An United Defense Intrusion Detection System Based on Elliptic Curve
碩士 === 世新大學 === 資訊管理學研究所(含碩專班) === 93 === An efficient and security scheme can be implemented to the multi-intrusion detection system environment based on elliptic curve is proposed in this paper. It combined secutity and convenience for user to transmit alert message when hackers attempt to attack....
Main Authors: | Cheng-Yi Lin, 林承毅 |
---|---|
Other Authors: | Horng-Twu Liaw |
Format: | Others |
Language: | zh-TW |
Published: |
2005
|
Online Access: | http://ndltd.ncl.edu.tw/handle/03314366859689265798 |
Similar Items
-
Oblivious Transfer Protocols Based on Elliptic Curve Cryptography
by: JYUN-YI-LI, et al.
Published: (2008) -
Network defense-in-depth: evaluating host-based intrusion detection systems
by: Yun, Ronald E.
Published: (2012) -
Applications of S-unit equations to the arithmetic of elliptic curves
by: Koutsianas, Angelos
Published: (2016) -
Intrusion Detection and Response System Inspired by the Defense Mechanism of Plants
by: Rupam Kumar Sharma, et al.
Published: (2019-01-01) -
Hardware Implementation of Mathematical Operation Unit in Elliptic Curve Cryptosystems
by: Cheng-Chieh Chang, et al.
Published: (2002)