Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 1 - 15 of 251.

Add to Quick Collection   All 251 Results

Sort:
 Add All Items to Quick Collection
Date: 2011
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/166326
Description: We propose security architecture to detect and prevent zero day attacks and techniques to deal with the polymorphic and metamorphic behaviour of the attacks. The components of our architecture are des ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1049123
Description: Yoking-proofs show an interesting application in Radio Frequency Identification (RFID) that a verifier can check whether two tags are simultaneously scanned by a reader. We consider a scenario that mu ... More
Reviewed: Reviewed
Date: 2005
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/11748
Description: XML has been widely used for representation and storage of documents and their exchange over the internet. Security mechanisms for the protection of XML document sources and their distribution are ess ... More
Reviewed: Reviewed
Date: 2004
Subject Keyword: 080500 Distributed Computing
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1245521
Description: 6 page(s)
Reviewed: Reviewed
Date: 2001
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/12750
Description: Web based services and applications have increased the availability and accessibility of information. XML (eXtensible Markup Langauge) has recently emerged as an important standard in the area of info ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1054373
Description: Hadoop has two components which are HDFS and MapReduce. HDFS is a distributed file system for storing data for users of Hadoop and MapReduce is the framework that executes jobs from users. Hadoop stor ... More
Reviewed: Reviewed
Date: 2001
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1233343
Description: 8 page(s)
Reviewed: Reviewed
Date: 2001
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1233302
Description: 17 page(s)
Reviewed: Reviewed
Date: 2011
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/166509
Description: The security protocols for WLAN such as WEP have fundamental weakness which can be exploited by the attacker to obtain unauthorized access to the wireless networks and generate attacks. In this paper, ... More
Reviewed: Reviewed
Date: 2008
Subject Keyword: 080500 Distributed Computing
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/115016
Description: In this paper, we propose a novel approach for Web search based on the statistical information of local setting data of web browsers in a community. The members of the community share their local sett ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/362825
Description: In many network applications, the nature of traffic is of burst type. Often, the transient response of network to such traffics is the result of a series of inter-dependant events whose occurrence pre ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1043972
Description: The current mobile devices have become smart and are increasingly being used for conducting business and personal activities. Also, there is increasing number of attacks targeting such mobile devices. ... More
Reviewed: Reviewed
Date: 2012
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/218025
Description: Sensor networks offer economically viable solutions for a wide variety of monitoring applications. In surveillance of critical infrastructure such as airports by sensor networks, security becomes a ma ... More
Reviewed: Reviewed
Date: 2010
Subject Keyword: 080500 Distributed Computing
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/140686
Description: Security and trust are fundamental challenges when it comes to the deployment of large wireless sensor networks. In this paper, we propose a novel hierarchical trust management scheme that minimizes c ... More
Reviewed: Reviewed
Date: 2010
Subject Keyword: 080500 Distributed Computing
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/118093
Description: In this paper, we present a trust establishment and management framework for hierarchical wireless sensor networks. The wireless sensor network architecture we consider consists of a collection of sen ... More
Full Text: Full Text
Reviewed: Reviewed