找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Systems Security; 8th International Co Venkat Venkatakrishnan,Diganta Goswami Conference proceedings 2012 Springer-Verlag Berli

[复制链接]
楼主: Myelopathy
发表于 2025-3-30 10:42:00 | 显示全部楼层
发表于 2025-3-30 13:06:09 | 显示全部楼层
A Cognitive Trust Model for Access Control Framework in MANET security access control. The decentralized and mobile characteristics of MANET, restrains the traditional access control mechanisms to fit into it. In a MANEt, all peers or nodes are not equally trustworthy to request for a service or to transmit a packet. In decentralized system, concept of social
发表于 2025-3-30 20:04:37 | 显示全部楼层
: A Trust Access Control Model in Multi-Organization Environmentsion Based Access Control (.) need some improvements to be used in such environment, where the collaboration is established between organizations and not directly with the clients. In particular, some characteristics of this scenario are that the users may be unknown in advance and/or the behaviors o
发表于 2025-3-30 23:07:55 | 显示全部楼层
On Policies and Intentstions under which entities can perform actions on data objects. Further, such policies are prolific in modern society, where information must flow between different enterprises, states, and countries, all of which will likely have different policies. Unfortunately, policies have proven to be extreme
发表于 2025-3-31 01:31:01 | 显示全部楼层
ProtoLeaks: A Reliable and Protocol-Independent Network Covert Channelon by using a mimicry defense. Using a network monitoring phase, traffic is analyzed to detect which application-layer protocols are allowed through the firewalls. Using these results, a covert channel is built based on permutations of benign network objects, such as FTP commands and HTTP requests t
发表于 2025-3-31 05:32:12 | 显示全部楼层
Keyless Steganography in Spatial Domain Using , Pixelsular approach in spatial domain steganography. However, since most schemes do not consider the image content when choosing the message carrying pixels, they are readily defeated by visual and statistical attacks. We show how to distribute the message in selective parts of an image, particularly in t
发表于 2025-3-31 11:12:33 | 显示全部楼层
发表于 2025-3-31 16:24:39 | 显示全部楼层
Secure Trust Metadata Management for Mobile Ad-Hoc Networkssed on their observation of the behavior of other nodes in their vicinity, is required to be accessible to a trust authority (TA) (e.g., the network administrator) for prompt decision making (e.g., revoking malicious nodes). In this work, for security and scalability reasons, we propose a secure sem
发表于 2025-3-31 18:28:58 | 显示全部楼层
Defence against Wormhole Attacks in Wireless Mesh Networksre not secure against wormhole attacks while launched in participation mode. In this paper, we propose a wormhole defence mechanism (.), which operates in conjunction with any underlying routing protocol to detect the presence of wormhole during route discovery. The mechanism is based on the unit-di
发表于 2025-3-31 22:33:50 | 显示全部楼层
A Novel Key Update Protocol in Mobile Sensor Networksactors (e.g. use of a wireless channel, deployment in public and unattended areas), WSN applications are vulnerable to various attacks such as impersonation, replay, selective forwarding and sink hole. Therefore, security is an important issue to protect data in WSN. Several symmetric key based secu
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-16 11:37
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表