Web Services Security and E-business

Many techniques, algorithms, protocols and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality and non-repudiation as they apply to both networks and systems. "Web Services Security and E-Business" focuses on architectures and protocols, while bringing together the understanding of security problems related to the protocols and applications of the Internet, and the contemporary solutions to these problems. "Web Services Security and E-Business" provides insight into uncovering the security risks of dynamically-created content, and how proper content management can greatly improve the overall security. It also studies the security lifecycle and how to respond to an attack, as well as the problems of site hijacking and phishing.

[1]  Silvio Micali,et al.  A fair protocol for signing contracts , 1990, IEEE Trans. Inf. Theory.

[2]  Colin Boyd,et al.  On a Limitation of BAN Logic , 1994, EUROCRYPT.

[3]  Sandra Dominikus,et al.  Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.

[4]  Mark O'Neill,et al.  Web Services Security , 2003 .

[5]  Biswanath Mukherjee,et al.  A network security monitor , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[6]  David A. Wagner,et al.  Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.

[7]  Ben Soh,et al.  One-Way Signature Chaining: a new paradigm for group cryptosystems , 2008, Int. J. Inf. Comput. Secur..

[8]  George C. Necula,et al.  Proof-carrying code , 1997, POPL '97.

[9]  David H. Owens,et al.  Existence and learning of oscillations in recurrent neural networks , 2000, IEEE Trans. Neural Networks Learn. Syst..

[10]  Oded Goldreich,et al.  A randomized protocol for signing contracts , 1985, CACM.

[11]  George C. Necula,et al.  Safe, Untrusted Agents Using Proof-Carrying Code , 1998, Mobile Agents and Security.

[12]  Jung Hee Cheon,et al.  An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.

[13]  Stephen R. Tate,et al.  ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention , 2004, ITCC.

[14]  Colin Boyd,et al.  Public key protocols for wireless communications , 1998, ICISC.

[15]  Sixto Ortiz,et al.  Is Business Intelligence a Smart Move? , 2002, Computer.

[16]  Ivan Damgård,et al.  Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes , 2000, ASIACRYPT.

[17]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[18]  Christian F. Tschudin,et al.  Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.

[19]  Elsabé Cloete,et al.  Classification of malicious host threats in mobile agent computing , 2002 .

[20]  Du Ye,et al.  Design of a distributed intrusion detection system based on independent agents , 2004, International Conference on Intelligent Sensing and Information Processing, 2004. Proceedings of.

[21]  Mario Vento,et al.  A Performance Comparison of Five Algorithms for Graph Isomorphism , 2001 .

[22]  Ghassan Chaddoud,et al.  Dynamic group communication security , 2001, Proceedings. Sixth IEEE Symposium on Computers and Communications.

[23]  Danny B. Lange,et al.  Programming and Deploying Java¿ Mobile Agents with Aglets¿ , 1998 .

[24]  Bhavani M. Thuraisingham,et al.  Security constraint processing during the update operation in a multilevel secure database management system , 1991, Proceedings Seventh Annual Computer Security Applications Conference.

[25]  Dilip D. Kandlur,et al.  Key management for secure lnternet multicast using Boolean function minimization techniques , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[26]  Joos Vandewalle,et al.  (How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions , 2003, TOIT.

[27]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[28]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[29]  Konstantin Beznosov,et al.  Introduction to Web services and their security , 2005, Inf. Secur. Tech. Rep..

[30]  Ronald L. Rivest,et al.  The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.

[31]  Martin Naedele Standards for XML and Web Services Security , 2003, Computer.

[32]  Ralph Arnote,et al.  Hong Kong (China) , 1996, OECD/G20 Base Erosion and Profit Shifting Project.

[33]  Amos Fiat,et al.  How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.

[34]  J. F. McClary,et al.  NADIR: An automated system for detecting network intrusion and misuse , 1993, Comput. Secur..

[35]  N. Asokan,et al.  Optimistic fair exchange of digital signatures , 1998, IEEE Journal on Selected Areas in Communications.

[36]  Ton A. M. Spil,et al.  Business intelligence in healthcare organizations , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[37]  Marthie Schoeman,et al.  Architectural components for the efficient design of mobile agent systems , 2003 .

[38]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .

[39]  G. Gangadharan,et al.  Business intelligence systems: design and implementation strategies , 2004, 26th International Conference on Information Technology Interfaces, 2004..

[40]  Robert H. Deng,et al.  Efficient and practical fair exchange protocols with off-line TTP , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[41]  William M. Farmer,et al.  Security for Mobile Agents: Issues and Requirements , 1996 .

[42]  Luc Moreau,et al.  Certificates for mobile code security , 2002, SAC '02.

[43]  S. E. Smaha Haystack: an intrusion detection system , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.

[44]  Mihir Bellare,et al.  A concrete security treatment of symmetric encryption , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.

[45]  Colin Boyd,et al.  Key Establishment Protocols for Secure Mobile Communications: A Selective Survey , 1998, ACISP.

[46]  David A. Wagner,et al.  Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.

[47]  Jean-Jacques Quisquater,et al.  The Exact Security of an Identity Based Signature and its Applications , 2004, IACR Cryptol. ePrint Arch..

[48]  Witold Kinsner,et al.  Transient analysis and genetic algorithms for classification , 1995, IEEE WESCANEX 95. Communications, Power, and Computing. Conference Proceedings.

[49]  Robert J. Zuccherato,et al.  An Attack on CFB Mode Encryption as Used by OpenPGP , 2005, Selected Areas in Cryptography.

[50]  Frank Harary,et al.  Graph Theory , 2016 .

[51]  Matt Blaze,et al.  Cryptographic Modes of Operation for the Internet , 2001 .

[52]  Colin Boyd,et al.  Development of authentication protocols: some misconceptions and a new approach , 1994, Proceedings The Computer Security Foundations Workshop VII.

[53]  Dawn Xiaodong Song,et al.  ELK, a new protocol for efficient large-group key distribution , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[54]  Martin Roesch,et al.  Snort - Lightweight Intrusion Detection for Networks , 1999 .

[55]  Ashok Samal,et al.  A dual encryption protocol for scalable secure multicasting , 1999, Proceedings IEEE International Symposium on Computers and Communications (Cat. No.PR00250).

[56]  Vincent M. Stanford,et al.  IEEE Pervasive Computing: Applications - Pervasive Computing Goes the Last Hundred Feet with RFID Systems , 2003, IEEE Distributed Syst. Online.

[57]  Alan R. Simon,et al.  Network security , 1994 .

[58]  B. Soh,et al.  Authenticating mobile agent platforms using signature chaining without trusted third parties , 2005, 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service.

[59]  Thomas R. Gross,et al.  TCP Vegas revisited , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[60]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[61]  Morris Sloman,et al.  Policy driven management for distributed systems , 1994, Journal of Network and Systems Management.

[62]  Nen-Fu Huang,et al.  Apply data mining to defense-in-depth network security system , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[63]  Oded Goldreich,et al.  Foundations of Cryptography: Basic Tools , 2000 .

[64]  David L. Tennenhouse,et al.  Towards an active network architecture , 2007, Comput. Commun. Rev..

[65]  Carlo Ghezzi,et al.  Mobile Code Paradigms and Technologies: A Case Study , 1997, Mobile Agents.

[66]  Liu Hao,et al.  Business intelligence based group decision support system , 2001, 2001 International Conferences on Info-Tech and Info-Net. Proceedings (Cat. No.01EX479).

[67]  Steven M. Bellovin,et al.  Problem Areas for the IP Security Protocols , 1996, USENIX Security Symposium.

[68]  Danny B. Lange,et al.  A Security Model for Aglets , 1997, IEEE Internet Comput..

[69]  Sheng Zhong,et al.  Verifiable Distributed Oblivious Transfer and Mobile Agent Security , 2006, Mob. Networks Appl..

[70]  Manfred Schimmler,et al.  Area and time efficient modular multiplication of large integers , 2003, Proceedings IEEE International Conference on Application-Specific Systems, Architectures, and Processors. ASAP 2003.

[71]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[72]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[73]  Stephen M. Matyas,et al.  A proposed mode for triple-DES encryption , 1996, IBM J. Res. Dev..

[74]  Eric J. Harder,et al.  Key Management for Multicast: Issues and Architectures , 1999, RFC.

[75]  William C. Fenner Internet Group Management Protocol, Version 2 , 1997, RFC.

[76]  Christian Geuer-Pollmann,et al.  Web services and web service security standards , 2005, Inf. Secur. Tech. Rep..

[77]  Gene Tsudik,et al.  Itinerant Agents for Mobile Computing , 1995, IEEE Communications Surveys & Tutorials.

[78]  Colin Boyd,et al.  Towards formal analysis of security protocols , 1993, [1993] Proceedings Computer Security Foundations Workshop VI.

[79]  Alan T. Sherman,et al.  Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization , 2000 .

[80]  Eli Biham,et al.  Cryptanalysis of Multiple Modes of Operation , 1994, Journal of Cryptology.

[81]  L. F. Wilson,et al.  Analysis of distributed intrusion detection systems using Bayesian methods , 2002, Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference (Cat. No.02CH37326).

[82]  Yunhao Liu,et al.  LANDMARC: Indoor Location Sensing Using Active RFID , 2004, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[83]  Shiuh-Pyng Shieh,et al.  Secure key agreement for group communications , 2001, Int. J. Netw. Manag..

[84]  Eli Biham,et al.  Cryptanalysis of the ANSI X9.52 CBCM mode , 2001, Journal of Cryptology.

[85]  Royce Robbins,et al.  Distributed Intrusion Detection Systems: An Introduction and Review , 2003 .

[86]  Ed Dawson,et al.  Classification of Authentication Protocols: A Practical Approach , 2000, ISW.

[87]  Biswanath Mukherjee,et al.  A system for distributed intrusion detection , 1991, COMPCON Spring '91 Digest of Papers.

[88]  Intrusion detection technology research based high-speed network , 2003, Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies.

[89]  Ari Juels,et al.  Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.

[90]  Philippe Oechslin,et al.  RFID Traceability: A Multilayer Problem , 2005, Financial Cryptography.

[91]  Wayne A. Jansen,et al.  Countermeasures for mobile agent security , 2000, Comput. Commun..

[92]  D. Pointcheval Neural Networks and their Cryptographic Applications , 1994 .

[93]  Mario Piattini,et al.  A Survey of Web Services Security , 2004, ICCSA.

[94]  William Stallings,et al.  Cryptography and network security , 1998 .

[95]  Geoffrey Smith,et al.  Language Issues in Mobile Program Security , 1998, Mobile Agents and Security.

[96]  Randall J. Atkinson,et al.  Security Architecture for the Internet Protocol , 1995, RFC.

[97]  Simon Haykin,et al.  Neural Networks: A Comprehensive Foundation , 1998 .

[98]  Kenneth H. Rosen,et al.  Discrete Mathematics and its applications , 2000 .

[99]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[100]  Daniel E. Geer,et al.  Mobile Code Security , 1998, IEEE Internet Comput..

[101]  Koutarou Suzuki,et al.  Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .

[102]  Moti Yung,et al.  Sliding Encryption: A Cryptographic Tool for Mobile Agents , 1997, FSE.

[103]  Gavin Lowe,et al.  Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.

[104]  Dharma P. Agrawal,et al.  SVM-based intrusion detection system for wireless ad hoc networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[105]  Robert S. Boyer,et al.  A fast string searching algorithm , 1977, CACM.

[106]  Jan Camenisch,et al.  Separability and Efficiency for Generic Group Signature Schemes , 1999, CRYPTO.

[107]  Jacques Stern,et al.  A new public key cryptosystem based on higher residues , 1998, CCS '98.

[108]  C. Boyd,et al.  Methodical use of cryptographic transformations in authentication protocols , 1995 .

[109]  Shiuh-Pyng Shieh,et al.  A secure multicast protocol for the internet's multicast backbone , 2001 .

[110]  Matthew J. Moyer,et al.  A survey of security issues in multicast communications , 1999, IEEE Network.

[111]  Son T. Vuong,et al.  A security architecture and design for mobile intelligent agent systems , 2001, SIAP.

[112]  Morris J. Dworkin,et al.  Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .

[113]  Giuseppe Ateniese Verifiable encryption of digital signatures and applications , 2004, TSEC.

[114]  Eugene H. Spafford,et al.  The design and implementation of tripwire: a file system integrity checker , 1994, CCS '94.

[115]  Rudolf Lide,et al.  Finite fields , 1983 .

[116]  David A. Wagner Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation , 1998, FSE.

[117]  Mohammad Zulkernine,et al.  DIDMA: a distributed intrusion detection system using mobile agents , 2005, Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Network.

[118]  Tomasz Imielinski,et al.  Handling mobile clients: a case for indirect interaction , 1993, Proceedings of IEEE 4th Workshop on Workstation Operating Systems. WWOS-III.

[119]  Bruce Schneier,et al.  Environmental Key Generation Towards Clueless Agents , 1998, Mobile Agents and Security.

[120]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[121]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[122]  Wolfgang Kinzel,et al.  Neural cryptography , 2002, Proceedings of the 9th International Conference on Neural Information Processing, 2002. ICONIP '02..

[123]  Daniel S. Soper A Framework for Automated Web Business Intelligence Systems , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[124]  Manuel Blum,et al.  Secure Human Identification Protocols , 2001, ASIACRYPT.

[125]  Ran Canetti,et al.  Efficient and Secure Source Authentication for Multicast , 2001, NDSS.

[126]  Stefanos Manganaris,et al.  A Data Mining Analysis of RTID Alarms , 2000, Recent Advances in Intrusion Detection.

[127]  Harold S. Javitz,et al.  The SRI IDES statistical anomaly detector , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[128]  Bruce Schneier,et al.  Practical cryptography , 2003 .

[129]  Simson L. Garfinkel,et al.  PGP: Pretty Good Privacy , 1994 .

[130]  Wayne A. Jansen,et al.  Mobile Agent Security , 1999 .

[131]  Chris J. Mitchell Cryptography for mobile security , 2004 .

[132]  David Wong,et al.  Concordia: An Infrastructure for Collaborating Mobile Agents , 1997, Mobile Agents.

[133]  Ran Canetti,et al.  Multicast Security (MSEC) Group Key Management Architecture , 2005, RFC.

[134]  Anand R. Tripathi,et al.  Experiences and future challenges in mobile agent programming , 2001, Microprocess. Microsystems.

[135]  Sajal K. Das,et al.  An ubiquitous architectural framework and protocol for object tracking using RFID tags , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..

[136]  W. J. Thron,et al.  Encyclopedia of Mathematics and its Applications. , 1982 .

[137]  Nicholas Kalouptsidis,et al.  Efficient Algorithms for , 1999 .

[138]  Eli Biham,et al.  Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .

[139]  Amos Fiat,et al.  Zero-knowledge proofs of identity , 1987, Journal of Cryptology.

[140]  Richard J. Lipton,et al.  On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.

[141]  Fritz Hohl,et al.  Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.

[142]  Hovav Shacham,et al.  Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.

[143]  L. Sydanheimo,et al.  Use and interface definition of mobile RFID reader integrated in a smart phone , 2005, Proceedings of the Ninth International Symposium on Consumer Electronics, 2005. (ISCE 2005)..

[144]  Eli Biham Cryptanalysis of Triple Modes of Operation , 1999, Journal of Cryptology.

[145]  Silvio Micali,et al.  Accountable-subgroup multisignatures: extended abstract , 2001, CCS '01.

[146]  Jun Li,et al.  The Architecture of the Large-scale Distributed Intrusion Detection System , 2005, Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05).

[147]  Matteo Golfarelli,et al.  Beyond data warehousing: what's next in business intelligence? , 2004, DOLAP '04.

[148]  Silvio Micali,et al.  The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..

[149]  Stephen E. Deering,et al.  Host extensions for IP multicasting , 1986, RFC.

[150]  Hervé Debar,et al.  A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[151]  Rolf Oppliger,et al.  Security Technologies for the World Wide Web , 2000 .

[152]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[153]  Jean-Jacques Quisquater,et al.  A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory , 1988, EUROCRYPT.

[154]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[155]  Ben Soh,et al.  A novel method for authenticating mobile agents with one-way signature chaining , 2005, Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005..

[156]  Philippe Oechslin,et al.  Reducing Time Complexity in RFID Systems , 2005, Selected Areas in Cryptography.

[157]  Mostafa Ammar,et al.  Security issues and solutions in multicast content distribution: a survey , 2003 .

[158]  Zhong-Yang Xiong,et al.  Distributed intrusion detection based on clustering , 2005, 2005 International Conference on Machine Learning and Cybernetics.

[159]  Adi Shamir Stream Ciphers: Dead or Alive? , 2004, ASIACRYPT.

[160]  Paul C. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.

[161]  Warwick Ford,et al.  Computer communication security - principles, standard protocols and techniques , 2008 .

[162]  Antonio Corradi,et al.  Security of mobile agents on the Internet , 2001, Internet Res..

[163]  Adi Shamir,et al.  Analysis of Neural Cryptography , 2002, ASIACRYPT.

[164]  Vijay Varadharajan Security enhanced mobile agents , 2000, CCS.

[165]  Gary McGraw,et al.  Attacking Malicious Code: A Report to the Infosec Research Council , 2000, IEEE Software.

[166]  Neil C. Rowe,et al.  A Distributed Autonomous-Agent Network-Intrusion Detection and Response System , 1998 .

[167]  William R. Parkhurst Cisco Multicasting Routing and Switching , 1999 .

[168]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[169]  Rajeev Gopalakrishna,et al.  A Framework for Distributed Intrusion Detection using Interest-Driven Cooperative Agents , 2001 .

[170]  Rossouw von Solms,et al.  The utilization of artificial intelligence in a hybrid intrusion detection system , 2002 .

[171]  A. Menezes,et al.  Applications of Finite Fields , 1992 .

[172]  Jonathan Katz,et al.  A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols , 2000, USENIX Security Symposium.

[173]  William M. Farmer,et al.  Security for Mobile Agents: Authentication and State Appraisal , 1996, ESORICS.

[174]  Kevin C. Almeroth,et al.  IP Multicast Applications: Challenges and Solutions , 2001, RFC.

[175]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[176]  Jonathan Katz,et al.  Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG , 2002, ISC.

[177]  Philip R. Zimmermann,et al.  The official PGP user's guide , 1996 .

[178]  Margaret E. Sereno,et al.  Learning to See Rotation and Dilation with a Hebb Rule , 1990, NIPS.

[179]  Christian F. Tschudin,et al.  Towards mobile cryptography , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[180]  Claus-Peter Schnorr,et al.  Efficient signature generation by smart cards , 2004, Journal of Cryptology.

[181]  Colin Boyd,et al.  Protocols for Authentication and Key Establishment , 2003, Information Security and Cryptography.

[182]  Cesare Stefanelli,et al.  Flexible security policies for mobile agent systems , 2001, Microprocess. Microsystems.

[183]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[184]  Berk Sunar,et al.  An Efficient Optimal Normal Basis Type II Multiplier , 2001, IEEE Trans. Computers.

[185]  John Ioannidis,et al.  Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.

[186]  Jizhou Sun,et al.  Honeypot and scan detection in intrusion detection system , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).

[187]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[188]  Ljiljana Brankovic,et al.  An Overview of Security Issues and Techniques in Mobile Agents , 2004, Communications and Multimedia Security.

[189]  Colin Boyd,et al.  Advances in Cryptology - ASIACRYPT 2001 , 2001 .

[190]  Nathalie Weiler,et al.  The VersaKey framework: versatile group key management , 1999, IEEE J. Sel. Areas Commun..

[191]  Victor K.-W. Wei,et al.  Preemptive distributed intrusion detection using mobile agents , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[192]  Jean-Sébastien Coron,et al.  Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption , 2003, ASIACRYPT.

[193]  Russell Reed,et al.  Pruning algorithms-a survey , 1993, IEEE Trans. Neural Networks.

[194]  James C. Reynolds,et al.  On-line intrusion detection and attack prevention using diversity, generate-and-test, and generalization , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[195]  Gildas Avoine,et al.  Privacy Issues in RFID Banknote Protection Schemes , 2004, CARDIS.

[196]  Suvo Mittra,et al.  Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.

[197]  Anand R. Tripathi,et al.  Mobile agent programming in Ajanta , 1999, Proceedings. 19th IEEE International Conference on Distributed Computing Systems (Cat. No.99CB37003).

[198]  Paolo Bellavista,et al.  Security for Mobile Agents : Issues and Challenges , 2003 .

[199]  David McGrew Counter Mode Security: Analysis and Recommendations , 2002 .

[200]  Tassos Dimitriou,et al.  A Lightweight RFID Protocol to protect against Traceability and Cloning attacks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[201]  Bart Preneel,et al.  On the Security of Double and 2-Key Triple Modes of Operation , 1999, FSE.

[202]  Xiaohua Hu,et al.  An OLAM framework for Web usage mining and business intelligence reporting , 2002, 2002 IEEE World Congress on Computational Intelligence. 2002 IEEE International Conference on Fuzzy Systems. FUZZ-IEEE'02. Proceedings (Cat. No.02CH37291).

[203]  Fritz Hohl Mobile agent security and reliability , 1998, Proceedings Ninth International Symposium on Software Reliability Engineering (Cat. No.98TB100257).

[204]  Frank P. Coyle Wireless Web: A Manager's Guide , 2001 .