Cougar 发表于 2025-3-30 10:42:00

http://reply.papertrans.cn/47/4656/465541/465541_51.png

Explicate 发表于 2025-3-30 13:06:09

A Cognitive Trust Model for Access Control Framework in MANET security access control. The decentralized and mobile characteristics of MANET, restrains the traditional access control mechanisms to fit into it. In a MANEt, all peers or nodes are not equally trustworthy to request for a service or to transmit a packet. In decentralized system, concept of social

Ascribe 发表于 2025-3-30 20:04:37

: A Trust Access Control Model in Multi-Organization Environmentsion Based Access Control (.) need some improvements to be used in such environment, where the collaboration is established between organizations and not directly with the clients. In particular, some characteristics of this scenario are that the users may be unknown in advance and/or the behaviors o

PANEL 发表于 2025-3-30 23:07:55

On Policies and Intentstions under which entities can perform actions on data objects. Further, such policies are prolific in modern society, where information must flow between different enterprises, states, and countries, all of which will likely have different policies. Unfortunately, policies have proven to be extreme

PANG 发表于 2025-3-31 01:31:01

ProtoLeaks: A Reliable and Protocol-Independent Network Covert Channelon by using a mimicry defense. Using a network monitoring phase, traffic is analyzed to detect which application-layer protocols are allowed through the firewalls. Using these results, a covert channel is built based on permutations of benign network objects, such as FTP commands and HTTP requests t

Gorilla 发表于 2025-3-31 05:32:12

Keyless Steganography in Spatial Domain Using , Pixelsular approach in spatial domain steganography. However, since most schemes do not consider the image content when choosing the message carrying pixels, they are readily defeated by visual and statistical attacks. We show how to distribute the message in selective parts of an image, particularly in t

graphy 发表于 2025-3-31 11:12:33

http://reply.papertrans.cn/47/4656/465541/465541_57.png

人充满活力 发表于 2025-3-31 16:24:39

Secure Trust Metadata Management for Mobile Ad-Hoc Networkssed on their observation of the behavior of other nodes in their vicinity, is required to be accessible to a trust authority (TA) (e.g., the network administrator) for prompt decision making (e.g., revoking malicious nodes). In this work, for security and scalability reasons, we propose a secure sem

某人 发表于 2025-3-31 18:28:58

Defence against Wormhole Attacks in Wireless Mesh Networksre not secure against wormhole attacks while launched in participation mode. In this paper, we propose a wormhole defence mechanism (.), which operates in conjunction with any underlying routing protocol to detect the presence of wormhole during route discovery. The mechanism is based on the unit-di

有杂色 发表于 2025-3-31 22:33:50

A Novel Key Update Protocol in Mobile Sensor Networksactors (e.g. use of a wireless channel, deployment in public and unattended areas), WSN applications are vulnerable to various attacks such as impersonation, replay, selective forwarding and sink hole. Therefore, security is an important issue to protect data in WSN. Several symmetric key based secu
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Information Systems Security; 8th International Co Venkat Venkatakrishnan,Diganta Goswami Conference proceedings 2012 Springer-Verlag Berli