메뉴 건너뛰기




Volumn , Issue , 2006, Pages 32-56

Wireless Web security using a neural network-based cipher

Author keywords

[No Author keywords available]

Indexed keywords


EID: 77956597680     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-59904-168-1.ch002     Document Type: Chapter
Times cited : (3)

References (27)
  • 2
    • 40649121217 scopus 로고    scopus 로고
    • MASc thesis. Ryerson University, Department of Electrical and Computer Engineering, Toronto, Canada
    • Arvandi, M. (2005). Analysis of neural network based ciphers. MASc thesis. Ryerson University, Department of Electrical and Computer Engineering, Toronto, Canada.
    • (2005) Analysis of Neural Network Based Ciphers
    • Arvandi, M.1
  • 4
    • 35248842781 scopus 로고    scopus 로고
    • Pruning neural networks with distribution estimation algorithms
    • E. Cantú Paz et al. (Eds.), July 7-16, Chicago, IL
    • Cantú-Paz, E. (2003). Pruning neural networks with distribution estimation algorithms. In E. Cantú Paz et al. (Eds.), Proceedings of Genetic and Evolutionary Computation Conference, GECCO-2003(pp. 790-800). July 7-16, Chicago, IL.
    • (2003) Proceedings of Genetic and Evolutionary Computation Conference, GECCO-2003 , pp. 790-800
    • Cantú-Paz, E.1
  • 9
    • 84901513103 scopus 로고    scopus 로고
    • IPSec, Retrieved August 18, 2006, from
    • IPSec. (2004). The IPSec architecture. Retrieved August 18, 2006, from http://www.securitydocs.com/library/2926
    • (2004) The IPSec Architecture
  • 10
    • 0038355068 scopus 로고    scopus 로고
    • On neural network techniques in the secure management of communication systems through improving and quality assessing pseudorandom stream generators
    • Karras, D. A., & Zorkadis, V. (2003). On neural network techniques in the secure management of communication systems through improving and quality assessing pseudorandom stream generators.Neural Networks, 16(5-6), 899-905.
    • (2003) Neural Networks , vol.16 , Issue.5-6 , pp. 899-905
    • Karras, D.A.1    Zorkadis, V.2
  • 17
    • 0027662338 scopus 로고
    • Pruning algorithms: A survey
    • Reed, R. (1993). Pruning algorithms: A survey. IEEE Trans on Neural Networks, 4(5), 740-747.
    • (1993) IEEE Trans On Neural Networks , vol.4 , Issue.5 , pp. 740-747
    • Reed, R.1
  • 21
    • 0040534161 scopus 로고
    • Learning to see rotation and dilation with a Hebb rule
    • R. P. Lippmann, J. Moody, & D. S. Touretzky (Eds.), San Mateo, CA: Morgan Kaufmann Publishers
    • Sereno, M. I. & Sereno, M. E. (1991). Learning to see rotation and dilation with a Hebb rule. In R. P. Lippmann, J. Moody, & D. S. Touretzky (Eds.), Advances in Neutral Informal Processing Systems(Vol. I). San Mateo, CA: Morgan Kaufmann Publishers.
    • (1991) Advances In Neutral Informal Processing Systems , vol.1
    • Sereno, M.I.1    Sereno, M.E.2
  • 23
    • 0003477171 scopus 로고    scopus 로고
    • Using the Fluhrer, Mantin, and Shamir attack to break WEP
    • August, NJ: AT & T Labs
    • Stubblefield, A., Ioannidis, J., & Rubin, A. D. (August, 2001). Using the Fluhrer, Mantin, and Shamir attack to break WEP, Technical Report TD04ZCPZZ. NJ: AT & T Labs.
    • (2001) Technical Report TD04ZCPZZ
    • Stubblefield, A.1    Ioannidis, J.2    Rubin, A.D.3
  • 24
    • 2342565045 scopus 로고    scopus 로고
    • Design and realization of a new chaotic neural encryption/decryption network
    • Su, S., Lin, A., & Yen, J. (2000). Design and realization of a new chaotic neural encryption/decryption network. In IEEE Asia-Pacific Conference on Circuits and Systems (pp. 335-338).
    • (2000) IEEE Asia-Pacific Conference On Circuits and Systems , pp. 335-338
    • Su, S.1    Lin, A.2    Yen, J.3
  • 26
    • 0001202594 scopus 로고
    • A learning algorithm for continually running fully recurrent neural networks
    • Williams, R. J., & Zipser, D. (1989). A learning algorithm for continually running fully recurrent neural networks.Neural Computation, 1, 270-280.
    • (1989) Neural Computation , vol.1 , pp. 270-280
    • Williams, R.J.1    Zipser, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.