Abstract is missing.
- Reversible Data Hiding for JPEG Based on EMDWen-Chung Kuo, Shao-Hung Kuo. 1-5 [doi]
- An Efficient Lossless Data Hiding Scheme on VQ Index CodingChin-Feng Lee, Ming-Chi Shih, Cheng-Ta Huang. 6-9 [doi]
- Strong Tamper-Localization, Visual Secret Sharing Scheme Based on Exploiting Modification DirectionChin-Chen Chang, Ngoc-Tu Huynh, Chia-Chun Lin. 10-16 [doi]
- SSL/TLS Status Survey in Japan - Transitioning against the Renegotiation Vulnerability and Short RSA Key Length ProblemY. Suga. 17-24 [doi]
- Proposal of a Secure WEP Operation against Existing Key Recovery Attacks and its EvaluationT. Tsukaune, Yosuke Todo, Masakatu Morii. 25-30 [doi]
- An Analysis of Security Patch Lifecycle Using Google Trend ToolChien-Ting Kuo, He-Ming Ruan, Shih-Jen Chen, Chin-Laung Lei. 31-34 [doi]
- Synthesis of Secure PasswordsT. Sato, H. Kikuchi. 35-37 [doi]
- Mobile Friendly and Highly Efficient Remote User Authenticated Key Agreement Protocol Featuring UntraceabilityChin-Chen Chang, Hai-Duong Le, Ching-Hsiang Chang. 38-43 [doi]
- PDAF: Proactive Distributed Authentication Framework for Regional NetworkRuidong Li, Masaaki Ohnishi, Yasunori Owada, Hiroaki Harai. 44-50 [doi]
- Fast-Refreshing Tree-Based Group Key Agreement for Mobile Ad Hoc NetworksChung-Wei Chen, Shiuh-Jeng Wang, Yuh-Ren Tsai, Hsing-Chung Chen. 51-58 [doi]
- Analysis of an eHealth Care System with Smart Card Based AuthenticationKuo-Hui Yeh, Nai-Wei Lo, Tzong-Chen Wu, Ta-Chi Yang, Horng-Twu Liaw. 59-61 [doi]
- DroidMat: Android Malware Detection through Manifest and API Calls TracingDong-Jie Wu, Ching-Hao Mao, Te-En Wei, Hahn-Ming Lee, Kuo-Ping Wu. 62-69 [doi]
- A Study on Method to Analyze Application on Bada Using GUI without Source CodeHanjae Jeong, Dongho Won. 70-73 [doi]
- Geographical Visualization of Malware Download for Anomaly DetectionN. Hiroguchi, Hiroaki Kikuchi, Khamphao Sisaat, Surin Kittitornkun. 74-78 [doi]
- Multipurpose Network Monitoring Platform Using Dynamic Address AssignmentMasashi Eto, Daisuke Inoue, Mio Suzuki, Koji Nakao. 79-84 [doi]
- Survey on Cloud Data Integrity Proof TechniquesS. G. Worku, Zhong Ting, Zhi-Guang Qin. 85-91 [doi]
- Data Integrity on Remote Storage for On-line Co-workingHe-Ming Ruan, Yu-Shian Chen, Chin-Laung Lei. 92-99 [doi]
- Attack Sequence Detection in Cloud Using Hidden Markov ModelChia-Mei Chen, D. J. Guan, Yu-Zhi Huang, Ya-Hui Ou. 100-103 [doi]
- Flaw and Configuration Analysis of Cloud Component Using First Order LogicR. Ando. 104-108 [doi]