Journal: IEICE Transactions

Volume 95-D, Issue 1

1 -- 0Guojun Wang. Foreword
2 -- 11Chunhua Su, Yingjiu Li, Yunlei Zhao, Robert H. Deng, Yiming Zhao, Jianying Zhou. A Survey on Privacy Frameworks for RFID Authentication
12 -- 19Feng Li, Jie Wu 0001, Avinash Srinivasan. Uncertainty Mitigation for Trustworthiness-Oriented Applications in Wireless Ad Hoc Networks
20 -- 28Peidong Zhu, Huayang Cao, Wenping Deng, Kan Chen, Xiaoqiang Wang. A Systematic Approach to Evaluating the Trustworthiness of the Internet Inter-Domain Routing Information
29 -- 37Hidehito Gomi. Authentication Trust Metric and Assessment for Federated Identity Management Systems
38 -- 45Chao Yan, Hongjun Dai, Tianzhou Chen. A Fault-Tolerant Architecture with Error Correcting Code for the Instruction-Level Temporal Redundancy
46 -- 55Chi Guo, Lina Wang, Xiaoying Zhang. Study on Network Vulnerability Identification and Equilibrated Network Immunization Strategy
56 -- 66Yu Cheng, Anguo Ma, Minxuan Zhang. Accurate and Simplified Prediction of L2 Cache Vulnerability for Cost-Efficient Soft Error Protection
67 -- 77Rabindra Bista, Yong-Ki Kim, Myoung-Seon Song, Jae-Woo Chang. Improving Data Confidentiality and Integrity for Data Aggregation in Wireless Sensor Networks
78 -- 93Arnau Vives-Guasch, Magdalena Payeras-Capellà, Macià Mut Puigserver, Jordi Castellà-Roca, Josep Lluís Ferrer-Gomila. A Secure E-Ticketing Scheme for Mobile Devices with Near Field Communication (NFC) That Includes Exculpability and Reusability
94 -- 107Bin Dai, Feng Wang, BaoKang Zhao, Jinshu Su. Using Regional Routing to Improve the Scalability and Security of Inter-Domain Multipath Routing
108 -- 116Pedro Martinez-Julia, Antonio F. Gómez-Skarmeta, Ved P. Kafle, Masugi Inoue. Secure and Robust Framework for ID/Locator Mapping System
117 -- 125Jangseong Kim, Joonsang Baek, Jianying Zhou, Taeshik Shon. An Efficient and Secure Service Discovery Protocol for Ubiquitous Computing Environments
126 -- 133Rehana Yasmin, Eike Ritter, Guilin Wang. An Authentication Framework for Wireless Sensor Networks Using Identity-Based Signatures: Implementation and Evaluation
134 -- 142Lin Yao, Guowei Wu, Jia Wang, Feng Xia, Chi Lin, Guojun Wang. A Clustering K-Anonymity Scheme for Location Privacy Preservation
143 -- 151Yunsang Oh, Hyoungshick Kim, Takashi Obi. Privacy-Enhancing Queries in Personalized Search with Untrusted Service Providers
152 -- 160Min Kyoung Sung, Ki Yong Lee, Jun-Bum Shin, Yon Dohn Chung. A Privacy Protection Method for Social Network Data against Content/Degree Attacks
161 -- 168Min-Hua Shao, Ying-Chih Chin. A Privacy-Preserving Dynamic ID-Based Remote User Authentication Scheme with Access Control for Multi-Server Environment
169 -- 176Marc Domingo-Prieto, Joan Arnedo-Moreno. JXTAnonym: An Anonymity Layer for JXTA Services Messaging
177 -- 180Sinjae Lee, Wonjun Lee. The Chain Effect for the Reputation-Based Trust Model in Peer-to-Peer Computing
181 -- 184Helena Rifà-Pous, Emmanouil A. Panaousis, Christos Politis. Recipients' Anonymity in Multihop Ad-Hoc Networks
185 -- 187Jae Deok Ji, Seok Won Jung, Jongin Lim. Efficient Sequential Architecture of AES CCM for the IEEE 802.16e
188 -- 191Eui Jik Kim, Jeongsik In, Sung-Kwan Youm, Chul-Hee Kang. Delay Attack-Resilient Clock Synchronization for Wireless Sensor Networks
192 -- 204Ikki Fujiwara, Kento Aida, Isao Ono. Combinatorial Auction-Based Marketplace Mechanism for Cloud Service Reservation
205 -- 214Zhengong Cai, Xiaohu Yang, Xinyu Wang, Aleksander J. Kavs. Feature Location in Source Code by Trace-Based Impact Analysis and Information Retrieval
215 -- 229Yongyuth Permpoontanalarp, Apichai Changkhanak. On-the-Fly Trace Generation Approach to the Security Analysis of the TMN Protocol with Homomorphic Property: A Petri Nets-Based Method
230 -- 238Ryo Nagata, Atsuo Kawai. A Method for Detecting Determiner Errors Designed for the Writing of Non-native Speakers of English
239 -- 246Rong-San Lin, Jia-Yu Wang. Efficient Candidate Scheme for Fast Codebook Search in G.723.1
247 -- 255Yoshitaka Inoue, Takamichi Miyata, Yoshinori Sakai. Colorization Based Image Coding by Using Local Correlation between Luminance and Chrominance
256 -- 266Sandy Martedi, Hideaki Uchiyama, Guillermo Enriquez, Hideo Saito, Tsutomu Miyashita, Takenori Hara. Foldable Augmented Maps
267 -- 270Ying Ma, Guangchun Luo, Hao Chen. Kernel Based Asymmetric Learning for Software Defect Prediction
271 -- 274Qian Liu, Chao Lan, Xiao-Yuan Jing, Shi-Qiang Gao, David Zhang, Jing-yu Yang. Sparsity Preserving Embedding with Manifold Learning and Discriminant Analysis
275 -- 279Yonggang Huang, Dianfu Ma, Jun Zhang, Yongwang Zhao. QDFA: Query-Dependent Feature Aggregation for Medical Image Retrieval
280 -- 284Jose L. Lopez-Martinez, Vitaly Kober. Blind Adaptive Method for Image Restoration Using Microscanning
285 -- 288Ping Guo, Zhenjiang Miao, Xiao-Ping Zhang, Zhe Wang. A Fast Sub-Volume Search Method for Human Action Detection