Πλοήγηση ανά Θέμα "Public key cryptography"
Αποτελέσματα 1-2 από 2
-
A test-bed for intrusion detection systems results post-processing
(2014)Intrusion detection systems produce alert sets of low quality. Many post-processing methods have been proposed to make alert sets more meaningful to security analysts. Relevant research has to deal with an important task; ... -
Voice interactive personalized security (VoIPSEC) protocol: Fortify internet telephony by providing end-to-end security through inbound key exchange and biometric verification
(2006)Secure end-to-end information exchange is a constant challenge in electronic communications. Novel security architectures and approaches are proposed constantly, to be followed by announcements of sophisticated attack ...