


default search action
1st CIS 2005: Xi'an, China
- Yue Hao, Jiming Liu, Yu-Ping Wang, Yiu-ming Cheung, Hujun Yin, Licheng Jiao, Jianfeng Ma, Yong-Chang Jiao:

Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II. Lecture Notes in Computer Science 3802, Springer 2005, ISBN 3-540-30819-9
Cryptography and Coding
- Sosun Kim, Nam Su Chang, Chang Han Kim, Young-Ho Park, Jongin Lim:

A Fast Inversion Algorithm and Low-Complexity Architecture over GF(2m). 1-8 - Chunxiang Gu, Yuefei Zhu, YaJuan Zhang:

An ID-Based Optimistic Fair Signature Exchange Protocol from Pairings. 9-16 - Toshihiro Ohigashi

, Yoshiaki Shiraishi, Masakatu Morii:
FMS Attack-Resistant WEP Implementation Is Still Broken. 17-26 - Ping Dong, Xiangdong Shi, Jiehui Yang:

Design of a New Kind of Encryption Kernel Based on RSA Algorithm. 27-32 - Yoon Cheol Lee, Hiroshi Doi:

On the Security of Condorcet Electronic Voting Scheme. 33-42 - Qian Yin, Yunlun Luo, Ping Guo:

Special Distribution of the Shortest Linear Recurring Sequences in Z /(p) Field. 43-48 - Jingmei Liu, Xiangguo Cheng, Xinmei Wang:

Cryptanalysis of a Cellular Automata Cryptosystem. 49-54 - Geoff Skinner

, Song Han, Elizabeth Chang
:
A New Conceptual Framework Within Information Privacy: Meta Privacy. 55-61 - Fengtong Wen

, Wenling Wu, Qiaoyan Wen:
Error Oracle Attacks on Several Modes of Operation. 62-67 - Lihua Dong, Yong Zeng, Yupu Hu:

Stability of the Linear Complexity of the Generalized Self-shrinking Sequences. 68-73 - Yajing Li, Weihong Chen:

On the Construction of Some Optimal Polynomial Codes. 74-79 - Xuebing Zhou, Martin Schmucker, Christopher L. Brown:

Perceptual Hashing of Video Content Based on Differential Block Similarity. 80-85
Cryptographic Protocols
- Seung Wook Jung, Christoph Ruland

:
Secure Software Smartcard Resilient to Capture. 86-95 - Kewei Lv:

Revised Fischlin's (Blind) Signature Schemes. 96-103 - Lichen Wang, Zhenfu Cao

, Xiangxue Li, Haifeng Qian:
Certificateless Threshold Signature Schemes. 104-109 - M. Choudary Gorantla, Ashutosh Saxena:

An Efficient Certificateless Signature Scheme. 110-116 - Xiaofeng Chen, Fangguo Zhang

, Shengli Liu:
ID-Based Restrictive Partially Blind Signatures. 117-124 - Seungwon Lee, Seongje Cho, Jongmoo Choi, Yookun Cho:

Batch Verification with DSA-Type Digital Signatures for Ubiquitous Computing. 125-130 - Sujing Zhou, Dongdai Lin:

On Anonymity of Group Signatures. 131-136 - Yuqing Zhang, Zhiling Wang, Bo Yang:

The Running-Mode Analysis of Two-Party Optimistic Fair Exchange Protocols. 137-142 - Jin Wook Byun, Dong Hoon Lee, Jongin Lim:

Password-Based Group Key Exchange Secure Against Insider Guessing Attacks. 143-148 - Qiang Tang, Chris J. Mitchell

:
On the Security of Some Password-Based Key Agreement Schemes. 149-154 - Yong Xu, Yuxiang Sun:

A New Group Rekeying Method in Secure Multicast. 155-160 - Jian Liao, Yinghao Qi, Peiwei Huang, Mentian Rong:

Pairing-Based Provable Blind Signature Scheme Without Random Oracles. 161-166 - Qin Wang, Zhenfu Cao

:
Efficient ID-Based Proxy Signature and Proxy Signcryption Form Bilinear Pairings. 167-172 - Changgen Peng, Xiang Li:

An Identity-Based Threshold Signcryption Scheme with Semantic Security. 173-179 - Hui Li, Ting Shen:

A Token-Based Single Sign-On Protocol. 180-185 - Shaohua Tang:

Simple Threshold RSA Signature Scheme Based on Simple Secret Sharing. 186-191 - Qiang Tang, Chris J. Mitchell

:
Efficient Compilers for Authenticated Group Key Exchange. 192-197 - Lihua Wang

, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto:
Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys. 198-203
Intrusion Detection
- Ki-Won Yeom, Ji-Hyung Park:

An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks. 204-211 - Ping Wang, Binxing Fang, Xiao-chun Yun:

A New User-Habit Based Approach for Early Warning of Worms. 212-219 - Il-Seop Song, Youngseok Lee, Taeck-Geun Kwon:

A Multi-gigabit Virus Detection Algorithm Using Ternary CAM. 220-227 - Yong Zeng, Jianfeng Ma:

Sampling Distance Analysis of Gigantic Data Mining for Intrusion Detection Systems. 228-235 - Saraswathi Sachidananda, Srividya Gopalan, Sridhar Varadarajan:

Hardware-Software Hybrid Packet Processing for Intrusion Detection Systems. 236-243 - Junfeng Tian, Weidong Zhao, Ruizhong Du:

D-S Evidence Theory and Its Data Fusion Application in Intrusion Detection. 244-251 - Yuji Waizumi, Daisuke Kudo, Nei Kato, Yoshiaki Nemoto:

A New Network Anomaly Detection Technique Based on Per-Flow and Per-Service Statistics. 252-259 - Seongje Cho, Hyeyoung Chang, HongGeun Kim, WoongChul Choi:

SoIDPS: Sensor Objects-Based Intrusion Detection and Prevention System and Its Implementation. 260-266 - Ming Li, Wei Zhao

:
A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services. 267-272 - Vidyasagar M. Potdar

, Chen Wu, Elizabeth Chang
:
Tamper Detection for Ubiquitous RFID-Enabled Supply Chain. 273-278 - Wei Yan:

Measuring the Histogram Feature Vector for Anomaly Network Traffic. 279-284 - Kyunghwan Baek, Heejun Jang, Youngjun Han, Hernsoo Hahn:

Efficient Small Face Detection in Surveillance Images Using Major Color Component and LDA Scheme. 285-290 - Jin Zheng, Bo Li, Bing Zhou, Wei Li:

Fast Motion Detection Based on Accumulative Optical Flow and Double Background Model. 291-296 - Jangbok Kim, Jaehong Shim, Gihyun Jung, Kyunghee Choi:

Reducing Worm Detection Time and False Alarm in Virus Throttling. 297-302 - Jin Ho You, Seong Chae Seo, Young Dae Kim, Jun Yong Choi, Sang Jun Lee, Byung Ki Kim:

Protection Against Format String Attacks by Binary Rewriting. 303-308 - Zhanchun Li, Zhitang Li, Yao Li, Bin Liu:

Masquerade Detection System Based on Principal Component Analysis and Radial Basics Function. 309-314 - Cheng Zhang, Qinke Peng:

Anomaly Detection Method Based on HMMs Using System Call and Call Stack Information. 315-321 - Xiaojuan Sun, Xinliang Zhou, Ninghui Sun, Mingyu Chen:

Parallel Optimization Technology for Backbone Network Intrusion Detection System. 322-327 - Linru Ma, Lin Yang, Jianxin Wang:

Attack Scenario Construction Based on Rule and Fuzzy Clustering. 328-333 - Lingjuan Li, Wenyu Tang, Ruchuan Wang:

A CBR Engine Adapting to IDS. 334-339 - Hee Suk Seo, Tae Ho Cho:

Application of Fuzzy Logic for Distributed Intrusion Detection. 340-347
Security Models and Architecture
- Syed Naqvi, Michel Riguidel:

Dynamic Access Control for Pervasive Grid Applications. 348-355 - Xinghua Li, Jianfeng Ma, Sang-Jae Moon:

On the Security of the Canetti-Krawczyk Model. 356-363 - Yi Shi, Xinyu Yang:

A Novel Architecture for Detecting and Defending Against Flooding-Based DDoS Attacks. 364-374 - Dayin Wang, Dongdai Lin, Wenling Wu:

A Variant of Poly1305 MAC and Its Security Proof. 375-380 - Jianjun Shen, Sihan Qing, Qingni Shen, Liping Li:

Covert Channel Identification Founded on Information Flow Analysis. 381-387 - André Årnes, Karin Sallhammar, Kjetil Haslum, Tønnes Brekne, Marie Elisabeth Gaup Moe

, Svein J. Knapskog:
Real-Time Risk Assessment with Network Sensors and Intrusion Detection Systems. 388-397 - Xiaofeng Rong, Xiaojuan Gao, Ruidan Su, Lihua Zhou:

Design and Implementation of a Parallel Crypto Server. 398-406 - Xuegang Lin, Rongsheng Xu, Miaoliang Zhu:

Survivability Computation of Networked Information Systems. 407-414 - Yongzheng Zhang, Binxing Fang, Yue Chi, Xiao-chun Yun:

Assessment of Windows System Security Using Vulnerability Relationship Graph. 415-420 - Hui-Xian Li, Chun-Tian Cheng, Liao-Jun Pang:

A New (t, n)-Threshold Multi-secret Sharing Scheme. 421-426 - Sang-ho Park, Taekyoung Kwon:

An Efficient Message Broadcast Authentication Scheme for Sensor Networks. 427-432 - Fan Zhang, Xinhong Zhang, Zhiguo Chen:

Digital Image Authentication Based on Error-Correction Codes. 433-438 - Duhyun Bae, Gwanyeon Kim, Jiho Kim, Sehyun Park, Ohyoung Song:

Design and Implementation of Efficient Cipher Engine for IEEE 802.11i Compatible with IEEE 802.11n and IEEE 802.11e. 439-444 - Shanshan Duan, Zhenfu Cao

, Yuan Zhou:
Secure Delegation-by-Warrant ID-Based Proxy Signcryption Scheme. 445-450 - Seong Chae Seo, Jin Ho You, Young Dae Kim, Jun Yong Choi, Sang Jun Lee, Byung Ki Kim:

Building Security Requirements Using State Transition Diagram at Security Threat Location. 451-456 - Weiping Liu, Wandong Cai:

Study on Security iSCSI Based on SSH. 457-462 - Kenli Li, Yan He, Renfa Li, Tao Yang:

A Scheduling Algorithm Based on a Trust Mechanism in Grid. 463-468 - Byungil Lee, Howon Kim:

Enhanced Security and Privacy Mechanism of RFID Service for Pervasive Mobile Device. 469-475 - Yunkai Zhang, Fangwei Wang

, Changguang Wang, Jianfeng Ma:
Worm Propagation Modeling and Analysis on Network. 476-481 - Hong Zhang, Hai-Xin Duan, Wu Liu, Jianping Wu:

An Extensible AAA Infrastructure for IPv6. 482-487 - Fan Zhang, Jianfeng Ma, Sang-Jae Moon:

The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11i. 488-493 - Chang-Won Park, Sung Jin Choi, Hee Yong Youn:

A Noble Key Pre-distribution Scheme with LU Matrix for Secure Wireless Sensor Networks. 494-499
Security Management
- Haibo Tian, Xi Sun, Yumin Wang:

A Virtual Bridge Certificate Authority Model. 500-507 - Jorma Kajava, Reijo Savola, Rauno Varonen:

Weak Signals in Information Security Management. 508-517 - Wu Liu, Hai-Xin Duan, Jianping Wu, Xing Li:

PDTM: A Policy-Driven Trust Management Framework in Distributed Systems. 518-525 - Mengquan Lin, Qiangmin Wang, Jianhua Li:

Methodology of Quantitative Risk Assessment for Information System Security. 526-531 - Mei-juan Huang, Jianzhong Zhang, Shu-cui Xie:

A Secure and Efficient (t, n) Threshold Verifiable Multi-secret Sharing Scheme. 532-537 - Chin-Chen Chang, Jung-San Lee:

Improvement on an Optimized Protocol for Mobile Network Authentication and Security. 538-541 - Qian-Mu Li, Man-Wu Xu, Hong Zhang, Fengyu Liu:

Neural Network Based Flow Forecast and Diagnosis. 542-547 - Bat-Odon Purevjii, Masayoshi Aritsugi

, Sayaka Imai, Yoshinari Kanamori, Cherri M. Pancake:
Protecting Personal Data with Various Granularities: A Logic-Based Access Control Approach. 548-553 - Hui-Feng Huang, Chin-Chen Chang:

Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function. 554-559 - Hui He, Mingzeng Hu, Weizhe Zhang, Hongli Zhang, Zhi Yang:

Topology-Based Macroscopical Response and Control Technology for Network Security Event. 560-566
Watermarking and Information Hiding
- Chin-Chen Chang, Chia-Chen Lin

, Jun-Bin Yeh:
Adaptive Hiding Scheme Based on VQ-Indices Using Commutable Codewords. 567-572 - Xiaoping Liang, Xiaoyun Wu, Jiwu Huang:

Reversible Data Hiding for Image Based on Histogram Modification of Wavelet Coefficients. 573-580 - Young-Ran Park, Hyun-Ho Kang, Sang-Uk Shin, Ki-Ryong Kwon:

An Image Steganography Using Pixel Characteristics. 581-588 - Konstantinos Papapanagiotou, Emmanouel Kellinis, Giannis F. Marias, Panagiotis Georgiadis:

Alternatives for Multimedia Messaging System Steganography. 589-596 - Shuai Wan, Yilin Chang, Fuzheng Yang:

Error Concealment for Video Transmission Based on Watermarking. 597-604 - Minh-Triet Tran

, Anh Duc Duong:
Applying the AES and Its Extended Versions in a General Framework for Hiding Information in Digital Images. 605-610 - Bin Liu, Zhitang Li, Zhanchun Li:

An Image Hiding Algorithm Based on Bit Plane. 611-616 - Xiangyang Wang, Hong Zhao:

A Blind Audio Watermarking Algorithm Robust Against Synchronization Attack. 617-622 - Hyun-Mi Kim, Ik-Hwan Cho, A-Young Cho, Dong-Seok Jeong:

Semi-fragile Watermarking Algorithm for Detection and Localization of Temper Using Hybrid Watermarking Method in MPEG-2 Video. 623-628 - Zhiqiang Yao, Liping Chen, Rihong Pan, Boxian Zou, Licong Chen:

Public Watermarking Scheme Based on Multiresolution Representation and Double Hilbert Scanning. 629-634 - Daesung Moon, Taehae Kim, Seunghwan Jung, Yongwha Chung, Kiyoung Moon, Dosung Ahn, Sang-Kyoon Kim:

Performance Evaluation of Watermarking Techniques for Secure Multimodal Biometric Systems. 635-642 - Seong-Whan Kim, HyunSung Sung:

An Improvement of Auto-correlation Based Video Watermarking Scheme Using Independent Component Analysis. 643-648 - Chen Xu, Weiqiang Zhang, Francis R. Austin:

A Digital Watermarking Technique Based on Wavelet Packages. 649-654 - Long Ma, Changjun Li, Shuni Song:

A Spectral Images Digital Watermarking Algorithm. 655-660 - Niladri B. Puhan, Anthony T. S. Ho

:
Restoration in Secure Text Document Image Authentication Using Erasable Watermarks. 661-668
Web and Network Applications
- Won-Hyuck Choi, Doo-Hyun Kim, Kwang-Jae Lee, Jung-Sun Kim:

The Study of RED Algorithm Used Multicast Router Based Buffer Management. 669-678 - Lei Cao, Jian Cao, Minglu Li:

Genetic Algorithm Utilized in Cost-Reduction Driven Web Service Selection. 679-686 - Xiaohua Luo, Kougen Zheng, Zhaohui Wu, Yunhe Pan:

MacroOS: A Pervasive Computing Platform Supporting Context Awareness and Context Management. 687-694 - Qin Liu

, Chanle Wu:
A Frame for Selecting Replicated Multicast Servers Using Genetic Algorithm. 695-702 - Shaohe Lv, Jianping Yin, Zhiping Cai, Chi Liu:

On a Novel Methodology for Estimating Available Bandwidth Along Network Paths. 703-710 - Liyuan Zhao, Keqin Liu, Jun Zheng:

A New AQM Algorithm for Enhancing Internet Capability Against Unresponsive Flows. 711-718 - Terry C. House:

Client Server Access: Wired vs. Wireless LEO Satellite-ATM Connectivity; A (MS-Ro-BAC) Experiment. 719-724 - Jinhyung Kim, Dongwon Jeong, Doo-Kwon Baik:

An Algorithm for Automatic Inference of Referential Integrities During Translation from Relational Database to XML Schema. 725-730 - Shuning Cui, Boqin Feng:

A Fuzzy Integral Method to Merge Search Engine Results on Web. 731-736 - Sungjune Hong, Sunyoung Han:

The Next Generation PARLAY X with QoS/QoE. 737-742 - Seong-Woo Kim, Young-Chul Jung, Young-Tak Kim:

A Design of Platform for QoS-Guaranteed Multimedia Services Provisioning on IP-Based Convergence Network. 743-748 - Tai Sik Lee, Dong Wook Lee, Jeong Hyun Kim:

Introduction of Knowledge Management System for Technical Support in Construction Industries. 749-756 - Qiuhua Zheng, Yuntao Qian:

An Event Correlation Approach Based on the Combination of IHU and Codebook. 757-763
Image and Signal Processing
- Bicheng Li, Hujun Yin:

Face Recognition Based on Support Vector Machine Fusion and Wavelet Transform. 764-771 - Jun Zhou, Guangda Su, Yafeng Deng

, Kai Meng, Congcong Li:
A Dynamic Face and Fingerprint Fusion System for Identity Authentication. 772-779 - Kyu B. Doh, Jungho Ohn, Ting-C. Poon:

Image Recognition for Security Verification Using Real-Time Joint Transform Correlation with Scanning Technique. 780-787 - Ying-Han Pang

, Andrew Teoh Beng Jin
, David Ngo Chek Ling:
Binarized Revocable Biometrics in Face Recognition. 788-795 - Junping Wang, Yue Hao:

Short Critical Area Computational Method Using Mathematical Morphology. 796-803 - Yong Zhou, Xiaofeng Hu, Qingtai Ye:

A Robust Lane Detection Approach Based on MAP Estimate and Particle Swarm Optimization. 804-811 - Fuhai Li, Jinwen Ma, Dezhi Huang:

MFCC and SVM Based Recognition of Chinese Vowels. 812-819 - Zhe-Ming Lu, Hui Pei, Hans Burkhardt:

A Spatial/Frequency Hybrid Vector Quantizer Based on a Classification in the DCT Domain. 820-825 - Ji Bai, Lizhuang Ma, Li Yao, Tingting Yao, Ying Zhang:

Removing of Metal Highlight Spots Based on Total Variation Inpainting with Multi-sources-flashing. 826-831 - Kyoung-Mi Lee:

Component-Based Online Learning for Face Detection and Verification. 832-837 - Wenbing Fan, Jing Chen, Jina Zhen:

SPIHT Algorithm Based on Fast Lifting Wavelet Transform in Image Compression. 838-844 - Han-Suh Koo, Chang-Sung Jeong:

Modified EZW Coding for Stereo Residual. 845-850 - Xuemei Xie

, Guangming Shi, Xuyang Chen:
Optimal Prototype Filters for Near-Perfect-Reconstruction Cosine-Modulated Filter Banks. 851-856 - Chan Lim, Hyun Soo Kang, TaeYong Kim:

Fast Motion Estimation Scheme for Real Time Multimedia Streaming with H.264. 857-862 - Guiguang Ding, Qionghai Dai, Wenli Xu:

Motion-Compensated 3D Wavelet Video Coding Based on Adaptive Temporal Lifting Filter Implementation. 863-868 - Shin-Hyoung Kim, Jong-Whan Jang, Seung Phil Lee, Jae-Ho Choi:

Accurate Contouring Technique for Object Boundary Extraction in Stereoscopic Imageries. 869-874 - Yunshu Hou, Yanning Zhang, Rongchun Zhao:

Robust Object Tracking Based on Uncertainty Factorization Subspace Constraints Optical Flow. 875-880 - Benlian Xu, Zhiquan Wang:

Bearings-Only Target Tracking Using Node Selection Based on an Accelerated Ant Colony Optimization. 881-886 - Weixing Wang:

Image Classification and Delineation of Fragments. 887-892 - Guoyou Wang, Wentao Wang:

A Novel Wavelet Image Coding Based on Non-uniform Scalar Quantization. 893-898 - Bai-Tao Zhou, Won Nah, Kang Woong Lee, Joong-Hwan Baek:

A General Image Based Nematode Identification System Design. 899-904 - Ling Zhang, Xianda Zhang:

A Novel SVD-Based RLS Blind Adaptive Multiuser Detector for CDMA Systems. 905-910 - Jung-Youp Suk, Gun Woo Lee, Kuhn-Il Lee:

New Electronic Digital Image Stabilization Algorithm in Wavelet Transform Domain. 911-916 - Z. W. Liao, S. X. Hu, T. Z. Huang:

Line Segments and Dominate Points Detection Based on Hough Transform. 917-922 - Jian Zhuang, Haifeng Du, Jinhua Zhang, Sunan Wang:

The Study of the Auto Color Image Segmentation. 923-928 - Vivek Maik

, Jeongho Shin, Joon Ki Paik
:
Regularized Image Restoration by Means of Fusion for Digital Auto Focusing. 929-934 - Gangyi Jiang, Liangzhong Fan, Mei Yu, Rangding Wang, Xien Ye, Yong-Deak Kim:

Fast Ray-Space Interpolation Based on Occlusion Analysis and Feature Points Detection. 935-940 - Fasong Wang, Hongwei Li, Rui Li, Shaoquan Yu:

Non-parametric ICA Algorithm for Hybrid Sources Based on GKNN Estimation. 941-946 - Kyu-Yeol Chae, Won-Pyo Dong, Chang-Sung Jeong:

SUSAN Window Based Cost Calculation for Fast Stereo Matching. 947-952 - Zhiliang Xu, Shengli Xie, Youjun Xiang:

An Efficient Adaptive De-blocking Algorithm. 953-958 - Lei Wang, Beiji Zou, Jia-Guang Sun:

Facial Features Location by Analytic Boosted Cascade Detector. 959-964 - Zhilin Feng, Jianwei Yin, Zhaoyang He, Wuheng Zuo, Jinxiang Dong:

New Approach for Segmentation and Pattern Recognition of Jacquard Images. 965-970 - Jinwu Wei, Jiangxing Wu:

Nonstationarity of Network Traffic Within Multi-scale Burstiness Constraint. 971-976 - Li Zhang, Shiming Ji, Yi Xie, Qiaoling Yuan, Yuehua Wan, Guanjun Bao:

Principle of Image Encrypting Algorithm Based on Magic Cube Transformation. 977-982 - Dongdong Zhang, Wenjun Zhang, Li Song, Hongkai Xiong

:
A Study on Motion Prediction and Coding for In-Band Motion Compensated Temporal Filtering. 983-988 - Qing Xu, Shiqiang Bao, Rui Zhang, Ruijuan Hu, Mateu Sbert

:
Adaptive Sampling for Monte Carlo Global Illumination Using Tsallis Entropy. 989-994
Applications
- Zaiqiang Liu, Dengguo Feng:

Incremental Fuzzy Decision Tree-Based Network Forensic System. 995-1002 - Youqing Wang, Donghua Zhou:

Robust Reliable Control for a Class of Fuzzy Dynamic Systems with Time-Varying Delay. 1003-1010 - Hong Yan Yi, Beatriz de la Iglesia

, Victor J. Rayward-Smith:
Using Concept Taxonomies for Effective Tree Induction. 1011-1016 - Jingtao Li, Yinan Jing, Peng Fu, Gendu Zhang, Yongqiang Chen:

A Similarity-Based Recommendation Filtering Algorithm for Establishing Reputation-Based Trust in Peer-to-Peer Electronic Communities. 1017-1024 - Kyu-Sik Park, Youn-Ho Cho, Sang-Hun Oh:

Automatic Classification of Korean Traditional Music Using Robust Multi-feature Clustering. 1025-1029 - Changjie Wang, Ho-fung Leung

:
A Private and Efficient Mobile Payment Protocol. 1030-1035 - Tianjie Cao, Dongdai Lin, Rui Xue:

Universal Designated-Verifier Proxy Blind Signatures for E-Commerce. 1036-1041 - Ulvi Dagdelen, Aytekin Bagis, Dervis Karaboga

:
An Efficient Control Method for Elevator Group Control System. 1042-1047 - Qijian Xu, Naitong Zhang, Jie Zhang, Yu Sun:

Next Generation Military Communication Systems Architecture. 1048-1053 - Antti Tikkanen, Teemupekka Virtanen:

Early Warning for Network Worms. 1054-1059 - Xinhua You, Bin Fang, Xinge You, Zhenyu He, Dan Zhang, Yuan Yan Tang:

Skeleton Representation of Character Based on Multiscale Approach. 1060-1067 - Wenming Cao, Wanfang Chai, Shoujue Wang:

Channel Equalization Based on Two Weights Neural Network. 1068-1073 - Pawalai Kraipeerapun, Chun Che Fung

, Warick Brown:
Assessment of Uncertainty in Mineral Prospectivity Prediction Using Interval Neutrosophic Set. 1074-1079 - Qiang Lei, Zhengtao Jiang, Yumin Wang:

Ring-Based Anonymous Fingerprinting Scheme. 1080-1085 - Jae-Min Seol, Seong-Whan Kim:

Scalable and Robust Fingerprinting Scheme Using Statistically Secure Extension of Anti-collusion Code. 1086-1091 - Xixiang Lv, Bo Yang:

Broadcast Encryption Using Identity-Based Public-Key Cryptosystem. 1092-1097 - Goo-Rak Kwon, Tea-Young Lee, Kyoung-Ho Kim, Jae-Do Jin, Sung-Jea Ko:

Multimedia Digital Right Management Using Selective Scrambling for Mobile Handset. 1098-1103 - Howon Kim, Mun-Kyu Lee, Dong Kyue Kim, Sang-Kyoon Chung, Kyoil Chung:

Design and Implementation of Crypto Co-processor and Its Application to Security Systems. 1104-1109 - Wenming Cao, Jianqing Li, Shoujue Wang:

Continuous Speech Research Based on HyperSausage Neuron. 1110-1115 - Changcai Han, Dongfeng Yuan:

Variable-Rate Channel Coding for Space-Time Coded MIMO System. 1116-1121 - Xiang-Chu Feng, Yongdong Yang:

A New Watermarking Method Based on DWT. 1122-1126 - Daniel Kang, Byeong-Seok Shin:

Efficient Point Rendering Method Using Sequential Level-of-Detail. 1127-1133 - Tongqi Zhang, Qingjiang Chen:

Construction of a Class of Compactly Supported Biorthogonal Multiple Vector-Valued Wavelets. 1134-1139 - Yoo-Joo Choi, Jeong-Sik Kim, Min-Jeong Kim, Soo-Mi Choi, Myoung-Hee Kim:

Metabolic Visualization and Intelligent Shape Analysis of the Hippocampus. 1140-1148 - Kwangsun Ko, Insook Jang, Yong-hyeog Kang, JinSeok Lee, Young Ik Eom:

Characteristic Classification and Correlation Analysis of Source-Level Vulnerabilities in the Linux Kernel. 1149-1156

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














