Author of the publication

Adaptation Enhanced Mechanism for Web Survivability.

, , , , and . PDCAT, volume 3320 of Lecture Notes in Computer Science, page 650-653. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Y-AOI: Y-Means Based Attribute Oriented Induction Identifying Root Cause for IDSs., , , , , and . FSKD (2), volume 3614 of Lecture Notes in Computer Science, page 205-214. Springer, (2005)On the Design of a Stream Cipher and a Hash Function Suitable to Smart Card Applications., , and . CARDIS, (1996)A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures., , and . ICISC, volume 2015 of Lecture Notes in Computer Science, page 1-13. Springer, (2000)On Key Distribution and Authentication in Mobile Radio Networks., , , and . EUROCRYPT, volume 765 of Lecture Notes in Computer Science, page 461-465. Springer, (1993)New Public-Key Cryptosystem Using Braid Groups., , , , , and . CRYPTO, volume 1880 of Lecture Notes in Computer Science, page 166-183. Springer, (2000)Global Avalanche Characteristics and Propagation Criterion of Balanced Boolean Functions., , and . Inf. Process. Lett., 69 (1): 21-24 (1999)An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification., , , , , , and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 225-234. Springer, (2005)An Alert Reasoning Method for Intrusion Detection System Using Attribute Oriented Induction., , , , , and . ICOIN, volume 3391 of Lecture Notes in Computer Science, page 72-79. Springer, (2005)Efficient Anonymous Channel and All/Nothing Election Scheme., , and . EUROCRYPT, volume 765 of Lecture Notes in Computer Science, page 248-259. Springer, (1993)How to construct balanced Boolean functions with good global avalanche characteristics., , , and . ICISC, page 121-130. Korea Institute of Information Security and Cryptology (KIISC), (1998)