Abstract is missing.
- On Fast Private Scalar Product ProtocolsJu-Sung Kang, Dowon Hong. 1-10 [doi]
- A Survey on Access Control DeploymentVivy Suhendra. 11-20 [doi]
- Data Anonymity in Multi-Party Service ModelShinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake. 21-30 [doi]
- A Noise-Tolerant Enhanced Classification Method for Logo Detection and Brand ClassificationYu Chen, Vrizlynn L. L. Thing. 31-42 [doi]
- A Family Constructions of Odd-Variable Boolean Function with Optimum Algebraic ImmunityYindong Chen. 43-52 [doi]
- Design of a Modular Framework for Noisy Logo Classification in Fraud DetectionVrizlynn L. L. Thing, Wee-Yong Lim, Junming Zeng, Darell J. J. Tan, Yu Chen. 53-64 [doi]
- Using Agent in Virtual Machine for Interactive Security TrainingYi-Ming Chen, Cheng-En Chuang, Hsu-Che Liu, Cheng-Yi Ni, Chun-Tang Wang. 65-74 [doi]
- Information Technology Security Governance Approach Comparison in E-bankingTheodosios Tsiakis, Aristeidis Chatzipoulidis, Theodoros Kargidis, Athanasios Belidis. 75-84 [doi]
- A Fast and Secure One-Way Hash FunctionLamiaa M. El Bakrawy, Neveen I. Ghali, Aboul Ella Hassanien, Tai-Hoon Kim. 85-93 [doi]
- CLAPTCHA- A Novel CaptchaRahul Saha, G. Geetha, Gang-Soo Lee. 94-100 [doi]
- An Approach to Provide Security in Wireless Sensor Network Using Block Mode of CipherGulshan Kumar, Mritunjay Kumar Rai, Gang-Soo Lee. 101-112 [doi]
- Microscopic Analysis of ChipsDominik Malcik, Martin Drahanský. 113-122 [doi]
- An ID-Based Broadcast Signcryption Scheme Secure in the Standard ModelBo Zhang. 123-127 [doi]
- Robust Audio Watermarking Scheme Based on Short Time Fourier Transformation and Singular Value DecompositionPranab Kumar Dhar, Mohammad Ibrahim Khan, Sunil Dhar, Jong Myon Kim. 128-138 [doi]
- A Study on Domain Name System as Lookup Manager for Wireless/Mobile Systems in IPv6 NetworksSunguk Lee, Taeheon Kang, Rosslin John Robles, Sung-gyu Kim, Byungjoo Park. 139-145 [doi]
- An Information-Theoretic Privacy Criterion for Query Forgery in Information RetrievalDavid Rebollo-Monedero, Javier Parra-Arnau, Jordi Forné. 146-154 [doi]
- A Distributed, Parametric Platform for Constructing Secure SBoxes in Block Cipher DesignsPanayotis E. Nastou, Yannis C. Stamatiou. 155-166 [doi]
- Cryptanalysis of an Enhanced Simple Three-Party Key Exchange ProtocolHae Jung Kim, Eun-Jun Yoon. 167-176 [doi]
- An Effective Distance-Computing Method for Network Anomaly DetectionGuo-Hui Zhou. 177-182 [doi]
- Formalization and Information-Theoretic Soundness in the Development of Security Architecture for Next Generation Network Protocol - UDTDanilo Valeros Bernardo, Doan B. Hoang. 183-194 [doi]
- Bi-Layer Behavioral-Based Feature Selection Approach for Network Intrusion ClassificationF. Eid Heba, Mostafa A. Salama, Aboul Ella Hassanien, Tai-Hoon Kim. 195-203 [doi]
- A Parameterized Privacy-Aware Pub-sub System in Smart WorkYuan Tian, Biao Song, Eui-nam Huh. 204-214 [doi]
- A Lightweight Access Log Filter of Windows OS Using Simple Debug Register ManipulationRuo Ando, Kuniyasu Suzaki. 215-227 [doi]
- Diversity-Based Approaches to Software Systems SecurityAbdelouahed Gherbi, Robert Charpentier. 228-237 [doi]