2067 | -- | 2068 | Yutaka Miyake. Foreword |
2069 | -- | 2076 | Chia-Yin Lee, Zhi-Hui Wang, Lein Harn, Chin-Chen Chang. Secure Key Transfer Protocol Based on Secret Sharing for Group Communications |
2077 | -- | 2086 | Heung-Youl Youm. Overview of Traceback Mechanisms and Their Applicability |
2087 | -- | 2094 | Masakatu Morii, Yosuke Todo. Cryptanalysis for RC4 and Breaking WEP/WPA-TKIP |
2095 | -- | 2110 | SeongHan Shin, Kazukuni Kobara, Hideki Imai. Threshold Anonymous Password-Authenticated Key Exchange Secure against Insider Attacks |
2111 | -- | 2118 | Tetsuya Izu, Yumi Sakemi, Masahiko Takenaka. Detailed Cost Estimation of CNTW Forgery Attack against EMV Signature Scheme |
2119 | -- | 2128 | Ping Du, Akihiro Nakao. Rethinking Business Model in Cloud Computing: Concept and Example |
2129 | -- | 2138 | Yuan-Cheng Lai, Ying-Dar Lin, Fan-Cheng Wu, Tze-Yau William Huang, Frank C. Lin. Embedded TaintTracker: Lightweight Run-Time Tracking of Taint Data against Buffer Overflow Attacks |
2139 | -- | 2149 | Nur Rohman Rosyid, Masayuki Ohrui, Hiroaki Kikuchi, Pitikhate Sooraksa, Masato Terada. Analysis on the Sequential Behavior of Malware Attacks |
2150 | -- | 2158 | Junji Nakazato, Jungsuk Song, Masashi Eto, Daisuke Inoue, Koji Nakao. A Novel Malware Clustering Method Using Frequency of Function Call Traces in Parallel Threads |
2159 | -- | 2166 | Gregory Blanc, Youki Kadobayashi. A Step towards Static Script Malware Abstraction: Rewriting Obfuscated Script with Maude |
2167 | -- | 2170 | Eun-Jun Yoon, Kee-Young Yoo. Cryptanalysis of Group Key Agreement Protocol Based on Chaotic Hash Function |
2171 | -- | 2172 | Fagen Li, Jiang Deng, Tsuyoshi Takagi. An Improved Authenticated Encryption Scheme |
2173 | -- | 2183 | Yuanwu Lei, Yong Dou, Jie Zhou. FPGA-Specific Custom VLIW Architecture for Arbitrary Precision Floating-Point Arithmetic |
2184 | -- | 2190 | Cheng-Min Lin, Shyi-Shiou Wu, Tse-Yi Chen. Modeling and Analysis for Universal Plug and Play Using PIPE2 |
2191 | -- | 2200 | Gyeongyeon Kang, Yoshiaki Taniguchi, Go Hasegawa, Hirotaka Nakano. Parameter Tuning of the Protocol Interference Model Using SINR for Time Slot Assignment in Wireless Mesh Networks |
2201 | -- | 2211 | Yuta Nakashima, Ryosuke Kaneto, Noboru Babaguchi. Indoor Positioning System Using Digital Audio Watermarking |
2212 | -- | 2218 | Chuanjun Ren, Xiaomin Jia, Hongbing Huang, Shiyao Jin. Analyzing Emergence in Complex Adaptive System: A Sign-Based Model of Stigmergy |
2219 | -- | 2226 | Won-Gyo Jung, Sang-Sung Park, Dong-Sik Jang. Patent Registration Prediction Methodology Using Multivariate Statistics |
2227 | -- | 2233 | Danushka Bollegala, Yutaka Matsuo, Mitsuru Ishizuka. A Supervised Classification Approach for Measuring Relational Similarity between Word Pairs |
2234 | -- | 2243 | Liang Sun, Shinichi Yoshida, Yanchun Liang. A Support Vector and K-Means Based Hybrid Intelligent Data Clustering Algorithm |
2244 | -- | 2249 | Takanori Ayano. C)-Smooth Regression Functions |
2250 | -- | 2258 | Masami Akamine, Jitendra Ajmera. Decision Tree-Based Acoustic Models for Speech Recognition with Improved Smoothness |
2259 | -- | 2270 | Seung-Wan Jung, Young Jin Nam, Dae-Wha Seo. Amortized Linux Ext3 File System with Fast Writing after Editing for WinXP-Based Multimedia Application |
2271 | -- | 2279 | Bin Shyan Jong, Chi-Kang Kao, Juin-Ling Tseng, Tsong Wuu Lin. Compression of Dynamic 3D Meshes and Progressive Displaying |
2280 | -- | 2283 | Haoru Su, Sunshin An. Multi-Dimensional Channel Management Mechanism to Avoid Reader Collision in Dense RFID Networks |
2284 | -- | 2287 | Shize Guo, Zhe-Ming Lu, Zhe Chen, Hao Luo. Strength-Strength and Strength-Degree Correlation Measures for Directed Weighted Complex Network Analysis |
2288 | -- | 2292 | Jeong-Hoon Lee, Yoon-Joon Lee. Concept Drift Detection for Evolving Stream Data |