwang Wang, / Cheng-Tan Tung, / Chih-Pin Yen, et al. | 2003
- 600
-
Intelligent automatic malicious code signatures extractionPeter Shaohua Deng, / Jau-Hwang Wang, / Wen-Gong Shieh, / Chin-Pin Yen, / Cheng-Tan Tung, et al. | 2003
-
Proceedings IEEE 36th Annual 2002 International Carnahan Conference on Security Technology (Cat. No.02CH37348)| 2002
-
Proceedings. IEEE 37th Annual 2003 International Carnahan Conference on Security Technology (IEEE Cat. No.03CH37458)| 2003