JayKay's Link Exchange Directory

Search the directory:
You are here » JayKay's Link Exchange » Links Directory » Computers

  • Advertising and Marketing (1)

  • Artificial Intelligence (0)

  • Business and Economics (0)

  • Consultants (0)

  • Data Communications (1)

  • Directories (0)

  • Games (0)

  • Graphics (0)

  • Hardware (2)

  • Home Pages (0)

  • Internet (4)

  • Multimedia (2)

  • Operating Systems (0)

  • Parallel Computing (0)

  • Programming (0)

  • Security (0)

  • Software (2)

  • Technical Guides (0)

  • Virtual Reality (0)

  • Web Design (3)

  • Web Hosting (0)

  • World Wide Web (0)


  • Add your link - Submission Guidelines

    Computers RSS Feeds

    Capsule Reviews - The Capsule Reviews are intended to provide a short succinct review of each paper in the issue in order to bring it to a wider readership. The Capsule Reviews were compiled by Fairouz Kamareddine. Professor Kamareddine is an Associate Editor of The Computer Journal and is based in the Department of Mathematical and Computer Sciences at Heriot-Watt University, Edinburgh, UK. ...
    Feed Source: comjnl.oxfordjournals.org

    Secure-TWS: Authenticating Node to Multi-user Communication in Shared Sensor Networks - Recent works have shown the usefulness of network and application layer protocols that connect low-power sensor nodes directly to multiple applications and users on the Internet. We propose a security solution for this scenario. While previous works have provided security support for various communication patterns in sensor networks, such as among nodes, from nodes to a base station, and from users to nodes, the security of communication from se...
    Feed Source: comjnl.oxfordjournals.org

    Dynamic State-Based Security Architecture for Detecting Security Attacks in Virtual Machines - Current Internet environment is vulnerable to a range of different types of attacks, and furthermore, new types of attacks are being discovered on a daily basis. In this paper, we address the design of comprehensive intrusion detection for virtual-machine-based systems. We propose a novel security architecture using a virtual machine monitor-based intrusion detection system called Virtual machine Intrusion deteCTOR (VICTOR), which takes into acc...
    Feed Source: comjnl.oxfordjournals.org

    Attacking Anonymous Web Browsing at Local Area Networks Through Browsing Dynamics - The majority of current anonymous systems focus on improving anonymity at the network and website level in order to defend against traffic analysis attacks. However, the vulnerability of the connections between end users and the anonymous network do not attract any attention yet. For the first time, we reveal an end user browsing dynamics based attack on anonymous browsing systems at the LAN where the victim locates. This new attack method is fu...
    Feed Source: comjnl.oxfordjournals.org

    Satisfying Privacy Requirements Before Data Anonymization - In this paper, we study a problem of protecting privacy of individuals in large public survey rating data. We propose a novel (k,, l)-anonymity model to protect privacy in large survey rating data, in which each survey record is required to be similar to at least k–1 other records based on the non-sensitive ratings, where the similarity is controlled by , and the standard deviation of sensitive ratings is at least l. We study an interestin...
    Feed Source: comjnl.oxfordjournals.org

    Improved Anonymous Multi-receiver Identity-Based Encryption - In 2010, Fan et al. proposed an efficient anonymous multi-receiver identity-based encryption scheme. This scheme allows a sender to send an encrypted message to a set of designated receivers while preserving receiver anonymity. The scheme is highly efficient for each receiver as it requires only two pairing operations. However, we found that the scheme failed to protect receiver anonymity and the security notation for receiver anonymity captures...
    Feed Source: comjnl.oxfordjournals.org

    On F5 Steganography in Images - Steganalysis is the reasonable method to detect whether the transmitted media content contains secret messages (e.g. business secrecy). This paper proposes two steganalysis methods to estimate the modification ratio of F5 steganography and its improved version that are popularly used to hide secrecy in images. The proposed methods measure the distance between the coefficient histogram of a given image and that of an estimated stego image. The di...
    Feed Source: comjnl.oxfordjournals.org

    Certificateless Signatures: New Schemes and Security Models - We present a study of security in certificateless signatures. We divide potential adversaries according to their attack power, and for the first time, three new kinds of adversaries are introduced into certificateless signatures. They are Normal Adversary, Strong Adversary and Super Adversary (ordered by their attack power). Combined with the known Type I Adversary and Type II Adversary in certificateless cryptography, we then define the securit...
    Feed Source: comjnl.oxfordjournals.org

    Efficient Revocable ID-Based Encryption with a Public Channel - Over the last few years, identity (ID)-based encryption (IBE) without requiring certificate management offers a practical alternative to public key encryption. However, how to revoke misbehaving/compromised identities in ID-based public key setting becomes a new and critical issue. In the past, there was little work on studying this revocation problem. In 2008, Boldyreva et al. proposed a revocable IBE (RIBE) and its associated revocation soluti...
    Feed Source: comjnl.oxfordjournals.org

    Predicting the Propagation Path of Random Worm by Subnet Infection Situation Using Fuzzy Reasoning - Predicting the propagation path of a network worm is highly beneficial for taking appropriate countermeasures in advance. Traditional worm propagation models mainly deal with the total number of infected hosts during a period of time, which cannot indicate a worm's track. We choose the worm using random scanning to study, as it was the basic type and all the others were derived from it. A novel model proposed in this paper locates the subnets go...
    Feed Source: comjnl.oxfordjournals.org

    Encrypted Pointers in Protection System Design - A salient aspect of protection system design is the set of the mechanisms for the representation, distribution, verification and revocation of access privileges. With reference to a segmented virtual memory space, we present an approach that is based on the use of symmetric-key cryptography to represent segment pointers, including access right specifications. Our design effort has been guided by three main objectives: (i) to maintain the simplic...
    Feed Source: comjnl.oxfordjournals.org

    5 Eye-Strain Solutions Everyone Needs To Know + Are Your Photos Being Ruined By Windows? + Open Up A World Of Video Information - ...
    Feed Source: www.worldstart.com

    Has Your Disk Space Reached Critical Levels? + The Secret To Checking Your Email Anytime, Anywhere + Open Up Your Internet World With iGoogle - ...
    Feed Source: www.worldstart.com

    The Top 10 Add-Ons Your Browser Needs + What Is That Mysterious Error Message? + Looking For More Results Out Of Your Searches? - ...
    Feed Source: www.worldstart.com

    Is There Such Thing As Too Much Security? + What's New In The World Of Technology? + A Faster Way To Send Photos - ...
    Feed Source: www.worldstart.com

    Get The Dynamic Desktop You've Been Waiting For + Overhaul Your Icon Experience + Your Photography Gets Social - ...
    Feed Source: www.worldstart.com

    50 Keyboard Shortcuts For Your Social World + Missing - Wireless Internet Password + Backup Vital Browser Info With This Download - ...
    Feed Source: www.worldstart.com

    Our Week's Top 10 Rapid-Fire Tips + Having Trouble Viewing That Important File? + Online Searching Has Never Looked Better - ...
    Feed Source: www.worldstart.com

    DNA Profiles Link Dope to Its Source - 09 Jul 03 Forensic scientists in the U.S. are applying DNA fingerprinting methods to the cannabis plant. They say the technique, which is being used to create a database of DNA profiles of different marijuana plants, will help them to trace the source of any sample. 'It links everybody together: the user, the distributor, the grower,' says the database's creator, Heather Miller Coyle of the Connecticut State Forensic Science Laboratory in Meriden...
    Feed Source: www.newscientist.com

    Mathematics: Does the Proof Stack Up? - by George Szpiro 03 Jul 03 Just under five years ago, Thomas Hales made a startling claim. In an e-mail he sent to dozens of mathematicians, Hales declared that he had used a series of computers to prove an idea that has evaded certain confirmation for 400 years. The subject of his message was Kepler's conjecture, proposed by the German astronomer Johannes Kepler, which states that the densest arrangement of spheres is one in which they are stack...
    Feed Source: www.nature.com

    Scientists Discover Planetary System Similar to Our Own - The image shows an impression by David A. Hardy of a possible scene from a moon orbiting the extra-solar planet in orbit around the star HD70642. Photo Credit: David A. Hardy. ...
    Feed Source: www.nsf.gov

    Hacker How-To Good Summer Reading - by Michelle Delio 27 Jun 03 Stealing the Network: How to Own the Boxby Ryan RussellSyngress, 330 pp., $49.95 Stealing The Network: How to Own the Box, a compendium of tales written by well-known hackers, is a perfect summer read. The stories are fictional. The technology and techniques described are very real. A warning: Those...
    Feed Source: www.wired.com

    Add your link - Submission Guidelines

    Copyright © 2019, JayKay's Link Exchange. All Rights Reserved.