Sleepy watermark tracing: an active network-based intrusion response framework

  • Authors:
  • Xinyuan Wang;Douglas S. Reeves;S. Felix Wu;Jim Yuill

  • Affiliations:
  • North Carolina State Univ.;North Carolina State Univ.;North Carolina State Univ.;North Carolina State Univ.

  • Venue:
  • Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

There is a scale between authentication and anonymity, which is currently leaning towards the side of authentication, when it comes to e-commerce. Service providers and merchants are usually keeping track of user-related information in order to construct ...