default search action
1st CIS 2005: Xi'an, China
- Yue Hao, Jiming Liu, Yu-Ping Wang, Yiu-ming Cheung, Hujun Yin, Licheng Jiao, Jianfeng Ma, Yong-Chang Jiao:
Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II. Lecture Notes in Computer Science 3802, Springer 2005, ISBN 3-540-30819-9
Cryptography and Coding
- Sosun Kim, Nam Su Chang, Chang Han Kim, Young-Ho Park, Jongin Lim:
A Fast Inversion Algorithm and Low-Complexity Architecture over GF(2m). 1-8 - Chunxiang Gu, Yuefei Zhu, YaJuan Zhang:
An ID-Based Optimistic Fair Signature Exchange Protocol from Pairings. 9-16 - Toshihiro Ohigashi, Yoshiaki Shiraishi, Masakatu Morii:
FMS Attack-Resistant WEP Implementation Is Still Broken. 17-26 - Ping Dong, Xiangdong Shi, Jiehui Yang:
Design of a New Kind of Encryption Kernel Based on RSA Algorithm. 27-32 - Yoon Cheol Lee, Hiroshi Doi:
On the Security of Condorcet Electronic Voting Scheme. 33-42 - Qian Yin, Yunlun Luo, Ping Guo:
Special Distribution of the Shortest Linear Recurring Sequences in Z /(p) Field. 43-48 - Jingmei Liu, Xiangguo Cheng, Xinmei Wang:
Cryptanalysis of a Cellular Automata Cryptosystem. 49-54 - Geoff Skinner, Song Han, Elizabeth Chang:
A New Conceptual Framework Within Information Privacy: Meta Privacy. 55-61 - Fengtong Wen, Wenling Wu, Qiaoyan Wen:
Error Oracle Attacks on Several Modes of Operation. 62-67 - Lihua Dong, Yong Zeng, Yupu Hu:
Stability of the Linear Complexity of the Generalized Self-shrinking Sequences. 68-73 - Yajing Li, Weihong Chen:
On the Construction of Some Optimal Polynomial Codes. 74-79 - Xuebing Zhou, Martin Schmucker, Christopher L. Brown:
Perceptual Hashing of Video Content Based on Differential Block Similarity. 80-85
Cryptographic Protocols
- Seung Wook Jung, Christoph Ruland:
Secure Software Smartcard Resilient to Capture. 86-95 - Kewei Lv:
Revised Fischlin's (Blind) Signature Schemes. 96-103 - Lichen Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian:
Certificateless Threshold Signature Schemes. 104-109 - M. Choudary Gorantla, Ashutosh Saxena:
An Efficient Certificateless Signature Scheme. 110-116 - Xiaofeng Chen, Fangguo Zhang, Shengli Liu:
ID-Based Restrictive Partially Blind Signatures. 117-124 - Seungwon Lee, Seongje Cho, Jongmoo Choi, Yookun Cho:
Batch Verification with DSA-Type Digital Signatures for Ubiquitous Computing. 125-130 - Sujing Zhou, Dongdai Lin:
On Anonymity of Group Signatures. 131-136 - Yuqing Zhang, Zhiling Wang, Bo Yang:
The Running-Mode Analysis of Two-Party Optimistic Fair Exchange Protocols. 137-142 - Jin Wook Byun, Dong Hoon Lee, Jongin Lim:
Password-Based Group Key Exchange Secure Against Insider Guessing Attacks. 143-148 - Qiang Tang, Chris J. Mitchell:
On the Security of Some Password-Based Key Agreement Schemes. 149-154 - Yong Xu, Yuxiang Sun:
A New Group Rekeying Method in Secure Multicast. 155-160 - Jian Liao, Yinghao Qi, Peiwei Huang, Mentian Rong:
Pairing-Based Provable Blind Signature Scheme Without Random Oracles. 161-166 - Qin Wang, Zhenfu Cao:
Efficient ID-Based Proxy Signature and Proxy Signcryption Form Bilinear Pairings. 167-172 - Changgen Peng, Xiang Li:
An Identity-Based Threshold Signcryption Scheme with Semantic Security. 173-179 - Hui Li, Ting Shen:
A Token-Based Single Sign-On Protocol. 180-185 - Shaohua Tang:
Simple Threshold RSA Signature Scheme Based on Simple Secret Sharing. 186-191 - Qiang Tang, Chris J. Mitchell:
Efficient Compilers for Authenticated Group Key Exchange. 192-197 - Lihua Wang, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto:
Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys. 198-203
Intrusion Detection
- Ki-Won Yeom, Ji-Hyung Park:
An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks. 204-211 - Ping Wang, Binxing Fang, Xiao-chun Yun:
A New User-Habit Based Approach for Early Warning of Worms. 212-219 - Il-Seop Song, Youngseok Lee, Taeck-Geun Kwon:
A Multi-gigabit Virus Detection Algorithm Using Ternary CAM. 220-227 - Yong Zeng, Jianfeng Ma:
Sampling Distance Analysis of Gigantic Data Mining for Intrusion Detection Systems. 228-235 - Saraswathi Sachidananda, Srividya Gopalan, Sridhar Varadarajan:
Hardware-Software Hybrid Packet Processing for Intrusion Detection Systems. 236-243 - Junfeng Tian, Weidong Zhao, Ruizhong Du:
D-S Evidence Theory and Its Data Fusion Application in Intrusion Detection. 244-251 - Yuji Waizumi, Daisuke Kudo, Nei Kato, Yoshiaki Nemoto:
A New Network Anomaly Detection Technique Based on Per-Flow and Per-Service Statistics. 252-259 - Seongje Cho, Hyeyoung Chang, HongGeun Kim, WoongChul Choi:
SoIDPS: Sensor Objects-Based Intrusion Detection and Prevention System and Its Implementation. 260-266 - Ming Li, Wei Zhao:
A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services. 267-272 - Vidyasagar M. Potdar, Chen Wu, Elizabeth Chang:
Tamper Detection for Ubiquitous RFID-Enabled Supply Chain. 273-278 - Wei Yan:
Measuring the Histogram Feature Vector for Anomaly Network Traffic. 279-284 - Kyunghwan Baek, Heejun Jang, Youngjun Han, Hernsoo Hahn:
Efficient Small Face Detection in Surveillance Images Using Major Color Component and LDA Scheme. 285-290 - Jin Zheng, Bo Li, Bing Zhou, Wei Li:
Fast Motion Detection Based on Accumulative Optical Flow and Double Background Model. 291-296 - Jangbok Kim, Jaehong Shim, Gihyun Jung, Kyunghee Choi:
Reducing Worm Detection Time and False Alarm in Virus Throttling. 297-302 - Jin Ho You, Seong Chae Seo, Young Dae Kim, Jun Yong Choi, Sang Jun Lee, Byung Ki Kim:
Protection Against Format String Attacks by Binary Rewriting. 303-308 - Zhanchun Li, Zhitang Li, Yao Li, Bin Liu:
Masquerade Detection System Based on Principal Component Analysis and Radial Basics Function. 309-314 - Cheng Zhang, Qinke Peng:
Anomaly Detection Method Based on HMMs Using System Call and Call Stack Information. 315-321 - Xiaojuan Sun, Xinliang Zhou, Ninghui Sun, Mingyu Chen:
Parallel Optimization Technology for Backbone Network Intrusion Detection System. 322-327 - Linru Ma, Lin Yang, Jianxin Wang:
Attack Scenario Construction Based on Rule and Fuzzy Clustering. 328-333 - Lingjuan Li, Wenyu Tang, Ruchuan Wang:
A CBR Engine Adapting to IDS. 334-339 - Hee Suk Seo, Tae Ho Cho:
Application of Fuzzy Logic for Distributed Intrusion Detection. 340-347
Security Models and Architecture
- Syed Naqvi, Michel Riguidel:
Dynamic Access Control for Pervasive Grid Applications. 348-355 - Xinghua Li, Jianfeng Ma, Sang-Jae Moon:
On the Security of the Canetti-Krawczyk Model. 356-363 - Yi Shi, Xinyu Yang:
A Novel Architecture for Detecting and Defending Against Flooding-Based DDoS Attacks. 364-374 - Dayin Wang, Dongdai Lin, Wenling Wu:
A Variant of Poly1305 MAC and Its Security Proof. 375-380 - Jianjun Shen, Sihan Qing, Qingni Shen, Liping Li:
Covert Channel Identification Founded on Information Flow Analysis. 381-387 - André Årnes, Karin Sallhammar, Kjetil Haslum, Tønnes Brekne, Marie Elisabeth Gaup Moe, Svein J. Knapskog:
Real-Time Risk Assessment with Network Sensors and Intrusion Detection Systems. 388-397 - Xiaofeng Rong, Xiaojuan Gao, Ruidan Su, Lihua Zhou:
Design and Implementation of a Parallel Crypto Server. 398-406 - Xuegang Lin, Rongsheng Xu, Miaoliang Zhu:
Survivability Computation of Networked Information Systems. 407-414 - Yongzheng Zhang, Binxing Fang, Yue Chi, Xiao-chun Yun:
Assessment of Windows System Security Using Vulnerability Relationship Graph. 415-420 - Hui-Xian Li, Chun-Tian Cheng, Liao-Jun Pang:
A New (t, n)-Threshold Multi-secret Sharing Scheme. 421-426 - Sang-ho Park, Taekyoung Kwon:
An Efficient Message Broadcast Authentication Scheme for Sensor Networks. 427-432 - Fan Zhang, Xinhong Zhang, Zhiguo Chen:
Digital Image Authentication Based on Error-Correction Codes. 433-438 - Duhyun Bae, Gwanyeon Kim, Jiho Kim, Sehyun Park, Ohyoung Song:
Design and Implementation of Efficient Cipher Engine for IEEE 802.11i Compatible with IEEE 802.11n and IEEE 802.11e. 439-444 - Shanshan Duan, Zhenfu Cao, Yuan Zhou:
Secure Delegation-by-Warrant ID-Based Proxy Signcryption Scheme. 445-450 - Seong Chae Seo, Jin Ho You, Young Dae Kim, Jun Yong Choi, Sang Jun Lee, Byung Ki Kim:
Building Security Requirements Using State Transition Diagram at Security Threat Location. 451-456 - Weiping Liu, Wandong Cai:
Study on Security iSCSI Based on SSH. 457-462 - Kenli Li, Yan He, Renfa Li, Tao Yang:
A Scheduling Algorithm Based on a Trust Mechanism in Grid. 463-468 - Byungil Lee, Howon Kim:
Enhanced Security and Privacy Mechanism of RFID Service for Pervasive Mobile Device. 469-475 - Yunkai Zhang, Fangwei Wang, Changguang Wang, Jianfeng Ma:
Worm Propagation Modeling and Analysis on Network. 476-481 - Hong Zhang, Hai-Xin Duan, Wu Liu, Jianping Wu:
An Extensible AAA Infrastructure for IPv6. 482-487 - Fan Zhang, Jianfeng Ma, Sang-Jae Moon:
The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11i. 488-493 - Chang-Won Park, Sung Jin Choi, Hee Yong Youn:
A Noble Key Pre-distribution Scheme with LU Matrix for Secure Wireless Sensor Networks. 494-499
Security Management
- Haibo Tian, Xi Sun, Yumin Wang:
A Virtual Bridge Certificate Authority Model. 500-507 - Jorma Kajava, Reijo Savola, Rauno Varonen:
Weak Signals in Information Security Management. 508-517 - Wu Liu, Hai-Xin Duan, Jianping Wu, Xing Li:
PDTM: A Policy-Driven Trust Management Framework in Distributed Systems. 518-525 - Mengquan Lin, Qiangmin Wang, Jianhua Li:
Methodology of Quantitative Risk Assessment for Information System Security. 526-531 - Mei-juan Huang, Jianzhong Zhang, Shu-cui Xie:
A Secure and Efficient (t, n) Threshold Verifiable Multi-secret Sharing Scheme. 532-537 - Chin-Chen Chang, Jung-San Lee:
Improvement on an Optimized Protocol for Mobile Network Authentication and Security. 538-541 - Qian-Mu Li, Man-Wu Xu, Hong Zhang, Fengyu Liu:
Neural Network Based Flow Forecast and Diagnosis. 542-547 - Bat-Odon Purevjii, Masayoshi Aritsugi, Sayaka Imai, Yoshinari Kanamori, Cherri M. Pancake:
Protecting Personal Data with Various Granularities: A Logic-Based Access Control Approach. 548-553 - Hui-Feng Huang, Chin-Chen Chang:
Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function. 554-559 - Hui He, Mingzeng Hu, Weizhe Zhang, Hongli Zhang, Zhi Yang:
Topology-Based Macroscopical Response and Control Technology for Network Security Event. 560-566
Watermarking and Information Hiding
- Chin-Chen Chang, Chia-Chen Lin, Jun-Bin Yeh:
Adaptive Hiding Scheme Based on VQ-Indices Using Commutable Codewords. 567-572 - Xiaoping Liang, Xiaoyun Wu, Jiwu Huang:
Reversible Data Hiding for Image Based on Histogram Modification of Wavelet Coefficients. 573-580 - Young-Ran Park, Hyun-Ho Kang, Sang-Uk Shin, Ki-Ryong Kwon:
An Image Steganography Using Pixel Characteristics. 581-588 - Konstantinos Papapanagiotou, Emmanouel Kellinis, Giannis F. Marias, Panagiotis Georgiadis:
Alternatives for Multimedia Messaging System Steganography. 589-596 - Shuai Wan, Yilin Chang, Fuzheng Yang:
Error Concealment for Video Transmission Based on Watermarking. 597-604 - Minh-Triet Tran, Anh Duc Duong:
Applying the AES and Its Extended Versions in a General Framework for Hiding Information in Digital Images. 605-610 - Bin Liu, Zhitang Li, Zhanchun Li:
An Image Hiding Algorithm Based on Bit Plane. 611-616 - Xiangyang Wang, Hong Zhao:
A Blind Audio Watermarking Algorithm Robust Against Synchronization Attack. 617-622 - Hyun-Mi Kim, Ik-Hwan Cho, A-Young Cho, Dong-Seok Jeong:
Semi-fragile Watermarking Algorithm for Detection and Localization of Temper Using Hybrid Watermarking Method in MPEG-2 Video. 623-628 - Zhiqiang Yao, Liping Chen, Rihong Pan, Boxian Zou, Licong Chen:
Public Watermarking Scheme Based on Multiresolution Representation and Double Hilbert Scanning. 629-634 - Daesung Moon, Taehae Kim, Seunghwan Jung, Yongwha Chung, Kiyoung Moon, Dosung Ahn, Sang-Kyoon Kim:
Performance Evaluation of Watermarking Techniques for Secure Multimodal Biometric Systems. 635-642 - Seong-Whan Kim, HyunSung Sung:
An Improvement of Auto-correlation Based Video Watermarking Scheme Using Independent Component Analysis. 643-648 - Chen Xu, Weiqiang Zhang, Francis R. Austin:
A Digital Watermarking Technique Based on Wavelet Packages. 649-654 - Long Ma, Changjun Li, Shuni Song:
A Spectral Images Digital Watermarking Algorithm. 655-660 - Niladri B. Puhan, Anthony T. S. Ho:
Restoration in Secure Text Document Image Authentication Using Erasable Watermarks. 661-668
Web and Network Applications
- Won-Hyuck Choi, Doo-Hyun Kim, Kwang-Jae Lee, Jung-Sun Kim:
The Study of RED Algorithm Used Multicast Router Based Buffer Management. 669-678 - Lei Cao, Jian Cao, Minglu Li:
Genetic Algorithm Utilized in Cost-Reduction Driven Web Service Selection. 679-686 - Xiaohua Luo, Kougen Zheng, Zhaohui Wu, Yunhe Pan:
MacroOS: A Pervasive Computing Platform Supporting Context Awareness and Context Management. 687-694 - Qin Liu, Chanle Wu:
A Frame for Selecting Replicated Multicast Servers Using Genetic Algorithm. 695-702 - Shaohe Lv, Jianping Yin, Zhiping Cai, Chi Liu:
On a Novel Methodology for Estimating Available Bandwidth Along Network Paths. 703-710 - Liyuan Zhao, Keqin Liu, Jun Zheng:
A New AQM Algorithm for Enhancing Internet Capability Against Unresponsive Flows. 711-718 - Terry C. House:
Client Server Access: Wired vs. Wireless LEO Satellite-ATM Connectivity; A (MS-Ro-BAC) Experiment. 719-724 - Jinhyung Kim, Dongwon Jeong, Doo-Kwon Baik:
An Algorithm for Automatic Inference of Referential Integrities During Translation from Relational Database to XML Schema. 725-730 - Shuning Cui, Boqin Feng:
A Fuzzy Integral Method to Merge Search Engine Results on Web. 731-736 - Sungjune Hong, Sunyoung Han:
The Next Generation PARLAY X with QoS/QoE. 737-742 - Seong-Woo Kim, Young-Chul Jung, Young-Tak Kim:
A Design of Platform for QoS-Guaranteed Multimedia Services Provisioning on IP-Based Convergence Network. 743-748 - Tai Sik Lee, Dong Wook Lee, Jeong Hyun Kim:
Introduction of Knowledge Management System for Technical Support in Construction Industries. 749-756 - Qiuhua Zheng, Yuntao Qian:
An Event Correlation Approach Based on the Combination of IHU and Codebook. 757-763
Image and Signal Processing
- Bicheng Li, Hujun Yin:
Face Recognition Based on Support Vector Machine Fusion and Wavelet Transform. 764-771 - Jun Zhou, Guangda Su, Yafeng Deng, Kai Meng, Congcong Li:
A Dynamic Face and Fingerprint Fusion System for Identity Authentication. 772-779 - Kyu B. Doh, Jungho Ohn, Ting-C. Poon:
Image Recognition for Security Verification Using Real-Time Joint Transform Correlation with Scanning Technique. 780-787 - Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling:
Binarized Revocable Biometrics in Face Recognition. 788-795 - Junping Wang, Yue Hao:
Short Critical Area Computational Method Using Mathematical Morphology. 796-803 - Yong Zhou, Xiaofeng Hu, Qingtai Ye:
A Robust Lane Detection Approach Based on MAP Estimate and Particle Swarm Optimization. 804-811 - Fuhai Li, Jinwen Ma, Dezhi Huang:
MFCC and SVM Based Recognition of Chinese Vowels. 812-819 - Zhe-Ming Lu, Hui Pei, Hans Burkhardt:
A Spatial/Frequency Hybrid Vector Quantizer Based on a Classification in the DCT Domain. 820-825 - Ji Bai, Lizhuang Ma, Li Yao, Tingting Yao, Ying Zhang:
Removing of Metal Highlight Spots Based on Total Variation Inpainting with Multi-sources-flashing. 826-831 - Kyoung-Mi Lee:
Component-Based Online Learning for Face Detection and Verification. 832-837 - Wenbing Fan, Jing Chen, Jina Zhen:
SPIHT Algorithm Based on Fast Lifting Wavelet Transform in Image Compression. 838-844 - Han-Suh Koo, Chang-Sung Jeong:
Modified EZW Coding for Stereo Residual. 845-850 - Xuemei Xie, Guangming Shi, Xuyang Chen:
Optimal Prototype Filters for Near-Perfect-Reconstruction Cosine-Modulated Filter Banks. 851-856 - Chan Lim, Hyun Soo Kang, TaeYong Kim:
Fast Motion Estimation Scheme for Real Time Multimedia Streaming with H.264. 857-862 - Guiguang Ding, Qionghai Dai, Wenli Xu:
Motion-Compensated 3D Wavelet Video Coding Based on Adaptive Temporal Lifting Filter Implementation. 863-868 - Shin-Hyoung Kim, Jong-Whan Jang, Seung Phil Lee, Jae-Ho Choi:
Accurate Contouring Technique for Object Boundary Extraction in Stereoscopic Imageries. 869-874 - Yunshu Hou, Yanning Zhang, Rongchun Zhao:
Robust Object Tracking Based on Uncertainty Factorization Subspace Constraints Optical Flow. 875-880 - Benlian Xu, Zhiquan Wang:
Bearings-Only Target Tracking Using Node Selection Based on an Accelerated Ant Colony Optimization. 881-886 - Weixing Wang:
Image Classification and Delineation of Fragments. 887-892 - Guoyou Wang, Wentao Wang:
A Novel Wavelet Image Coding Based on Non-uniform Scalar Quantization. 893-898 - Bai-Tao Zhou, Won Nah, Kang Woong Lee, Joong-Hwan Baek:
A General Image Based Nematode Identification System Design. 899-904 - Ling Zhang, Xianda Zhang:
A Novel SVD-Based RLS Blind Adaptive Multiuser Detector for CDMA Systems. 905-910 - Jung-Youp Suk, Gun Woo Lee, Kuhn-Il Lee:
New Electronic Digital Image Stabilization Algorithm in Wavelet Transform Domain. 911-916 - Z. W. Liao, S. X. Hu, T. Z. Huang:
Line Segments and Dominate Points Detection Based on Hough Transform. 917-922 - Jian Zhuang, Haifeng Du, Jinhua Zhang, Sunan Wang:
The Study of the Auto Color Image Segmentation. 923-928 - Vivek Maik, Jeongho Shin, Joon Ki Paik:
Regularized Image Restoration by Means of Fusion for Digital Auto Focusing. 929-934 - Gangyi Jiang, Liangzhong Fan, Mei Yu, Rangding Wang, Xien Ye, Yong-Deak Kim:
Fast Ray-Space Interpolation Based on Occlusion Analysis and Feature Points Detection. 935-940 - Fasong Wang, Hongwei Li, Rui Li, Shaoquan Yu:
Non-parametric ICA Algorithm for Hybrid Sources Based on GKNN Estimation. 941-946 - Kyu-Yeol Chae, Won-Pyo Dong, Chang-Sung Jeong:
SUSAN Window Based Cost Calculation for Fast Stereo Matching. 947-952 - Zhiliang Xu, Shengli Xie, Youjun Xiang:
An Efficient Adaptive De-blocking Algorithm. 953-958 - Lei Wang, Beiji Zou, Jia-Guang Sun:
Facial Features Location by Analytic Boosted Cascade Detector. 959-964 - Zhilin Feng, Jianwei Yin, Zhaoyang He, Wuheng Zuo, Jinxiang Dong:
New Approach for Segmentation and Pattern Recognition of Jacquard Images. 965-970 - Jinwu Wei, Jiangxing Wu:
Nonstationarity of Network Traffic Within Multi-scale Burstiness Constraint. 971-976 - Li Zhang, Shiming Ji, Yi Xie, Qiaoling Yuan, Yuehua Wan, Guanjun Bao:
Principle of Image Encrypting Algorithm Based on Magic Cube Transformation. 977-982 - Dongdong Zhang, Wenjun Zhang, Li Song, Hongkai Xiong:
A Study on Motion Prediction and Coding for In-Band Motion Compensated Temporal Filtering. 983-988 - Qing Xu, Shiqiang Bao, Rui Zhang, Ruijuan Hu, Mateu Sbert:
Adaptive Sampling for Monte Carlo Global Illumination Using Tsallis Entropy. 989-994
Applications
- Zaiqiang Liu, Dengguo Feng:
Incremental Fuzzy Decision Tree-Based Network Forensic System. 995-1002 - Youqing Wang, Donghua Zhou:
Robust Reliable Control for a Class of Fuzzy Dynamic Systems with Time-Varying Delay. 1003-1010 - Hong Yan Yi, Beatriz de la Iglesia, Victor J. Rayward-Smith:
Using Concept Taxonomies for Effective Tree Induction. 1011-1016 - Jingtao Li, Yinan Jing, Peng Fu, Gendu Zhang, Yongqiang Chen:
A Similarity-Based Recommendation Filtering Algorithm for Establishing Reputation-Based Trust in Peer-to-Peer Electronic Communities. 1017-1024 - Kyu-Sik Park, Youn-Ho Cho, Sang-Hun Oh:
Automatic Classification of Korean Traditional Music Using Robust Multi-feature Clustering. 1025-1029 - Changjie Wang, Ho-fung Leung:
A Private and Efficient Mobile Payment Protocol. 1030-1035 - Tianjie Cao, Dongdai Lin, Rui Xue:
Universal Designated-Verifier Proxy Blind Signatures for E-Commerce. 1036-1041 - Ulvi Dagdelen, Aytekin Bagis, Dervis Karaboga:
An Efficient Control Method for Elevator Group Control System. 1042-1047 - Qijian Xu, Naitong Zhang, Jie Zhang, Yu Sun:
Next Generation Military Communication Systems Architecture. 1048-1053 - Antti Tikkanen, Teemupekka Virtanen:
Early Warning for Network Worms. 1054-1059 - Xinhua You, Bin Fang, Xinge You, Zhenyu He, Dan Zhang, Yuan Yan Tang:
Skeleton Representation of Character Based on Multiscale Approach. 1060-1067 - Wenming Cao, Wanfang Chai, Shoujue Wang:
Channel Equalization Based on Two Weights Neural Network. 1068-1073 - Pawalai Kraipeerapun, Chun Che Fung, Warick Brown:
Assessment of Uncertainty in Mineral Prospectivity Prediction Using Interval Neutrosophic Set. 1074-1079 - Qiang Lei, Zhengtao Jiang, Yumin Wang:
Ring-Based Anonymous Fingerprinting Scheme. 1080-1085 - Jae-Min Seol, Seong-Whan Kim:
Scalable and Robust Fingerprinting Scheme Using Statistically Secure Extension of Anti-collusion Code. 1086-1091 - Xixiang Lv, Bo Yang:
Broadcast Encryption Using Identity-Based Public-Key Cryptosystem. 1092-1097 - Goo-Rak Kwon, Tea-Young Lee, Kyoung-Ho Kim, Jae-Do Jin, Sung-Jea Ko:
Multimedia Digital Right Management Using Selective Scrambling for Mobile Handset. 1098-1103 - Howon Kim, Mun-Kyu Lee, Dong Kyue Kim, Sang-Kyoon Chung, Kyoil Chung:
Design and Implementation of Crypto Co-processor and Its Application to Security Systems. 1104-1109 - Wenming Cao, Jianqing Li, Shoujue Wang:
Continuous Speech Research Based on HyperSausage Neuron. 1110-1115 - Changcai Han, Dongfeng Yuan:
Variable-Rate Channel Coding for Space-Time Coded MIMO System. 1116-1121 - Xiang-Chu Feng, Yongdong Yang:
A New Watermarking Method Based on DWT. 1122-1126 - Daniel Kang, Byeong-Seok Shin:
Efficient Point Rendering Method Using Sequential Level-of-Detail. 1127-1133 - Tongqi Zhang, Qingjiang Chen:
Construction of a Class of Compactly Supported Biorthogonal Multiple Vector-Valued Wavelets. 1134-1139 - Yoo-Joo Choi, Jeong-Sik Kim, Min-Jeong Kim, Soo-Mi Choi, Myoung-Hee Kim:
Metabolic Visualization and Intelligent Shape Analysis of the Hippocampus. 1140-1148 - Kwangsun Ko, Insook Jang, Yong-hyeog Kang, JinSeok Lee, Young Ik Eom:
Characteristic Classification and Correlation Analysis of Source-Level Vulnerabilities in the Linux Kernel. 1149-1156
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.