Abstract is missing.
- A New Algorithm for Outlier Detection Based on OffsetYue Zhang 0008, Jie Liu, Bo Song. 3-6 [doi]
- A Dynamic Graph Watermark Scheme of Tamper ResistanceXiaoJiang Chen, Dingyi Fang, Jingbo Shen, Feng Chen, Wenbo Wang, Lu He. 3-6 [doi]
- Trusted Computing Based Mobile DRM Authentication SchemeZhen Yang, Kefeng Fan, Yingxu Lai. 7-10 [doi]
- Information Security Solution Decision-Making Based on Entropy Weight and Gray Situation DecisionLin Chen, Li Li, Yong Hu, Ke Lian. 7-10 [doi]
- Quantum Secure Direct Communication Based on Partially Entangled StatesXin-yuan Yang, Zhi Ma, Xin Lu, Hong-xin Li. 11-14 [doi]
- An Authenticating Algorithm with Multi-compression Compatible in DCT DomainXiaoyuan Yang, Yao Guo, Ke Niu, Xiang Wu. 11-14 [doi]
- Audio Digital Signature Algorithm with Tamper DetectionXiaoyuan Yang, Xiang Wu, Minqing Zhang. 15-18 [doi]
- A Multi-view Nonlinear Active Shape Model Based on 3D Transformation Shape SearchYi Faling, Xiong Wei, Huang Zhanpeng, Zhao Jie. 15-18 [doi]
- Analysis the Properties of TLS Based on Temporal Logic of KnowledgeLv Chao, Li Hui, Ma Jianfeng. 19-22 [doi]
- Key Binding Based on Biometric Shielding FunctionsHuixian Li, Man Wang, Liaojun Pang, Weidong Zhang. 19-22 [doi]
- f8 Keystream Generator with SMS4 as Core AlgorithmWang Yingsong, Chen Wei. 23-26 [doi]
- A Deep Copy Protection Framework for Electronic Devices within HomeYang Zhan, Haibo Tian, Qingqi Pei, YueYu Zhang, YuMin Wang, Weidong Zhang. 23-26 [doi]
- Attacks on a Universal Designated Verifier Signature SchemeYanping Li, Liaojun Pang, Yuming Wang. 27-30 [doi]
- Waveform Analysis Mathematic Based on Ultrasonic Displacement MeasurementWang Yuhui, Dai Ju. 27-29 [doi]
- Research on Security Architecture for Defending Insider ThreatHui Wang, Heli Xu, Bibo Lu, Zihao Shen. 30-33 [doi]
- Image Enhancement Based on Nonsubsampled Contourlet TransformYuxin Ma, Jiancang Xie, Jungang Luo. 31-34 [doi]
- On Security Notions for Verifiably Encrypted SignatureXu an Wang, Xiaoyuan Yang, Qingquan Peng. 37-40 [doi]
- Image Watermarking Using Phase-Shifting Digital Holography Embedded in the Wavelet DomainMn-Ta Lee, Hsuan T. Chang, Mu-Liang Wang. 37-40 [doi]
- Secure Disk with Authenticated Encryption and IV VerificationFangyong Hou, Nong Xiao, Fang Liu, Hongjun He. 41-44 [doi]
- A Polynomial Based Key Establishment Scheme for Heterogeneous Sensor NetworksIuon-Chang Lin, Shu-Yan Huang. 41-44 [doi]
- Non-interactive Evaluation of Encrypted Elementary FunctionsLiang Chen, Chengmin Gao, Yong Xu. 45-48 [doi]
- An Adaptable Threshold Decision MethodMeng-Hsiun Tsai, Ming-Hung Wang, Ting-Yuan Chang, Pei-Yan Pai, Yung-Kuan Chan. 45-48 [doi]
- Zero Packet Loss Hand-off Mechanism in SIP-Based Wireless NetworksChing-Lung Chang, Jia-Yi Syu, Yuan-Sun Chu. 49-52 [doi]
- Cryptanalysis of a Knapsack Public Key CryptosystemBaocang Wang, Hui Liu, Yupu Hu. 49-52 [doi]
- A New Authenticated Key Agreement Protocol for Wireless Mobile NetworksShin-Jia Hwang, Ming-Jhang Chai. 53-56 [doi]
- A New Knapsack Public-Key CryptosystemWeidong Zhang, Baocang Wang, Yupu Hu. 53-56 [doi]
- Forward-Secure Certificate-Based EncryptionYang Lu, Jiguo Li. 57-60 [doi]
- Economical Dental Stereoradiography in Digital EraHsien-Huang P. Wu, Shih-Hsin Chang, Ping-Kuo Weng, Soon-Lin Chen. 57-60 [doi]
- Image Encryption with Discrete Fractional Cosine Transform and ChaosLin Zhang, Jianhua Wu, Nanrun Zhou. 61-64 [doi]
- A Resistant Secret Sharing SchemeChin-Chen Chang, Yen-Chang Chen, Chia-Chen Lin. 61-64 [doi]
- Cryptoanalysis of Two Signcryption SchemesJianhong Zhang, Qin Geng. 65-68 [doi]
- A Modified Feature Based Image Watermarking Scheme in NSCT DomainLiu Yang, Baolong Guo, Jianmin Lv. 67-70 [doi]
- A Novel Multiple Description Coding Frame Based on Reordered DCT Coefficients and SPIHT AlgorithmLin-Lin Tang, Zhe-Ming Lu, Fa-Xin Yu. 71-74 [doi]
- Grounding Grid Corrosion Diagnosis Based on Large Change SensitivityLiqiang Liu, Xianjue Luo, Tao Niu, Kai Wang. 71-74 [doi]
- A CELP-Speech Information Hiding Algorithm Based on Vector QuantizationJi-Xin Liu, Zhe-Ming Lu, Hao Luo. 75-78 [doi]
- Anomalous Payload Detection System Using Analysis of Frequent Sequential PatternJun Ma, Guanzhong Dai, Jing Zhou. 75-78 [doi]
- An Enhanced Block Mode Selection Method for Surveillance Video CommunicationJie Jiang, Wei Mo, Jianmin Lv. 79-82 [doi]
- The Detection of Bi-frequency Weak Signal Based on Chaos and CorrelationWang Mei, Zhang Huifeng, Yan Yong. 83-86 [doi]
- A Novel Approach for Audio WatermarkingMazdak Zamani, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Akram M. Zeki, Pritheega Magalingam. 83-86 [doi]
- Application of Rough Set Theory in Coal Gangue Image ProcessXian-Min Ma, Che Liang. 87-90 [doi]
- Efficient Certificate-Based Signature SchemeYang Ming, YuMin Wang. 87-90 [doi]
- GOP-Level Transmission Distortion Modeling for Video Streaming over Mobile NetworksYu Han, Aidong Men, Kan Chang, Ziyi Quan. 91-95 [doi]
- A Comparative Statistical Analysis of Pseudorandom Bit SequencesRashidah Kadir, Mohd Aizaini Maarof. 91-94 [doi]
- Small Moving Infrared Target Detection Algorithm under Low SNR BackgroundKai Wang, Yan Liu, Xiaowei Sun. 95-97 [doi]
- Sinusoidal Signals Pattern Based Robust Video Watermarking in the 3D-CWT DomainCheng Deng, Jie Li, Meng Jia, Xinbo Gao. 96-99 [doi]
- Collusion-Resilient Fingerprinting Using Cropping and SubsamplingYueh-Hong Chen, Hsiang-Cheh Huang. 98-101 [doi]
- Assessment of Color Video Quality with Singular Value Decomposition of Complex MatrixFuqiang Zhang, Junli Li, Gang Chen, Jiaju Man. 103-106 [doi]
- Privacy Protection in On-line Shopping for Electronic DocumentsYu-Chi Chen, Gwoboa Horng, Chang-Chin Huang. 105-108 [doi]
- Hybrid Video Transcoder for Bitrate Reduction of H.264 Bit StreamsMin Li, Bo Wang. 107-110 [doi]
- A Low-cost RFID Authentication Protocol with Location Privacy ProtectionYu-Yi Chen, Jun-Chao Lu, Shin-I Chen, Jinn-ke Jan. 109-113 [doi]
- Whole Frame Loss Recovery Algorithm for H.264 DecodersMin Li, Bo Wang. 111-114 [doi]
- A Real-Time Selective Video Encryption Using Context-Key ControlHung-Min Sun, Muh-Chyi Leu. 114-117 [doi]
- A Frequent-Domain VideoTranscoder with Spatial Downscaling for H.264/AVCBo Wang, Dichen Liu. 115-118 [doi]
- Ideal Perfect Multilevel Threshold Secret Sharing SchemeChanglu Lin, Lein Harn, Dingfeng Ye. 118-121 [doi]
- A Novel Video Shot Segmentation Based on Textural FeaturesYin Wang, Xiangming Wen, Xinqi Lin, Peizhou He, Wei Zheng. 119-122 [doi]
- Implementation of an Electronic Voting System with Contactless IC Cards for Small-Scale VotingChung-Huang Yang, Shih-Yi Tu, Pei-Hua Yen. 122-125 [doi]
- Octagonal Search Algorithm with Early Termination for Fast Motion Estimation on H.264Zhaopeng Cui, Dujuan Wang, Guang Jiang, Chengke Wu. 123-126 [doi]
- Access Log Generator for Analyzing Malicious Website Browsing BehaviorsChu-Hsing Lin, Jung-Chun Liu, Ching-Ru Chen. 126-129 [doi]
- A Two-Description Distributed Video CodingAnhong Wang, Yao Zhao, Zhihong Li. 127-130 [doi]
- An Extensible and Virtualization-Compatible IDS Management ArchitectureSebastian Roschke, Feng Cheng 0002, Christoph Meinel. 130-134 [doi]
- Fuzzy Identity Based Encryption Scheme with Some Assigned AttributesXiMing Li, Bo Yang, Yubin Guo. 133-136 [doi]
- Deadlock Detection Based on Resource Allocation GraphQinqin Ni, Weizhen Sun, Sen Ma. 135-138 [doi]
- Encrypted Fuzzy Vault Based on FingerprintFeng Quan, Fei Su, Anni Cai. 137-140 [doi]
- Exploiting RFC2828 as a Domain Vocabulary for Identifying IT Security LiteratureLidong Wang, Liping Qian. 141-144 [doi]
- An Attack Model Based on Both-Branch Fuzzy Logic and Fuzzy Petri NetQiuqin Lu, Guangqiu Huang. 141-144 [doi]
- The Research of Simulation for Network Security Based on System DynamicsHong-shan Kong, Ming-qing Zhang, Jun Tang, Chang-yuan Luo. 145-148 [doi]
- Application of the Fuzzy Entropy Weight in Risk Assessment of the Engineering ProjectXuyan Wu, Huiling Gu, Xujie Hu, Yuhong Dong. 145-148 [doi]
- Network Security Situation Awareness Using Exponential and Logarithmic AnalysisXiaobin Tan, Qin Guihong, Zhang Yong, Liang Ping. 149-152 [doi]
- An Adaptive Fuzzy Scheduling and Fuzzy-PID Perfomance Control Model Being Suitable to Soft Real-Time SystemsXian-Bo He, Li Yang, Xian-hua Zeng, Gang-yuan Zhang, Xing-qiang Zhao. 149-153 [doi]
- Security Threats and Countermeasures for Intra-vehicle NetworksDavid Wampler, Huirong Fu, Ye Zhu. 153-157 [doi]
- Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System CallsMohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof. 154-157 [doi]
- Application of Particle Swarm Optimization in Fussy Neural NetworksQingnian Wang, Kun Yan, Xiaofeng Wan, Meiling Yuan. 158-161 [doi]
- W-Aegis: A Propagation Behavior Based Worm Detection Model for Local NetworksZhanyong Tang, Rui Qi, Dingyi Fang, Yangxia Luo. 158-162 [doi]
- Research on Early Warning for Worm Propagation Based on Area-Alert-LevelLi-na Zhu, Chao-yi Sun, Li Feng. 163-166 [doi]
- Full System Simulation and Verification FrameworkJing-Wun Lin, Chen-Chieh Wang, Chin-Yao Chang, Chung-Ho Chen, Kuen-Jong Lee, Yuan-Hua Chu, Jen-Chieh Yeh, Ying-Chuan Hsiao. 165-168 [doi]
- Modeling and Analyzing the Spread of Worms with Bilinear Incidence RateChen Junhua, Wei Shengjun. 167-170 [doi]
- Automatic IP Interface Synthesis Supporting Multi-layer Communication Protocols in SoC DesignsYin-Tsung Hwang, Hua-Hsin Luo. 169-172 [doi]
- Modeling the Co-evololution DNS Worms and Anti-worms in IPv6 NetworksPantelis Kammas, Thodoros Komninos, Yannis C. Stamatiou. 171-174 [doi]
- Moving Object Tracking Using Symmetric Mask-Based SchemeChih-Hsien Hsia, Ding-Wei Huang, Jen-Shiun Chiang, Zong-Jheng Wu. 173-176 [doi]
- Hardware/Software Codesign of Resource Constrained Real-Time SystemsChia-Cheng Lo, Jung-Guan Luo, Ming-Der Shieh. 177-180 [doi]
- Multimodal Biometric Recognition Based on Complex KFDAZhifang Wang, Qiong Li, Xiamu Niu, Christoph Busch. 177-180 [doi]
- An Approach to Checking SOC Timing SafetyZhenjun Du, Rong Chen. 181-184 [doi]
- Design and Integration for Background Subtraction and Foreground Tracking AlgorithmTsung-Han Tsai, Chung-Yuan Lin, De-Zhang Peng, Giua-Hua Chen. 181-184 [doi]
- Parallel 3-Pixel Labeling Method and its Hardware Architecture DesignShyue-Wen Yang, Ming-Hwa Sheu, Jun-Jie Lin, Chuang-Chun Hu, Tzu-Hsiung Chen, Shau-Yin Tseng. 185-188 [doi]
- Research on System of Chinese Document Copy DetectionYuzhu Cheng, Chunrong Qiu, Weiqi Tang, Wenda Deng. 185-188 [doi]
- Novel Fast Mode Decision Algorithm for P-Slices in H.264/AVCKan Chang, Bo Yang, Wenhao Zhang. 189-193 [doi]
- Membership-Based Access Control for Trust Negotiation in Open SystemsRuo-Fei Han, Hou-Xiang Wang, Yu-Hua Wang, Kai-Ling Zuo. 189-192 [doi]
- ECC-Cache: A Novel Low Power Scheme to Protect Large-Capacity L2 Caches from Transiant FaultsGuanghui Liu. 193-199 [doi]
- Majority-Parity-Guided Watermarking for Block-Truncated ImagesJing-Ming Guo, Yun-Fu Liu. 197-200 [doi]
- Secure Constructing Bluetooth Scatternet Based on BTCPXin Yu, Yuping Wang. 200-203 [doi]
- Data Hiding in Halftone Images Using Adaptive Noise-Balanced Error Diffusion and Quality-Noise Look Up TableJing-Ming Guo, Jia-Jin Tsai. 201-204 [doi]
- Space Time Block Coded MIMO System with Redundant AntennasFeng Wang, Xia Liu, Marek E. Bialkowski. 204-207 [doi]
- Improving the Modified Matrix Encoding on Steganography MethodYongsoo Choi, HyoungJoong Kim. 205-208 [doi]
- RSA/Shift Secured IFFT/FFT Based OFDM Wireless SystemD. Rajaveerappa, Abdelsalam Almarimi. 208-211 [doi]
- Reversible Information Hiding Considering Hierarchical Access ControlMasaaki Fujiyoshi, Seungwu Han, Hitoshi Kiya. 209-212 [doi]
- The Reversible Network Cascade Based on Reversible Logic Gate Coding MethodHui Li, Zhijin Guan, Shanli Chen, Yuxin Chen. 213-216 [doi]
- Infrared Face Recognition Based on Radiant Energy and Curvelet TransformationZhihua Xie, Shiqian Wu, Guodong Liu, Zhijun Fang. 215-218 [doi]
- Image Compression Algorithm Based on Decreasing Bits CodingShengbing Che, Zuguo Che, Haiyang Wang, Qiangbo Huang. 217-220 [doi]
- Fast Fractal Image Coding Using Ambient-Cross Sum of Normalized BlockGaoping Li. 219-222 [doi]
- A Digital Watermarking Algorithm for DEM Image Based on Stationary Wavelet TransformXiang He, Jianjun Liu. 221-224 [doi]
- Lossy Compression of CFA Image Based on Multiwavelet PacketJing Zheng, QiGui Zhang, Xuemei Zhang. 223-226 [doi]
- Redundant Ridgelet Transform and its Application to Image ProcessingYan Li, Shengqian Wang, Chengzhi Deng. 225-228 [doi]
- An Improved SPECK Image Coding AlgorithmBaojun Han, Yan Liu. 227-229 [doi]
- A Robust Watermark Algorithm for JPEG2000 ImagesHai-ying Gao, Guo-qiang Liu, Xu Li, Yin Xu. 230-233 [doi]
- Performance Analysis of Chinese Webpage Categorizing Algorithm Based on Support Vector Machines (SVM)Xiao Gang, Xie Jiancang. 231-235 [doi]
- Research on Improved Algorithm for Chinese Word Segmentation Based on Markov ChainPang Baomao, Shi Haoshan. 236-238 [doi]
- A New Histogram Based Image Watermarking Scheme Resisting Geometric AttacksXin-Wei Li, Bao-Long Guo, Lei-Da Li, Hong-Xin Shen. 239-242 [doi]
- A New Image Restoration Algorithm Based on Variational DerivativeWenjuan Zhang, Weibin Zhang. 241-244 [doi]
- An Adaptive Digital Watermarking Algorithm Based on Balanced Multi-waveletMing-Xiang Zang, Na Zhang, Jian-guo Jiang. 243-246 [doi]
- Visibility Estimation Based on Mean ShiftWenbing Chen, Xiaolei Zhang, Jianwei Yang. 245-248 [doi]
- An Improved Iris Recognition Method Based on Gray Surface MatchingDong-Mei Wu, Jiang-Nan Wang. 247-249 [doi]
- Image Retrieval Based on 2D Histogram of Interest PointsFan-jie Meng, Bao-Long Guo, Lei Guo. 250-253 [doi]
- Detecting DoS and DDoS Attacks by Using an Intrusion Detection and Remote Prevention SystemFang-Yie Leu, Zhi-Yang Li. 251-254 [doi]
- An Improved Fusion Algorithm of the Weighted Features and its Application in Image RetrievalMei Wang, Li Wang. 254-257 [doi]
- Detecting DoS and DDoS Attacks Using Chi-SquareFang-Yie Leu, Chia-Chi Pai. 255-258 [doi]
- An Active Defense Model and Framework of Insider Threats Detection and SenseHongbin Zhang, Jianfeng Ma, Yinchuan Wang, Qingqi Pei. 258-261 [doi]
- Hierarchical Key Agreement Protocols in Group-User SystemsShiuh-Jeng Wang, Yuh-Ren Tsai, Chien-Chih Shen, Pin-You Chen. 259-262 [doi]
- Insider DoS Attacks on Epidemic Propagation Strategies of Network Reprogramming in Wireless Sensor NetworksYu Zhang, Xing-She Zhou, Yee Wei Law, Marimuthu Palaniswami. 263-266 [doi]
- The Application and Study of Graph Cut in Motion SegmentationYe Hou, Bao-Long Guo, Jeng-Shyang Pan. 265-268 [doi]
- Joint Entropy Analysis Model for DDoS Attack DetectionHamza Rahmani, Nabil Sahli, Farouk Kammoun. 267-271 [doi]
- A Dynamic Layering Scheme of Multicast Key ManagementFan Yang, Xiao Ping Li, Qing-kuan Dong, Yan-Ming Liu. 269-272 [doi]
- Risk Assessment Model on the Internal Corporate Governance Based on the SPAJibin Ma, Huiling Gu, Yonghao Sun, Xujie Hu. 272-276 [doi]
- Research on 3D Reconstruction Procedure of Marked Points for Large Workpiece MeasurementZhanli Li, Yuan Wang. 273-276 [doi]
- Appraisal Model of MIS in Enterprises Based on the Unascertained MeasurementXuyan Wu, Huiling Gu, Xujie Hu, Yuhong Dong. 277-280 [doi]
- Research on Video Information Camouflage Processing Algorithm Based on Pulse Amplitude ModulationYang Qiu, Jin Tian, Liuyu Qian. 277-280 [doi]
- Identity Based Multi-proxy Multi-signcryption Scheme for Electronic CommerceYing Sun, Chunxiang Xu, Fagen Li, Yong Yu. 281-284 [doi]
- A New Multiple-Objects Tracking Method with Particle FilterLong Chen, Bao-Long Guo, Wei Sun. 281-284 [doi]
- Support Vector Machine Based on Possibility Degrees and Fault DiagnosisDu Jingyi, Wang Mei, Cai Wenhao. 285-288 [doi]
- An Efficient Anonymous Routing Protocol for Mobile Ad Hoc NetworksXiaoqing Li, Hui Li, Jianfeng Ma, Weidong Zhang. 287-290 [doi]
- Optimal Combination of H.264/AVC Coding Tools for Mobile Multimedia Broadcasting ApplicationYu Han, Bo Yang, Kan Chang, Ziyi Quan. 289-293 [doi]
- Distributed Event-Triggered Trust Management for Wireless Sensor NetworksSibo Liu, Liaojun Pang, Qingqi Pei, Hua Ma, Qingquan Peng. 291-294 [doi]
- Distributed Video Coding Based on Multiple DescriptionHongxia Ma, Yao Zhao, Chunyu Lin, Anhong Wang. 294-297 [doi]
- A Novel Biometric-Based Authentication Scheme with Privacy ProtectionHuixian Li, Liaojun Pang. 295-298 [doi]
- Towards Provably Secure On-demand Source Routing in MANETLiqiang Mao, Jianfeng Ma, Xuewen Dong. 299-302 [doi]
- A Watermarking Scheme Based on Two-dimensional Wavelet Filter ParametrizationGuosheng Cheng, Jianwei Yang. 301-304 [doi]
- Research on Integration of Safety Analysis in Model-Driven Software DevelopmentChen Feng, Li Weihua, Fang DingYi, Chen Xiaojiang. 303-306 [doi]
- Watermarking Relational Databases for Ownership Protection Based on DWTChuanxian Jiang, Xiaowei Chen, Zhi Li. 305-308 [doi]
- An Authentication Protocol Applied to RFID Security SystemsXiaoqing Gong, Yi Wang, Hui Li, Jian He. 307-310 [doi]
- A Fragile Software Watermarking for Tamper-ProofChangle Zhang, Hong Peng, Xianzhong Long, Zheng Pan, Ying Wu. 309-312 [doi]
- MRDWA: Multi-role Dynamic Weighting Aggregation Algorithm in Event Driven Wireless Sensor NetworksYing Chen, Jian Shu, Hong Liu, Linlan Liu, Jiajie Gong. 311-314 [doi]
- Curvelet Domain Watermark Detection Using Alpha-Stable ModelsChengzhi Deng, Huasheng Zhu, Shengqian Wang. 313-316 [doi]
- An Identification Method for Transient Capacitive Current of Distribution Network by ICMACJianwen Zhao, Yuanbin Hou. 315-318 [doi]
- Nonuniformity Correction Algorithms of IRFPA Based on Radiation Source ScalingEnke Li, Shangqian Liu, Shimin Yin, Xiaoning Fu. 317-321 [doi]
- Development of a Java-Oriented Software General Component LibraryHan Xiao, Zu-xun Zhang, Qiang Wang, Hua-liang Hu. 321-325 [doi]
- The SOBER Family Ciphers Reconfigurable Processing Architecture DesignZhiyuan Wang, Jianhua Huang, Ziming Guan. 322-326 [doi]
- Two Efficient Fragile Web Page Watermarking SchemesPeng Sun, Hongtao Lu. 326-329 [doi]
- Webpage Encryption Based on Polymorphic Javascript AlgorithmBai Zhongying, Qin Jiancheng. 327-330 [doi]
- Researches on Integrating Database Access Control and Privacy ProtectionYonghong Yu. 330-333 [doi]
- The Improving of IKE with PSK for Using in Mobile Computing EnvironmentsDingguo Yu, Nan Chen. 331-334 [doi]
- A New Source Address Validation Scheme Based on IBSNing-ning Lu, Hua-chun Zhou, Hong-Ke Zhang. 334-337 [doi]
- Common Friends Discovery with Privacy and AuthenticityShin Yan Chiou, Shih-Ying Chang, Hung-Min Sun. 337-340 [doi]
- Shibboleth Access for Resources on the National Grid Service (SARoNGS)Xiao Dong Wang, Mike Jones, Jens Jensen, Andrew Richards, David Wallom, Tiejun Ma, Robert Frank, David Spence, Steven Young, Claire Devereux, Neil Geddes. 338-341 [doi]
- Known Signature Attack of ID-Based Multisignature SchemesWu-Chuan Yang, Jhih-Syue Jhou. 341-343 [doi]
- Defending against UDP Flooding by Negative Selection Algorithm Based on Eigenvalue SetsRui Xu, Wen-li Ma, Wen-ling Zheng. 342-345 [doi]
- A Generalization of de Weger s MethodChien-Yuan Chen, Chih-Cheng Hsueh, Yu-Feng Lin. 344-347 [doi]
- Intrusion Detection Based on One-class SVM and SNMP MIB DataCui-Mei Bao. 346-349 [doi]
- New Strategy of Efficient SPA-resistant ExponentiationsWu-Chuan Yang. 348-351 [doi]
- Research on Gravity-Based Anomaly Intrusion Detection AlgorithmBaoyi Wang, Ranran Jin, Shaomin Zhang, Xiaomin Zhao. 350-353 [doi]
- Browser-Side Countermeasures for Deceptive Phishing AttackHuajun Huang, Shaohong Zhong, Junshan Tan. 352-355 [doi]
- An Anti-attack Watermarking Based on Synonym Substitution for Chinese TextHe Lu, Lin JianBin, Li TianZhi, Fang DingYi. 356-359 [doi]
- Image Retrieve Based on Primary ClustersWenbing Chen, Jianwei Yang, Wangwei. 357-360 [doi]
- Research on Attack Intention Recognition Based on Graphical ModelWu Peng, Zhigang Wang, Junhua Chen. 360-363 [doi]
- An Effective Texture Spectrum DescriptorXiaosheng Wu, Junding Sun. 361-364 [doi]
- Anti-protocol Attacks Digital Watermarking Based on Media-Hash and SVDJing-pei Wang, Shui-fa Sun, Ming Jiang, Dan-gui Xie, Bang Jun Lei. 364-367 [doi]
- Texture Feature Analysis on Erosion and Wear in Artillery ChamberXiao-ning Fu, En-ke Li, Wen-jing Gao. 365-368 [doi]
- Image Retrieval Based on Character-Matching TechnologyZhao Shan, Liu Jing. 369-372 [doi]
- Intra-mode Dependent Coding Method for Image CompressionYung-Chiang Wei, Jui-Che Teng, Chien-Wen Chung. 371-374 [doi]
- Microarray Image Segmentation Using Region Growing Algorithm and Mathematical MorphologyPing Ye, Guirong Weng. 373-376 [doi]
- Dynamically Constrained One-Bit Transform for Motion Vector EstimationFu-Kun Chen, Jui-Che Teng, Yue-Dar Jou, Wen-Yuan Liao. 375-378 [doi]
- A Study on the Algorithm Based on Image Color Correlation MiningYongyue Chen, Huosong Xia. 377-380 [doi]
- An Improving Technique of Color Histogram in Segmentation-based Image RetrievalZhenhua Zhang, Wenhui Li, Bo Li. 381-384 [doi]
- Lung Segmentation for Chest Radiograph by Using Adaptive Active Shape ModelsJiann-Shu Lee, Hsing-Hsien Wu, Ming-Zheng Yuan. 383-386 [doi]
- 2-Level-Wavelet-Based License Plate Edge DetectionMing-Kan Wu, Jing-Siang Wei, Hao-Chung Shih, Chian C. Ho. 385-388 [doi]
- The Application on the Evaluation of Quality of Universities Undergraduate Theory Teaching Work Based on Artificial Neural NetworkJun-qiao Qi, Chang-long Wang, Yan-ming Qi. 387-390 [doi]
- Analysis of One-way Alterable Length Hash Function Based on Cell Neural NetworkQun-ting Yang, Tie-gang Gao, Li Fan, Qiao-lun Gu. 391-395 [doi]
- Bearings Fault Diagnosis Based on the Optimal Impulse Response WaveletDan Zhang, Wentao Sui. 391-394 [doi]
- A Digital Certificate Application Scheme in Content Protection System for High Definition Digital InterfaceKefeng Fan, Subing Zhang, Wei Mo. 395-398 [doi]
- The Sync Tracing Based on Improved Genetic Algorithm Neural NetworkYuanbin Hou, Chunfeng Song, Ning Li. 396-399 [doi]
- Research on Equiponderant Forwarding within Multi-nexthop InterfacesNing-ning Liang, Xuan Yong Zhu. 399-401 [doi]
- Research on Intrusion Detection Based on an Improved SOM Neural NetworkDianbo Jiang, Yahui Yang, Min Xia. 400-403 [doi]
- One-way Hash Function Construction Based on Conservative Chaotic SystemsQing-Hua Zhang, Han Zhang, Zhao-hui Li. 402-405 [doi]
- Words Clustering Based on Keywords Indexing from Large-scale Categorization CorporaLiu Hua. 407-410 [doi]
- Emergency Command System for Geologic Disasters PreventionWenbiao Peng, Chaojun Yan, Xinqiong Liu, Lihua Deng. 410-413 [doi]
- Research on Active Defence Technology with Host Intrusion Based on K-Nearest Neighbor Algorithm of KernelXuedou Yu. 411-414 [doi]
- Study on Ultrasonic Ranging System DesignLihua Deng. 414-416 [doi]
- An Improved Weighted-Feature Clustering Algorithm for K-anonymityLijian Lu, Xiaojun Ye. 415-418 [doi]
- Interactive Visualisation of 3D City Models Based on Adaptive Streaming of 3D-GIS DataZhenping Zhang, Jitao Fang, Runhuan Jing. 417-420 [doi]
- A New Interacting Multiple Model Algorithm Based on the Unscented Particle FilterXiaolong Deng, Pingfang Zhou. 419-422 [doi]
- A New Feature Selection Method for Malcodes DetectionXiaokang Zhang, Jianmei Shuai. 423-426 [doi]
- A New Hybrid Routing Protocol in Heterogeneous Wireless NetworksYulong Shen, Qijian Xu, Zuoshun Wu, Hao Yin, Jianfeng Ma. 423-426 [doi]
- A New Fingerprint Sequences Matching Algorithm for Content-Based Copy DetectionRongxian Nie, Guiguang Ding, Jianmin Wang, Li Zhang. 427-430 [doi]
- Layer Key Management Scheme on Wireless Sensor NetworksQingqi Pei, Lei Wang, Hao Yin, Liaojun Pang, Hong Tang. 427-431 [doi]
- Infrared Small Weak Target Detection via HOSAGaoyu Zhang. 431-434 [doi]
- C and M: A New Network Coding Scheme for Wireless NetworksXiaoyan Zhu, Hao Yue, YuMin Wang. 432-436 [doi]
- DWT-Based Shot Boundary Detection Using Support Vector MachineJun Li, Youdong Ding, Yunyu Shi, Qingyue Zeng. 435-438 [doi]
- Range-Free Fast and Rough Nodes Localization Algorithm in Wireless Sensor NetworksWang Mei, Sun Xiaochuan, Zheng Hao. 437-440 [doi]
- A Model of Intrusion Prevention Base on ImmuneYaping Jiang, Yong Gan, Jianhua Zhou, Zengyu Cai. 441-444 [doi]
- Information Security Wireless Sensor GridLi Mingming, Li Baiping, Li Wei, Chen Lei. 441-445 [doi]
- New Greedy Algorithm for Computing Double-Base ChainsMing Li, Kunpeng Wang. 445-450 [doi]
- An Effective Scheme for Defending Denial-of-Sleep Attack in Wireless Sensor NetworksChen Chen, Li Hui, Qingqi Pei, Lv Ning, Qingquan Peng. 446-449 [doi]
- H2S: A Secure and Efficient Data Aggregative Retrieval Scheme in Unattended Wireless Sensor NetworksWei Ren, Yi Ren, Hui Zhang. 450-453 [doi]
- An Eco-Defending Architecture for Network Security Based on Immuninty and Mobile AgentsTongrang Fan, Yan Sun, Yongbin Zhao. 451-454 [doi]
- Evaluating Intrusion Detection Systems in High Speed NetworksFaeiz Alserhani, Monis Akhlaq, Irfan-Ullah Awan, John Mellor, Andrea J. Cullen, Pravin Mirchandani. 454-459 [doi]
- An Improved Genetic Algorithm for Power GridYouchan Zhu, Xueying Guo, Jing Li. 455-458 [doi]
- Swarm Intelligence: Ant-Based Robot Path PlanningJing Zhou, Guanzhong Dai, De-Quan He, Jun Ma, Xiao-Yan Cai. 459-463 [doi]
- A Parity Check Node Synchronization Based Method for Solving Phase Ambiguity Problem in DVB-S SystemsJielin Fu, Yongjun Tang. 463-466 [doi]
- DCT-Based Robust Watermarking with Swarm Intelligence ConceptsHsiang-Cheh Huang, Yueh-Hong Chen, Guan-Yu Lin. 464-467 [doi]
- Security Analysis of the Kerberos Protocol Using BAN LogicKai Fan, Hui Li, Yue Wang. 467-470 [doi]
- A New Scheme to Privacy-Preserving Collaborative Data MiningJianming Zhu. 468-471 [doi]
- The Testing and Evaluating System for the Security Operating System Based on the Mechanism of Keyword-DrivenLiu Xing, Li Yan, Cai Mian, Guo Ying. 471-474 [doi]
- Information Security Monitoring System Based on Data MiningGuangjuan Lv, Ruzhi Xu, Xiangrong Zu, Liwu Deng. 472-475 [doi]
- An Identity-Based Authentication Model for Mobile AgentYike Yu, Xuefeng Zheng, Mingde Zhang, Qingguo Zhang. 475-478 [doi]
- ID-Based Non-interactive Deniable Authentication ProtocolWei-Min Shi. 479-482 [doi]
- Performance Analysis of Analog LMS Multiuser Receiver in Transmitted-Reference UWB SystemLin Zheng, Wei Ge, Hongbing Qiu. 479-482 [doi]
- Certificateless One-Way Authenticated Two-Party Key Agreement ProtocolWuping Chen, Lei Zhang, Bo Qin, Qianhong Wu, Huanguo Zhang. 483-486 [doi]
- E-government Security Management: Key Factors and CountermeasureJin-Fu Wang. 483-486 [doi]
- A Role and Activity Based Access Control Model for University Identity and Access Management SystemShuliang Zheng, Doingxing Jiang, Qixin Liu. 487-490 [doi]
- A Secure ID-Based Explicit Authenticated Key Agreement Protocol without Key EscrowMengbo Hou, Qiuliang Xu. 487-490 [doi]
- Multi-party Non-repudiation Protocol with Different Message ExchangedYanping Li, Liaojun Pang. 491-494 [doi]
- History and Future Information Based Trust Model in C2C E-commerceShaomin Zhang, Xiayan Zhang, Baoyi Wang. 491-494 [doi]
- An Improved Scheme of Single Sign-on ProtocolYang Jian. 495-498 [doi]
- A Variational Model Combining Curvelet Shrinkage and Nonlinear Anisotropic Diffusion for Image DenoisingWeibin Zhang, Wenjuan Zhang. 497-500 [doi]
- A New Efficient and Strongly Secure Authenticated Key Exchange ProtocolQingfeng Cheng, Guangguo Han, Chuangui Ma. 499-502 [doi]
- Image De-noising Based on Nonlocal Diffusion TensorHan Yu. 501-504 [doi]
- An Automated Mechanism of Security Test on Network ProtocolsYahui Yang, Yunfei Chen, Min Xia, Juan Ma. 503-506 [doi]
- A Joint Multiscale Algorithm with Auto-adapted Threshold for Image DenoisingJin He, Yinpei Sun, Ying Luo, Qun Zhang. 505-508 [doi]
- An Improvement of AODV Protocol Based on Reliable Delivery in Mobile Ad Hoc NetworksJian Liu, Fang-min Li. 507-510 [doi]
- Nonlocal Curvature-Driven Diffusion Model for Image InpaintingLi Li, Han Yu. 513-516 [doi]
- Zero-Collision RFID Tags Identification Based on CDMALih-Chyau Wuu, Yen-Ju Chen, Chi-Hsiang Hung, Wen-Chung Kuo. 513-516 [doi]
- Adaptive Spatially Postprocessing Technique to Remove Blocking Artifacts for DCT Coded ImageJin Wang, Heechang Kim, Jongho Kim, Jechang Jeong. 517-520 [doi]
- An Enhanced Remote User Authentication Scheme Providing Mutual Authentication and Key Agreement with Smart CardsChun-Ta Li. 517-520 [doi]
- Security Enhancement of the Authentication Protocol for RFID SystemsYung-Cheng Lee, Wen-Chung Kuo, Y.-C. Hsieh, T.-C. Chen. 521-524 [doi]
- Image Denoising and Magnification via Kernel Fitting and Modified SVDBenyong Liu, Xiang Liao. 521-524 [doi]
- Secure Access Control Scheme of RFID System ApplicationYu-Chih Huang. 525-528 [doi]
- Organizational Barriers to the Implementation of Security EngineeringBryan Stewart Cline. 527-531 [doi]
- Paper Study of Embedded System Design Based on RFID SecuritiesLing-feng Shi, Xin-Quan Lai, Bao-Long Guo. 529-531 [doi]
- Improvement of an EPC Gen2 Compliant RFID Authentication ProtocolKuo-Hui Yeh, N. W. Lo. 532-535 [doi]
- National Information Infrastructure Security and Cyber Terrorism in the Process of IndustrializationsYanzhao Li. 532-535 [doi]
- A New Multi-bank E-cash Protocol with Anonymity ControlLingling Wang. 536-539 [doi]
- A Support Vector Machines Security Assessment Method Based on Group Decision-Marking for Electric Power Information SystemXiaorong Cheng, Yan Wei, Xin Geng. 536-539 [doi]
- Practical Quantum No-key Protocol with IdentificationYang Wu, Li Yang. 540-543 [doi]
- Threats to Health Information SecurityGanthan Narayana Samy, Rabiah Ahmad, Zuraini Ismail. 540-543 [doi]
- An Intrusion Detection System for Network Storage Based on System CallsLi-zhong Geng, Hui-bo Jia. 544-547 [doi]
- Facial Expression Recognition Based on Field Programmable Gate ArrayJzau-Sheng Lin, Shao-Han Liu, Wu-Chih Hsieh, Yu-Yi Liao, Hongchao Wang, QingHua Lan. 547-550 [doi]
- The Method of Equalization Based on Iterative Interference Cancellation for SCCPM SystemZhao Wusheng, Fu Yongqing, Han Zhixue. 548-551 [doi]
- Analysis and Evaluation of Contrast Enhancement Methods in Digital ImagesShen-Chuan Tai, Yi-Ying Chang, Ting-Chou Tsai, Li-Man Liao. 551-554 [doi]
- The Research of NULL Convention Logic Circuit Computing Model Targeted at Block Cipher ProcessingYalei Cui, Zibin Dai. 552-555 [doi]
- Contrast Enhancement Method Based on Average Luminance with Weighted Histogram EqualizationShen-Chuan Tai, Yi-Ying Chang, Kang-Ming Li, Ting-Chou Tsai. 555-558 [doi]
- Dynamic Behavior of SIS Epidemic Model with Feedback on Regular LatticDamin Zhang, Shaohong Cai. 556-559 [doi]
- Application of Averaged Learning Subspace Method in MRI ClassificationChuin-Mu Wang, Jau-An Chen, Jui-Hsing Chu. 559-562 [doi]
- Low Bit Rate ROI-Based SAR Image CompressionXiao-Hong Yuan, Zhao-Da Zhu, Gong Zhang. 563-567 [doi]
- A Novel Distributed Single Sign-On Scheme with Dynamically Changed Threshold ValueShangping Zhong, Xiangwen Liao, Xue Zhang, Jingqu Lin. 563-566 [doi]
- Building Trust Territory in Ad Hoc NetworksYuan Bai, Xing Zhang, Sun Bin. 567-570 [doi]
- Image Retrieval Based on Composite of Mean Shift and Assignment ModelWenbing Chen, Qizhou Li, Jianwei Yang. 568-571 [doi]
- Cost-Benefit Analysis of China s Internet Content RegulationQiang Song, Gang Li. 571-575 [doi]
- A RST Invariant Watermarking Scheme Utilizing Support Vector Machine and Image Moments for SynchronizationJianzhen Wu. 572-574 [doi]
- Image Moment Based Registration Scheme Utilizing Support Vector MachineJianzhen Wu. 575-577 [doi]
- Dynamic Behavior of SIRS Model with Feedback on Complex NetworksDamin Zhang, Shaohong Cai. 576-579 [doi]
- Position Verification in Multi-hop Vehicular NetworksDeepa Susan Rajan, Chetan Yeole, Harsha Nakade, Huirong Fu, Ye Zhu. 580-584 [doi]
- A New Adaptive Image Denoising Method Combining the Nonsubsampled Contourlet Transform and Total VariationXiaoyue Wu, Baolong Guo, Shengli Qu, Zhuo Wang. 581-584 [doi]
- SAR Image Target Recognition Based on Hu Invariant Moments and SVMFu Yan, Wang Mei, Zhang Chunqin. 585-588 [doi]
- Efficient Protection Scheme for SVC Content Based on Network CodingJi Lu, Song Xiao, Chengke Wu. 585-588 [doi]
- Testability Analysis of Grounding Grids Using Network TransformationTao Niu, Yingjiao Zhang, Debo Zhang, Liqiang Liu, Xianjue Luo. 589-592 [doi]
- Application of Bloom Filter for GTP Stateful Inspection in Network ProcessorZhenyu Liu, Weijun Li, Yue Lai. 589-592 [doi]
- Performance Analysis of Anonymous Communication System 3-Mode NetKazuhiro Kono, Shinnosuke Nakano, Yoshimichi Ito, Noboru Babaguchi. 593-596 [doi]
- Research on Algorithm of Digital Filtering Based on Video Information SecurityJin Tian, Yang Qiu, Liuyu Qian. 593-596 [doi]
- ISAR Imaging of High Speed Moving Targets Based-on Radon TransformFeng Tong-an, He Jin, Luo Ying. 597-600 [doi]
- An Effective Lossless Hiding Technique Based on Reversible Contrast Mapping and Histogram Embedding MethodsTzu-Chuen Lu, Ying-Hsuan Huang. 599-602 [doi]
- Octa-Log-Polar Fourier Transform for Image RegistrationXian-xiang Wu, Bao-Long Guo, Juan Wang. 601-604 [doi]
- A High Quality Reversible Data Hiding Method Using Interpolation TechniqueChyuan-Huei Thomas Yang, Chun-Hao Hsu. 603-606 [doi]
- An Improved Image Encryption Scheme Based on Line MapsJuan Li, Yong Feng, Xuqiang Yang. 605-608 [doi]
- Reversible Steganography Based on Side Match and Hit Pattern for VQ-Compressed ImagesCheng-Hsing Yang, Cheng-Ta Huang, Shiuh-Jeng Wang. 607-610 [doi]
- Multiresolution Target Detection in Wavelet Domain for SAR ImageryXiao-Hong Yuan, Zhao-Da Zhu, Gong Zhang. 609-613 [doi]
- A High Embedding Efficiency Steganography Scheme for Wet Paper CodesZhao-Xia Yin, Chin-Chen Chang, Yan-ping Zhang. 611-614 [doi]
- A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear EquationChin-Feng Lee, Kuo-Nan Chen, Chin-Chen Chang, Meng-Cheng Tsai. 615-618 [doi]
- A New Accelerated RC4 Scheme Using "Ultra Gridsec" and "HIMAN" and use this Scheme to Secure "HIMAN" DataHisham A. Kholidy, Khaled Alghathbar. 617-622 [doi]
- Prediction-Based Watermarking Schemes for DCT-Based Image CodingJing-Ming Guo, Chia-Hao Chang. 619-622 [doi]
- A New Conic Curve Digital Signature SchemeXiang Can, You Lin. 623-626 [doi]
- Human Visual System Based Watermarking for Color ImagesKuo-Cheng Liu. 623-626 [doi]
- A High-efficiency Data Distribution Algorithm in Distributed StorageXiao-Yuan Yang, Zhen Liu, Wei Zhang, Dun-Tao Guo. 627-630 [doi]
- Universal Steganalysis to Images with WBMC ModelXiaoyuan Yang, Shifeng Wang, Jia Liu. 627-630 [doi]
- An Approach to Group Decision Making Based on Incomplete Linguistic Preference RelationsTien-Chin Wang, Shu-Chen Peng, Shu-Chen Hsu, Juifang Chang. 631-634 [doi]
- A New Abuse-Free Fair Electronic Payment ProtocolKai Fan, Yue Wang, Hui Li. 633-636 [doi]
- Constructions of Some Difference-Balanced d-form FunctionsTongjiang Yan, Li Hong. 635-637 [doi]
- Action-Based Access Control for Web ServicesFengHua Li, Wei Wang, Jianfeng Ma, Haoxin Su. 637-642 [doi]
- A Novel Micropayment Scheme with Complete AnonymityXin Zhao, Yuqin Lv, Wenxin He. 638-642 [doi]
- Domain Administration of Task-role Based Access Control for Process Collaboration EnvironmentsYahui Lu, Li Zhang. 643-647 [doi]
- A Provably Secure Certificateless Blind Signature SchemeXiaoyuan Yang, Zhongyin Liang, Ping Wei, Junwei Shen. 643-646 [doi]
- Research on Model of Trust Degrees for PKIMingde Zhang, Xuefeng Zheng, Wensheng Yang, Shuwang Lv, Qingguo Zhang. 647-650 [doi]
- A Fast Correlation Attack via Parallel ComputingQiong Liu, Yupu Hu. 651-654 [doi]
- Information Security Routing Protocol in the WSNLi Wei, Chen Ming, Li Mingming. 651-656 [doi]
- A Database Protection System Aiming at SQL AttackLiwu Deng, Ruzhi Xu, Lizheng Jiang, Guangjuan Lv. 655-657 [doi]
- Proxy Re-encryption Scheme Based on SK Identity Based EncryptionXu an Wang, Xiaoyuan Yang. 657-660 [doi]
- Guess and Determine Attack on SOSEMANUKDing Lin, Guan Jie. 658-661 [doi]
- Analysis and Improvement of a Proxy Blind Multi-signature Scheme without a Secure ChannelYing Sun, Chunxiang Xu, Qi Xia, Yong Yu. 661-664 [doi]
- Algebraic Attack to SMS4 and the Comparison with AESWen Ji, Lei Hu, Haiwen Ou. 662-665 [doi]
- Detecting Stepping-Stone Intruders with Long Connection ChainsWei Ding, Matthew J. Hausknecht, Shou-Hsuan Stephen Huang, Zach Riggle. 665-669 [doi]
- Number-Theoretic Attack on Lyuu-Wu s Multi-proxy Multi-signature SchemeFanyu Kong, Jia Yu. 666-668 [doi]
- A New JPEG Resistant Color Image Watermarking Algorithm Based on Quantization Index ModulationNie Jie, Wei Zhiqiang, Li Zhen. 669-672 [doi]
- A Modified Run-length Image Data Hiding for High Embedding CapacityRey-Sern Lin, Shang-Wen Hu. 673-676 [doi]
- An Optimal Blind Signature Padding with Message RecoveryJingran Wang, Haifeng Qian. 673-676 [doi]
- Windows Memory Analysis Based on KPCRRuichao Zhang, Lianhai Wang, Shuhui Zhang. 677-680 [doi]
- Intelligent Clustering with PCA and Unsupervised Learning Algorithm in Intrusion Alert CorrelationMaheyzah Md Siraj, Mohd Aizaini Maarof, Siti Zaiton Mohd Hashim. 679-682 [doi]
- An Efficient Hierarchical Group Key Management Scheme Based on Orthogonal VectorsJing Wang, Xiaola Lin. 681-684 [doi]
- Fuzzy c-Means Sub-Clustering with Re-sampling in Network Intrusion DetectionAnazida Zainal, Den Fairol Samaon, Mohd Aizaini Maarof, Siti Mariyam Hj. Shamsuddin. 683-686 [doi]
- A Method for Accessing Trusted Services Based on Service-Oriented ArchitectureXin Yu, Yu Bai. 685-688 [doi]
- Hierarchical Takagi-Sugeno Models for Online Security Evaluation SystemsAjith Abraham, Crina Grosan, Hongbo Liu, Yuehui Chen. 687-692 [doi]
- Research on Quantitative Evaluation for IntegrityLihua Yin, Yunchuan Guo. 689-692 [doi]
- Research on New Classification Methods of Remote Sensing of Mass Ingredient without Vegetation of Hei Shan Gorge in Yellow River BasinShudong Wang, Xiaohua Wang. 693-696 [doi]
- Detecting Insider Attacks Using Non-negative Matrix FactorizationJan Platos, Václav Snásel, Pavel Krömer, Ajith Abraham. 693-696 [doi]
- A Rapid Algorithm and its Implementation for Modular InversionBaiwen Fu. 697-700 [doi]
- Adaptive-Push Peer-to-Peer Video Streaming System Based on Dynamic Unstructured TopologyXiaodong Shen, Guiguang Ding, Yizheng Chen, Jianmin Wang. 697-700 [doi]
- Optimal Information Rates of Novel Graph Based Access StructuresMingkun Yang. 701-704 [doi]
- Evaluation and Simulation on the Performance of DHTs Required by P2PSIPZengming Tian, Xiangming Wen, Wei Zheng, Yong Sun, Yinbo Cheng. 701-704 [doi]
- The Research on the Measurement of China Internet Illegal and Harmful ContentQiang Song, Gang Li. 705-709 [doi]
- Boosting Graph Embedding with Application to Facial Expression RecognitionLei Xiong, Duyan Bi, Xu Zhou, Shiping Ma. 707-710 [doi]
- Network Traffic Anomaly Detection Based on Self-Similarity Using HHT and Wavelet TransformXiaorong Cheng, Kun Xie, Dong Wang. 710-713 [doi]
- Application and Research of Mobile E-commerce Security Based on WPKIFeng Tian, Xiao-bing Han, Ying Wei. 711-714 [doi]
- A Performance Evaluation of Security Mechanisms for Web ServicesBachar Alrouh, Gheorghita Ghinea. 715-718 [doi]
- Privacy Protection for Speech InformationKazumasa Yamamoto, Seiichi Nakagawa. 717-720 [doi]
- Remark on Yu et al. s Online/Offline Signature Scheme in CT-RSA 2008Xiao-Long Ma, Zhi-Wei Wang, Li-ze Gu, Yi Xian Yang. 719-720 [doi]
- Improvement of Speaker Vector-Based Speaker VerificationNaoki Tadokoro, Tetsuo Kosaka, Masaharu Katoh, Masaki Kohda. 721-724 [doi]
- Towards Secure Content Based Dissemination of XML DocumentsMohammad Ashiqur Rahaman, Henrik Plate, Yves Roudier, Andreas Schaad. 721-724 [doi]
- Reducing Specular Reflection Components of Chrome-Plated Surface with Varying Light DirectionLi Chang Jiang, Zhong Zhang, Tetsuo Miyake, Takashi Imamura, Hisanaga Fujiwa. 725-728 [doi]
- Acoustic-Based Security System: Towards Robust Understanding of Emergency ShoutHiroaki Nanjo, Takanobu Nishiura, Hiroshi Kawano. 725-728 [doi]
- Design of Fault Diagnosis System of FPSO Production Process Based on MSPCAQiang Gao, Miao Han, Shu-liang Hu, Hai-jie Dong. 729-733 [doi]
- A System for Detecting Unusual Sounds from Sound Environment Observed by Microphone ArraysMitsuru Kawamoto, Futoshi Asano, Koichi Kurumatani, Yingbo Hua. 729-732 [doi]
- Detection of Abnormal Sound Using Multi-stage GMM for Surveillance MicrophoneAkinori Ito, Akihito Aiba, Masashi Ito, Shozo Makino. 733-736 [doi]
- Self-selecting Sub-secret Keys Sharing Scheme Based on Polynomials over Elliptic CurveWang Caimei, Li Zhengmao. 734-737 [doi]
- An Audio Watermarking Method of Resistance Statistics Attack Based on Psychoacoustic ModelXiao-li Liu, Shui-fa Sun, Jian-wei Zhu, Ming Jiang, Dan-gui Xie. 737-739 [doi]
- Cepstrum-Based Audio Watermarking Algorithm against the A/D and D/A AttacksXiaoming Zhang, Zhaoyang Yu. 740-743 [doi]
- A Robust Vehicle Tracking Approach Using Mean Shift ProcedureHuan Shen, Shun Ming Li, Jian Guo Mao, Fang Chao Bo, Fang Pei Li, Hua Peng Zhou. 741-744 [doi]
- Compensating Function of Formant Instantaneous Characteristics in Speaker IdentificationLimin Hou, Juanmin Xie. 744-747 [doi]
- Augmented Addition Operation of Conic Curves over Ring ZnGuo-jing Li, Tao Wen. 745-748 [doi]
- Implementing and Testing Producer-Consumer Problem Using Aspect-Oriented ProgrammingYang Zhang, Jingjun Zhang, Dongwen Zhang. 749-752 [doi]
- Design of DBA Algorithm in EPON UplikeYa-min Wang, Yan Liu. 751-753 [doi]
- Soft DSP Design Methodology of Face Recognition System on Nios II Embedded PlatformHao-Chung Shih, Chian C. Ho. 753-756 [doi]
- Cramer-Rao Lower Bound for Non-coherent TOA Estimation with Impulse SignalJie Liu, Xiaoji Liu, Lin Zheng. 754-757 [doi]
- Threats Identification in Healthcare Information Systems Using Genetic Algorithm and Cox RegressionRabiah Ahmad, Ganthan Narayana Samy, Nuzulha Khilwani Ibrahim, Peter A. Bath, Zuraini Ismail. 757-760 [doi]
- Research on Intrinsic Safety Behavior of Inductor-Disconnected-Discharge of Boost DC-DC ConvertersLiu Shulin, Li Yan. 758-761 [doi]
- Scanning Task Scheduling Strategy in Distributed Vulnerability Detection SystemBaoyi Wang, Jing Li, Shaomin Zhang, Xueying Guo. 761-764 [doi]
- Study on the Control of a Two-wheeled Unstable Vehicle Based on Sensitivity AnalysisYanzhao Li, Shengli Qu, Jiahui Zhu, Jianqin Sun. 762-765 [doi]
- Hierarchical Distributed Alert Correlation ModelDonghai Tian, Hu Changzhen, Yang Qi, Wang Jianqiao. 765-768 [doi]
- Generalized Analysis Model of Information Security of Computer System Based on Electromagnetic TopologyJin Tian, Yang Qiu, Ankun Lin. 766-769 [doi]
- Study on Centralized Authorization Model Supporting Multiple Access Control ModelsShaomin Zhang, Haiyan Zhang, Baoyi Wang. 769-772 [doi]
- The Design and Implementation of Security Defense Technology Based on Mandatory Running ControlJizhen Liu, Kehe Wu, Tong Zhang, Gang Ma. 770-773 [doi]
- An Accurate Image Juggling Authentication AlgorithmJianquan Xie, Qing Xie, Chunhua Yang. 774-777 [doi]
- Universal Steganalysis Based on Statistical Models Using Reorganization of Block-based DCT CoefficientsShaohui Liu, Lin Ma, Hongxun Yao, Debin Zhao. 778-781 [doi]