ISSN : 1796-2056
Volume : 1    Issue : 5    Date : September/October 2006

Article Information

Efficient 3G324M protocol Implementation for Low Bit Rate Multipoint Video Conferencing
Weijia Jia, Fung Po Tso, and Lizhou Zhang
Page(s): 1-8
Abstract  |  Full Text: PDF (491 KB)

802.11i Encryption Key Distribution Using Quantum Cryptography
Thi Mai Trang Nguyen, Mohamed Ali Sfaxi, and Solange Ghernaouti-Hélie
Page(s): 9-20
Abstract  |  Full Text: PDF (416 KB)

Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security
Yih Huang, David Arsenault, and Arun Sood
Page(s): 21-30
Abstract  |  Full Text: PDF (355 KB)

On Stochastic Modeling for Integrated Security and Dependability Evaluation
Karin Sallhammar, Bjarne E. Helvik, and Svein J. Knapskog
Page(s): 31-42
Abstract  |  Full Text: PDF (650 KB)

System-Level Fault Diagnosis Using Comparison Models: An Artificial-Immune-Systems-Based
Mourad Elhadef, Shantanu Das, and Amiya Nayak
Page(s): 43-53
Abstract  |  Full Text: PDF (521 KB)