Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
A Secure and Open Mobile Agent Programming Environment
ISADS '99 Proceedings of the The Fourth International Symposium on Autonomous Decentralized Systems
The Emergence of Cyber-Terrorism
IEEE Distributed Systems Online
Terror on the Internet: The New Arena, the New Challenges
Terror on the Internet: The New Arena, the New Challenges
A time-variant risk analysis and damage estimation for large-scale network systems
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
A method for detecting the exposure of OCSP responder's session private key in D-OCSP-KIS
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
Information system modeling for analysis of propagation effects and levels of damage
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Countermeasures for mobile agent security
Computer Communications
Hi-index | 0.00 |
Recently many autogenous terrors are occurred in many countries, and this kind of terrors are spread mostly through the Internet. Therefore, there should be regulations and tools to monitor suspicious Internet activities. Recently, due to the increased number of cyber terrors, many countries try to enact regulations against web server misuses. But, the establishment of such laws is slowed by the concerns of privacy of web users. This paper proposed legislative measures against cyber terrors as well as the proposed scheme to collect terror-related information from web servers. The result of this research can reduce overall costs of anti-terror activities in the Internet.