1 | -- | 0 | Guojun Wang. Foreword |
2 | -- | 11 | Chunhua Su, Yingjiu Li, Yunlei Zhao, Robert H. Deng, Yiming Zhao, Jianying Zhou. A Survey on Privacy Frameworks for RFID Authentication |
12 | -- | 19 | Feng Li, Jie Wu 0001, Avinash Srinivasan. Uncertainty Mitigation for Trustworthiness-Oriented Applications in Wireless Ad Hoc Networks |
20 | -- | 28 | Peidong Zhu, Huayang Cao, Wenping Deng, Kan Chen, Xiaoqiang Wang. A Systematic Approach to Evaluating the Trustworthiness of the Internet Inter-Domain Routing Information |
29 | -- | 37 | Hidehito Gomi. Authentication Trust Metric and Assessment for Federated Identity Management Systems |
38 | -- | 45 | Chao Yan, Hongjun Dai, Tianzhou Chen. A Fault-Tolerant Architecture with Error Correcting Code for the Instruction-Level Temporal Redundancy |
46 | -- | 55 | Chi Guo, Lina Wang, Xiaoying Zhang. Study on Network Vulnerability Identification and Equilibrated Network Immunization Strategy |
56 | -- | 66 | Yu Cheng, Anguo Ma, Minxuan Zhang. Accurate and Simplified Prediction of L2 Cache Vulnerability for Cost-Efficient Soft Error Protection |
67 | -- | 77 | Rabindra Bista, Yong-Ki Kim, Myoung-Seon Song, Jae-Woo Chang. Improving Data Confidentiality and Integrity for Data Aggregation in Wireless Sensor Networks |
78 | -- | 93 | Arnau Vives-Guasch, Magdalena Payeras-Capellà, Macià Mut Puigserver, Jordi Castellà-Roca, Josep Lluís Ferrer-Gomila. A Secure E-Ticketing Scheme for Mobile Devices with Near Field Communication (NFC) That Includes Exculpability and Reusability |
94 | -- | 107 | Bin Dai, Feng Wang, BaoKang Zhao, Jinshu Su. Using Regional Routing to Improve the Scalability and Security of Inter-Domain Multipath Routing |
108 | -- | 116 | Pedro Martinez-Julia, Antonio F. Gómez-Skarmeta, Ved P. Kafle, Masugi Inoue. Secure and Robust Framework for ID/Locator Mapping System |
117 | -- | 125 | Jangseong Kim, Joonsang Baek, Jianying Zhou, Taeshik Shon. An Efficient and Secure Service Discovery Protocol for Ubiquitous Computing Environments |
126 | -- | 133 | Rehana Yasmin, Eike Ritter, Guilin Wang. An Authentication Framework for Wireless Sensor Networks Using Identity-Based Signatures: Implementation and Evaluation |
134 | -- | 142 | Lin Yao, Guowei Wu, Jia Wang, Feng Xia, Chi Lin, Guojun Wang. A Clustering K-Anonymity Scheme for Location Privacy Preservation |
143 | -- | 151 | Yunsang Oh, Hyoungshick Kim, Takashi Obi. Privacy-Enhancing Queries in Personalized Search with Untrusted Service Providers |
152 | -- | 160 | Min Kyoung Sung, Ki Yong Lee, Jun-Bum Shin, Yon Dohn Chung. A Privacy Protection Method for Social Network Data against Content/Degree Attacks |
161 | -- | 168 | Min-Hua Shao, Ying-Chih Chin. A Privacy-Preserving Dynamic ID-Based Remote User Authentication Scheme with Access Control for Multi-Server Environment |
169 | -- | 176 | Marc Domingo-Prieto, Joan Arnedo-Moreno. JXTAnonym: An Anonymity Layer for JXTA Services Messaging |
177 | -- | 180 | Sinjae Lee, Wonjun Lee. The Chain Effect for the Reputation-Based Trust Model in Peer-to-Peer Computing |
181 | -- | 184 | Helena Rifà-Pous, Emmanouil A. Panaousis, Christos Politis. Recipients' Anonymity in Multihop Ad-Hoc Networks |
185 | -- | 187 | Jae Deok Ji, Seok Won Jung, Jongin Lim. Efficient Sequential Architecture of AES CCM for the IEEE 802.16e |
188 | -- | 191 | Eui Jik Kim, Jeongsik In, Sung-Kwan Youm, Chul-Hee Kang. Delay Attack-Resilient Clock Synchronization for Wireless Sensor Networks |
192 | -- | 204 | Ikki Fujiwara, Kento Aida, Isao Ono. Combinatorial Auction-Based Marketplace Mechanism for Cloud Service Reservation |
205 | -- | 214 | Zhengong Cai, Xiaohu Yang, Xinyu Wang, Aleksander J. Kavs. Feature Location in Source Code by Trace-Based Impact Analysis and Information Retrieval |
215 | -- | 229 | Yongyuth Permpoontanalarp, Apichai Changkhanak. On-the-Fly Trace Generation Approach to the Security Analysis of the TMN Protocol with Homomorphic Property: A Petri Nets-Based Method |
230 | -- | 238 | Ryo Nagata, Atsuo Kawai. A Method for Detecting Determiner Errors Designed for the Writing of Non-native Speakers of English |
239 | -- | 246 | Rong-San Lin, Jia-Yu Wang. Efficient Candidate Scheme for Fast Codebook Search in G.723.1 |
247 | -- | 255 | Yoshitaka Inoue, Takamichi Miyata, Yoshinori Sakai. Colorization Based Image Coding by Using Local Correlation between Luminance and Chrominance |
256 | -- | 266 | Sandy Martedi, Hideaki Uchiyama, Guillermo Enriquez, Hideo Saito, Tsutomu Miyashita, Takenori Hara. Foldable Augmented Maps |
267 | -- | 270 | Ying Ma, Guangchun Luo, Hao Chen. Kernel Based Asymmetric Learning for Software Defect Prediction |
271 | -- | 274 | Qian Liu, Chao Lan, Xiao-Yuan Jing, Shi-Qiang Gao, David Zhang, Jing-yu Yang. Sparsity Preserving Embedding with Manifold Learning and Discriminant Analysis |
275 | -- | 279 | Yonggang Huang, Dianfu Ma, Jun Zhang, Yongwang Zhao. QDFA: Query-Dependent Feature Aggregation for Medical Image Retrieval |
280 | -- | 284 | Jose L. Lopez-Martinez, Vitaly Kober. Blind Adaptive Method for Image Restoration Using Microscanning |
285 | -- | 288 | Ping Guo, Zhenjiang Miao, Xiao-Ping Zhang, Zhe Wang. A Fast Sub-Volume Search Method for Human Action Detection |