Abstract is missing.
- Detect Zero by Using Symmetric Homomorphic EncryptionD. J. Guan, Chen-Yu Tsai, E. S. Zhuang. 1-7 [doi]
- Secure Certificateless Signature Scheme Supporting Batch VerificationChun-I Fan, Pei-Hsiu Ho, Jheng-Jia Huang, Yi-Fan Tseng. 8-11 [doi]
- On Zero-Knowledge Identification Based on Q-ary Syndrome DecodingRong Hu, Kirill Morozov, Tsuyoshi Takagi. 12-18 [doi]
- An Efficient and Practical Fair Buyer-Anonymity Exchange Scheme Using Bilinear PairingsWen-Shenq Juang. 19-26 [doi]
- An Efficient and Provable Secure Security-Mediated Identity-Based Identification SchemeJi-Jian Chin, Rouzbeh Behnia, Swee-Huay Heng, Raphael Chung-Wei Phan. 27-32 [doi]
- Cryptanalysis on RFID Authentications Using Minimum Disclosure ApproachHung-Yu Chien. 33-40 [doi]
- Adaptive Feature-Weighted Alert Correlation System Applicable in Cloud EnvironmentChih-Hung Wang, Ji-Min Yang. 41-47 [doi]
- Detecting and Preventing Drive-By Download Attack via Participative Monitoring of the WebTakashi Matsunaka, Junpei Urakawa, Ayumu Kubota. 48-55 [doi]
- Search Engine Based Investigation on Misconfiguration of Zone TransferYin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto. 56-62 [doi]
- Detecting HTTP-Based Botnet Based on Characteristic of the C & C Session Using by SVMKazumasa Yamauchi, Yoshiaki Hori, Kouichi Sakurai. 63-68 [doi]
- Efficient Malware Packer Identification Using Support Vector Machines with Spectrum KernelTao Ban, Ryoichi Isawa, Shanqing Guo, Daisuke Inoue, Koji Nakao. 69-76 [doi]
- Suspicious URL Filtering Based on Logistic Regression with Multi-view AnalysisKe-Wei Su, Kuo-Ping Wu, Hahn-Ming Lee, Te-En Wei. 77-84 [doi]
- Preventing Abuse of Cookies Stolen by XSSHiroya Takahashi, Kenji Yasunaga, Masahiro Mambo, Kwangjo Kim, Heung-Youl Youm. 85-89 [doi]
- Design and Implementation of Digital Forensic Software for iPhoneChung-Nan Chen, Raylin Tso, Chung-Huang Yang. 90-95 [doi]
- Memory Forensics for Key Evidence Investigations in Case IllustrationsYa-Ting Chang, Min-Ju Chung, Chin-Feng Lee, Cheng-Ta Huang, Shiuh-Jeng Wang. 96-101 [doi]
- Histogram-Based Reversible Information Hiding Improved by Prediction with the Variance to Enhance Image QualityChi-Yao Weng, Cheng-Hsing Yang, Chun-I Fan, Kuan-Liang Liu, Hung-Min Sun. 102-107 [doi]
- Formal Analysis of ISO/IEC 9798-2 Authentication Standard Using AVISPASheikh Ziauddin, Bruno Martin. 108-114 [doi]
- Present Cyber Threat Management (Methodologies to Mitigate Evolving Cyber-Attacks)Bright Gameli Mawudor. 115-121 [doi]
- Automatic Adding License Management Functionality for Android ApplicationsMing-Chih Kao, Wen-Chung Kuo, Yu-Hsuan Pan. 122-126 [doi]
- A Scripting Language for Automating Secure Multiparty ComputationKung Chen, Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang. 127-134 [doi]