1 | -- | 8 | Alaa Eddien Abdallah, Emad Eddien Abdallah, Mohammad Bsoul, Ahmad Al-Khasawneh, Lina Amer. A blind 3D watermarking technique using spherical coordinates and skewness measure |
9 | -- | 19 | Bhawana Rudra, O. P. Vyas. Understanding and mitigating security and authentication issues in service oriented network architecture |
20 | -- | 31 | Rajiv Bagai, Bin Tang, Ahsan A. Khan, Abdus Samad. A system-wide anonymity metric with message multiplicities |
32 | -- | 41 | Arshi Agrawal, Mark Stamp. Masquerade detection on GUI-based Windows systems |
42 | -- | 47 | Alex Ming Hui Wong, Dae-Ki Kang. Game layout and artificial intelligence implementation in mobile 3D tower defence game |
48 | -- | 55 | Jongdeug Kim, Taehyun Jeon. Efficient resource allocation for mobile instant messaging service in wireless network |
56 | -- | 63 | Ki-Young Lee, Aleum Kim, Ye Eun Jeon, Jeong-Joon Kim, Yong Soon Im, Gyoo Seok Choi, Sang-bong Park, Yun Sik Lim, Jeong Jin Kang. Spatio-temporal XACML: the expansion of XACML for access control |