Volume 2; Issue 6

1

When is a key establishment protocol correct?

Year:
2009
Language:
english
File:
PDF, 172 KB
english, 2009
4

New statistical approaches for anomaly detection

Year:
2009
Language:
english
File:
PDF, 281 KB
english, 2009
5

Misuse patterns in VoIP

Year:
2009
Language:
english
File:
PDF, 272 KB
english, 2009
6

Building a wireless capturing tool for WiFi

Year:
2009
Language:
english
File:
PDF, 394 KB
english, 2009
8

Random security scheme selection for mobile transactions

Year:
2009
Language:
english
File:
PDF, 439 KB
english, 2009
10

An anonymous on-demand source routing in MANETs

Year:
2009
Language:
english
File:
PDF, 305 KB
english, 2009
11

On the performance of using Covert Timing Channels for node authentication

Year:
2009
Language:
english
File:
PDF, 428 KB
english, 2009
16

Chestega: chess steganography methodology

Year:
2009
Language:
english
File:
PDF, 463 KB
english, 2009
17

K08: a generalized BB84/B92 protocol in quantum cryptography

Year:
2009
Language:
english
File:
PDF, 224 KB
english, 2009