Learn More
Extracting attributes from network traffic is the first step of network intrusion detection. However, the question of what attributes are most effective for the detection still remains. In this paper, we employed information gain, wrapper with Bayesian networks (BN) and decision trees (C4.5) respectively to select key subsets of attributes for network(More)
— Today, most Wireless LANs (WLAN) are connected to the backbone via a wired distribution system (DS). A Wireless distribution system (WDS) provides quick and easy networking in circumstances that require temporary network services or when cabling is difficult, for example, in open area conversations, disasters and military usages. WDS can be used to extend(More)
As a major breakthrough, in 2009 Gentry introduced the first plausible construction of a fully homomorphic encryption (FHE) scheme. FHE allows the evaluation of arbitrary functions directly on encrypted data on untwisted servers. In 2010, Gentry and Halevi presented the first FHE implementation on an IBM x3500 server. However, this implementation remains(More)
—In 2010 Gentry and Halevi presented the first FHE implementation. FHE allows the evaluation of arbitrary functions directly on encrypted data on untrusted servers. However, even for the small setting with 2,048 dimensions, the authors reported a performance of 1.8 seconds for a single bit encryption and 32 seconds for recryption on a high end server. Much(More)
—In a major breakthrough, in 2009 Gentry introduced the first plausible construction of a fully homomorphic encryption (FHE) scheme. FHE allows the evaluation of arbitrary functions directly on encrypted data on untwisted servers. In 2010, Gentry and Halevi presented the first FHE implementation on an IBM x3500 server. However, this implementation remains(More)