Improving the Message Expansion of the Tangle Hash Function (English)
- New search for: Alvarez, R.
- New search for: Vicent, J.-F.
- New search for: Zamora, A.
- New search for: Alvarez, R.
- New search for: Vicent, J.-F.
- New search for: Zamora, A.
- New search for: Herrero, A.
- New search for: Corchado, E.
In:
International Workshop on Computational Intelligence in Security for Information Systems
;
183-189
;
2011
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Improving the Message Expansion of the Tangle Hash Function
-
Contributors:Alvarez, R. ( author ) / Vicent, J.-F. ( author ) / Zamora, A. ( author ) / Herrero, A. / Corchado, E.
-
Conference:4th, International Workshop on Computational Intelligence in Security for Information Systems ; 2011 ; Torremolinos, Spain
-
Published in:LECTURE NOTES IN COMPUTER SCIENCE ; 6694 ; 183-189
-
Publisher:
- New search for: Springer
-
Place of publication:Heidelberg
-
Publication date:2011-01-01
-
Size:7 pages
-
Remarks:Includes bibliographical references and author index
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Collective Classification for Spam FilteringLaorden, C. / Sanz, B. / Santos, I. / Galan-Garcia, P. / Bringas, P.G. et al. | 2011
- 9
-
Detecting Bad-Mouthing Attacks on Reputation Systems Using Self-Organizing MapsBankovic, Z. / Vallejo, J.C. / Fraga, D. / Moya, J.M. et al. | 2011
- 17
-
Approach Based Ensemble Methods for Better and Faster Intrusion DetectionBahri, E. / Harbi, N. / Huu, H.N. et al. | 2011
- 25
-
Application of the Generic Feature Selection Measure in Detection of Web AttacksNguyen, H.T. / Torrano-Gimenez, C. / Alvarez, G. / Petrovic, S. / Franke, K. et al. | 2011
- 33
-
Data Aggregation Based on Fuzzy Logic for VANETsCaballero-Gil, P. / Molina-Gil, J. / Caballero-Gil, C. et al. | 2011
- 41
-
Digging into IP Flow Records with a Visual Kernel MethodWagner, C. / Wagener, G. / State, R. / Engel, T. et al. | 2011
- 50
-
Opcode-Sequence-Based Semi-supervised Unknown Malware DetectionSantos, I. / Sanz, B. / Laorden, C. / Brezo, F. / Bringas, P.G. et al. | 2011
- 58
-
A New Alert Correlation Algorithm Based on Attack GraphRoschke, S. / Cheng, F. / Meinel, C. et al. | 2011
- 68
-
A Qualitative Survey of Active TCP/IP Fingerprinting Tools and Techniques for Operating Systems IdentificationMedeiros, J.P.S. / de Medeiros Brito Junior, A. / Pires, P.S.M. et al. | 2011
- 76
-
Security Alert Correlation Using Growing Neural GasMora-Gimeno, F.J. / Macia-Perez, F. / Lorenzo-Fonseca, I. / Gil-Martinez-Abarca, J.A. / Marcos-Jorquera, D. / Gilart-Iglesias, V. et al. | 2011
- 84
-
A Comparative Performance Evaluation of DNS Tunneling ToolsMerlo, A. / Papaleo, G. / Veneziano, S. / Aiello, M. et al. | 2011
- 92
-
Security Analysis and Complexity Comparison of Some Recent Lightweight RFID ProtocolsVahedi, E. / Ward, R.K. / Blake, I.F. et al. | 2011
- 100
-
A Secure and Efficient Searching Scheme for Trusted Nodes in a Peer-to-Peer NetworkSen, J. et al. | 2011
- 109
-
Testing Ensembles for Intrusion Detection: On the Identification of Mutated Network ScansGonzalez, S. / Sedano, J. / Herrero, A. / Baruque, B. / Corchado, E. et al. | 2011
- 118
-
An Intelligent Information Security Mechanism for the Network Layer of WSN: BIOSARPSaleem, K. / Fisal, N. / Hafizah, S. / Rashid, R.A. et al. | 2011
- 127
-
Structural Properties of Cryptographic SequencesFuster-Sabater, A. et al. | 2011
- 135
-
A Multisignature Scheme Based on the SDLP and on the IFPDiaz, R.D. / Encinas, L.H. / Masque, J.M. et al. | 2011
- 143
-
A Group Signature Scheme Based on the Integer Factorization and the Subgroup Discrete Logarithm ProblemsDiaz, R.D. / Encinas, L.H. / Masque, J.M. et al. | 2011
- 151
-
Keeping Group Communications Private: An Up-to-Date Review on Centralized Secure MulticastNaranjo, J.A.M. / Casado, L.G. et al. | 2011
- 160
-
Java Card Implementation of the Elliptic Curve Integrated Encryption Scheme Using Prime and Binary Finite FieldsMartinez, V.G. / Encinas, L.H. / Avila, C.S. et al. | 2011
- 168
-
Comprehensive Protection of RFID Traceability Information Systems Using Aggregate SignaturesAzuara, G. / Salazar, J.L. et al. | 2011
- 177
-
Cryptanalysis of Multicast Protocols with Key Refreshment Based on the Extended Euclidean AlgorithmPeinado, A. / Ortiz, A. et al. | 2011
- 183
-
Improving the Message Expansion of the Tangle Hash FunctionAlvarez, R. / Vicent, J.-F. / Zamora, A. et al. | 2011
- 190
-
Cryptosystem with One Dimensional Chaotic MapsMartinez-Nonthe, J.A. / Diaz-Mendez, A. / Cruz-Irisson, M. / Palacios-Luengas, L. / Del-Rio-Correa, J.L. / Vazquez-Medina, R. et al. | 2011
- 198
-
A Quantitative Analysis into the Economics of Correcting Software BugsWright, C.S. / Zia, T.A. et al. | 2011
- 206
-
Rationally Opting for the Insecure Alternative: Negative Externalities and the Selection of Security ControlsWright, C.S. / Zia, T.A. et al. | 2011
- 214
-
An Approach for Adapting Moodle into a Secure InfrastructureDiaz, J. / Arroyo, D. / Rodriguez, F.B. et al. | 2011
- 222
-
On Secure JAVA Application in SOA-Based PKI Mobile Government SystemsMarkovic, M. / Dordevic, G. et al. | 2011
- 230
-
Structural Feature Based Anomaly Detection for Packed Executable IdentificationUgarte-Pedrero, X. / Santos, I. / Bringas, P.G. et al. | 2011
- 238
-
Produre: A Novel Proximity Discovery Mechanism in Location Tagging SystemHu, J. / Wang, Y. / Yang, T. / Guan, Z. / Gui, N. / Chen, Z. et al. | 2011
- 246
-
Scientific Gateway and Visualization ToolPajorova, E. / Hluchy, L. et al. | 2011
- 251
-
An Innovative Framework for Securing Unstructured DocumentsAmato, F. / Casola, V. / Mazzeo, A. / Romano, S. et al. | 2011
- 259
-
Use of Schema Associative Mapping for Synchronization of the Virtual Machine Audit LogsThorpe, S. / Ray, I. / Grandison, T. et al. | 2011
- 265
-
Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping TechniquesThorpe, S. / Ray, I. / Grandison, T. et al. | 2011
- 272
-
Evaluating User-Centered Privacy Model (UPM) in Pervasive Computing SystemsDehghantanha, A. / Udzir, N.I. / Mahmod, R. et al. | 2011
- 285
-
An Innovative Linkage Learning Based on Differences in Local OptimumsParvin, H. / Minaei-Bidgoli, B. / Helmi, B.H. et al. | 2011
- 293
-
A New Particle Swarm Optimization for Dynamic EnvironmentsParvin, H. / Minaei, B. / Ghatei, S. et al. | 2011
- 301
-
A Classifier Ensemble for Face Recognition Using Gabor Wavelet FeaturesParvin, H. / Mozayani, N. / Beigi, A. et al. | 2011