Improving the Message Expansion of the Tangle Hash Function (English)
- New search for: Álvarez, Rafael
- New search for: Vicent, José-Francisco
- New search for: Zamora, Antonio
- New search for: Álvarez, Rafael
- New search for: Vicent, José-Francisco
- New search for: Zamora, Antonio
In:
Computational Intelligence in Security for Information Systems
3
;
183-189
;
2011
- Article/Chapter (Book) / Electronic Resource
-
Title:Improving the Message Expansion of the Tangle Hash Function
-
Contributors:
-
Published in:Lecture Notes in Computer Science ; 6694, 3 ; 183-189
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2011-01-01
-
Size:7 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Collective Classification for Spam FilteringLaorden, Carlos / Sanz, Borja / Santos, Igor / Galán-García, Patxi / Bringas, Pablo G. et al. | 2011
- 9
-
Detecting Bad-Mouthing Attacks on Reputation Systems Using Self-Organizing MapsBanković, Z. / Vallejo, J. C. / Fraga, D. / Moya, J. M. et al. | 2011
- 17
-
Approach Based Ensemble Methods for Better and Faster Intrusion DetectionBahri, Emna / Harbi, Nouria / Huu, Hoa Nguyen et al. | 2011
- 25
-
Application of the Generic Feature Selection Measure in Detection of Web AttacksNguyen, Hai Thanh / Torrano-Gimenez, Carmen / Alvarez, Gonzalo / Petrović, Slobodan / Franke, Katrin et al. | 2011
- 33
-
Data Aggregation Based on Fuzzy Logic for VANETsCaballero-Gil, P. / Molina-Gil, J. / Caballero-Gil, C. et al. | 2011
- 41
-
Digging into IP Flow Records with a Visual Kernel MethodWagner, Cynthia / Wagener, Gerard / State, Radu / Engel, Thomas et al. | 2011
- 50
-
Opcode-Sequence-Based Semi-supervised Unknown Malware DetectionSantos, Igor / Sanz, Borja / Laorden, Carlos / Brezo, Felix / Bringas, Pablo G. et al. | 2011
- 58
-
A New Alert Correlation Algorithm Based on Attack GraphRoschke, Sebastian / Cheng, Feng / Meinel, Christoph et al. | 2011
- 68
-
A Qualitative Survey of Active TCP/IP Fingerprinting Tools and Techniques for Operating Systems IdentificationMedeiros, João Paulo S. / Medeiros Brito Júnior, Agostinho / Motta Pires, Paulo S. et al. | 2011
- 76
-
Security Alert Correlation Using Growing Neural GasMora-Gimeno, Francisco José / Maciá-Pérez, Francisco / Lorenzo-Fonseca, Iren / Gil-Martínez-Abarca, Juan Antonio / Marcos-Jorquera, Diego / Gilart-Iglesias, Virgilio et al. | 2011
- 84
-
A Comparative Performance Evaluation of DNS Tunneling ToolsMerlo, Alessio / Papaleo, Gianluca / Veneziano, Stefano / Aiello, Maurizio et al. | 2011
- 92
-
Security Analysis and Complexity Comparison of Some Recent Lightweight RFID ProtocolsVahedi, Ehsan / Ward, Rabab K. / Blake, Ian F. et al. | 2011
- 100
-
A Secure and Efficient Searching Scheme for Trusted Nodes in a Peer-to-Peer NetworkSen, Jaydip et al. | 2011
- 109
-
Testing Ensembles for Intrusion Detection: On the Identification of Mutated Network ScansGonzález, Silvia / Sedano, Javier / Herrero, Álvaro / Baruque, Bruno / Corchado, Emilio et al. | 2011
- 118
-
An Intelligent Information Security Mechanism for the Network Layer of WSN: BIOSARPSaleem, Kashif / Fisal, Norsheila / Hafizah, Sharifah / Rashid, Rozeha A. et al. | 2011
- 127
-
Structural Properties of Cryptographic SequencesFúster-Sabater, A. et al. | 2011
- 135
-
A Multisignature Scheme Based on the SDLP and on the IFPDurán Díaz, R. / Hernández Encinas, L. / Muñoz Masqué, J. et al. | 2011
- 143
-
A Group Signature Scheme Based on the Integer Factorization and the Subgroup Discrete Logarithm ProblemsDurán Díaz, R. / Hernández Encinas, L. / Muñoz Masqué, J. et al. | 2011
- 151
-
Keeping Group Communications Private: An Up-to-Date Review on Centralized Secure MulticastNaranjo, J. A. M. / Casado, L. G. et al. | 2011
- 160
-
Java Card Implementation of the Elliptic Curve Integrated Encryption Scheme Using Prime and Binary Finite FieldsGayoso Martínez, V. / Hernández Encinas, L. / Sánchez Ávila, C. et al. | 2011
- 168
-
Comprehensive Protection of RFID Traceability Information Systems Using Aggregate SignaturesAzuara, Guillermo / Salazar, José Luis et al. | 2011
- 177
-
Cryptanalysis of Multicast Protocols with Key Refreshment Based on the Extended Euclidean AlgorithmPeinado, Alberto / Ortiz, Andrés et al. | 2011
- 183
-
Improving the Message Expansion of the Tangle Hash FunctionÁlvarez, Rafael / Vicent, José-Francisco / Zamora, Antonio et al. | 2011
- 190
-
Cryptosystem with One Dimensional Chaotic MapsMartínez-Ñonthe, J. A. / Díaz-Méndez, A. / Cruz-Irisson, M. / Palacios-Luengas, L. / Del-Río-Correa, J. L. / Vázquez-Medina, R. et al. | 2011
- 198
-
A Quantitative Analysis into the Economics of Correcting Software BugsWright, Craig S. / Zia, Tanveer A. et al. | 2011
- 206
-
Rationally Opting for the Insecure Alternative: Negative Externalities and the Selection of Security ControlsWright, Craig S. / Zia, Tanveer A. et al. | 2011
- 214
-
An Approach for Adapting Moodle into a Secure InfrastructureDiaz, Jesus / Arroyo, David / Rodriguez, Francisco B. et al. | 2011
- 222
-
On Secure JAVA Application in SOA-Based PKI Mobile Government SystemsMarković, Milan / Đorđević, Goran et al. | 2011
- 230
-
Structural Feature Based Anomaly Detection for Packed Executable IdentificationUgarte-Pedrero, Xabier / Santos, Igor / Bringas, Pablo G. et al. | 2011
- 238
-
Produre: A Novel Proximity Discovery Mechanism in Location Tagging SystemHu, Jianbin / Wang, Yonggang / Yang, Tao / Guan, Zhi / Gui, Nike / Chen, Zhong et al. | 2011
- 246
-
Scientific Gateway and Visualization ToolPajorová, Eva / Hluchý, Ladislav et al. | 2011
- 251
-
An Innovative Framework for Securing Unstructured DocumentsAmato, Flora / Casola, Valentina / Mazzeo, Antonino / Romano, Sara et al. | 2011
- 259
-
Use of Schema Associative Mapping for Synchronization of the Virtual Machine Audit LogsThorpe, Sean / Ray, Indrajit / Grandison, Tyrone et al. | 2011
- 265
-
Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping TechniquesThorpe, Sean / Ray, Indrajit / Grandison, Tyrone et al. | 2011
- 272
-
Evaluating User-Centered Privacy Model (UPM) in Pervasive Computing SystemsDehghantanha, Ali / Udzir, Nur Izura / Mahmod, Ramlan et al. | 2011
- 285
-
An Innovative Linkage Learning Based on Differences in Local OptimumsParvin, Hamid / Minaei-Bidgoli, Behrouz / Helmi, B. Hoda et al. | 2011
- 293
-
A New Particle Swarm Optimization for Dynamic EnvironmentsParvin, Hamid / Minaei, Behrouz / Ghatei, Sajjad et al. | 2011
- 301
-
A Classifier Ensemble for Face Recognition Using Gabor Wavelet FeaturesParvin, Hamid / Mozayani, Nasser / Beigi, Akram et al. | 2011