default search action
AsiaJCIS 2012: Kaohsiung, Taiwan
- Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012, Kaohsiung, Taiwan, August 9-10, 2012. IEEE Computer Society 2012, ISBN 978-0-7695-4776-3
- Wen-Chung Kuo, Shao-Hung Kuo:
Reversible Data Hiding for JPEG Based on EMD. 1-5 - Chin-Feng Lee, Ming-Chi Shih, Cheng-Ta Huang:
An Efficient Lossless Data Hiding Scheme on VQ Index Coding. 6-9 - Chin-Chen Chang, Ngoc-Tu Huynh, Chia-Chun Lin:
Strong Tamper-Localization, Visual Secret Sharing Scheme Based on Exploiting Modification Direction. 10-16 - Yuji Suga:
SSL/TLS Status Survey in Japan - Transitioning against the Renegotiation Vulnerability and Short RSA Key Length Problem. 17-24 - T. Tsukaune, Yosuke Todo, Masakatu Morii:
Proposal of a Secure WEP Operation against Existing Key Recovery Attacks and its Evaluation. 25-30 - Chien-Ting Kuo, He-Ming Ruan, Shih-Jen Chen, Chin-Laung Lei:
An Analysis of Security Patch Lifecycle Using Google Trend Tool. 31-34 - Tomoki Sato, Hiroaki Kikuchi:
Synthesis of Secure Passwords. 35-37 - Chin-Chen Chang, Hai-Duong Le, Ching-Hsiang Chang:
Mobile Friendly and Highly Efficient Remote User Authenticated Key Agreement Protocol Featuring Untraceability. 38-43 - Ruidong Li, Masaaki Ohnishi, Yasunori Owada, Hiroaki Harai:
PDAF: Proactive Distributed Authentication Framework for Regional Network. 44-50 - Chung-Wei Chen, Shiuh-Jeng Wang, Yuh-Ren Tsai, Hsing-Chung Chen:
Fast-Refreshing Tree-Based Group Key Agreement for Mobile Ad Hoc Networks. 51-58 - Kuo-Hui Yeh, Nai-Wei Lo, Tzong-Chen Wu, Ta-Chi Yang, Horng-Twu Liaw:
Analysis of an eHealth Care System with Smart Card Based Authentication. 59-61 - Dong-Jie Wu, Ching-Hao Mao, Te-En Wei, Hahn-Ming Lee, Kuo-Ping Wu:
DroidMat: Android Malware Detection through Manifest and API Calls Tracing. 62-69 - Hanjae Jeong, Dongho Won:
A Study on Method to Analyze Application on Bada Using GUI without Source Code. 70-73 - N. Hiroguchi, Hiroaki Kikuchi, Khamphao Sisaat, Surin Kittitornkun:
Geographical Visualization of Malware Download for Anomaly Detection. 74-78 - Masashi Eto, Daisuke Inoue, Mio Suzuki, Koji Nakao:
Multipurpose Network Monitoring Platform Using Dynamic Address Assignment. 79-84 - S. G. Worku, Zhong Ting, Zhiguang Qin:
Survey on Cloud Data Integrity Proof Techniques. 85-91 - He-Ming Ruan, Yu-Shian Chen, Chin-Laung Lei:
Data Integrity on Remote Storage for On-line Co-working. 92-99 - Chia-Mei Chen, D. J. Guan, Yu-Zhi Huang, Ya-Hui Ou:
Attack Sequence Detection in Cloud Using Hidden Markov Model. 100-103 - Ruo Ando:
Flaw and Configuration Analysis of Cloud Component Using First Order Logic. 104-108
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.