Abstract is missing.
- A Fast Inversion Algorithm and Low-Complexity Architecture over ::::GF::::(2:::::::m:::::::)Sosun Kim, Nam Su Chang, Chang-Han Kim, Young-Ho Park, Jongin Lim. 1-8 [doi]
- An ID-Based Optimistic Fair Signature Exchange Protocol from PairingsChunxiang Gu, Yuefei Zhu, YaJuan Zhang. 9-16 [doi]
- FMS Attack-Resistant WEP Implementation Is Still BrokenToshihiro Ohigashi, Yoshiaki Shiraishi, Masakatu Morii. 17-26 [doi]
- Design of a New Kind of Encryption Kernel Based on RSA AlgorithmPing Dong, Xiangdong Shi, Jiehui Yang. 27-32 [doi]
- On the Security of Condorcet Electronic Voting SchemeYoon Cheol Lee, Hiroshi Doi. 33-42 [doi]
- Special Distribution of the Shortest Linear Recurring Sequences in ::::Z:::: /(::::p::::) FieldQian Yin, Yunlun Luo, Ping Guo. 43-48 [doi]
- Cryptanalysis of a Cellular Automata CryptosystemJingmei Liu, Xiangguo Cheng, Xinmei Wang. 49-54 [doi]
- A New Conceptual Framework Within Information Privacy: Meta PrivacyGeoff Skinner, Song Han, Elizabeth Chang. 55-61 [doi]
- Error Oracle Attacks on Several Modes of OperationFengtong Wen, Wenling Wu, Qiaoyan Wen. 62-67 [doi]
- Stability of the Linear Complexity of the Generalized Self-shrinking SequencesLihua Dong, Yong Zeng, Yupu Hu. 68-73 [doi]
- On the Construction of Some Optimal Polynomial CodesYajing Li, Weihong Chen. 74-79 [doi]
- Perceptual Hashing of Video Content Based on Differential Block SimilarityXuebing Zhou, Martin Schmucker, Christopher L. Brown. 80-85 [doi]
- Secure Software Smartcard Resilient to CaptureSeung Wook Jung, Christoph Ruland. 86-95 [doi]
- Revised Fischlin s (Blind) Signature SchemesKewei Lv. 96-103 [doi]
- Certificateless Threshold Signature SchemesLichen Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian. 104-109 [doi]
- An Efficient Certificateless Signature SchemeM. Choudary Gorantla, Ashutosh Saxena. 110-116 [doi]
- ID-Based Restrictive Partially Blind SignaturesXiaofeng Chen, Fangguo Zhang, Shengli Liu. 117-124 [doi]
- Batch Verification with DSA-Type Digital Signatures for Ubiquitous ComputingSeungWon Lee, Seongje Cho, Jongmoo Choi, Yookun Cho. 125-130 [doi]
- On Anonymity of Group SignaturesSujing Zhou, Dongdai Lin. 131-136 [doi]
- The Running-Mode Analysis of Two-Party Optimistic Fair Exchange ProtocolsYuqing Zhang, Zhiling Wang, Bo Yang. 137-142 [doi]
- Password-Based Group Key Exchange Secure Against Insider Guessing AttacksJin Wook Byun, Dong-Hoon Lee, Jongin Lim. 143-148 [doi]
- On the Security of Some Password-Based Key Agreement SchemesQiang Tang, Chris J. Mitchell. 149-154 [doi]
- A New Group Rekeying Method in Secure MulticastYong Xu, Yuxiang Sun. 155-160 [doi]
- Pairing-Based Provable Blind Signature Scheme Without Random OraclesJian Liao, Yinghao Qi, Peiwei Huang, Mentian Rong. 161-166 [doi]
- Efficient ID-Based Proxy Signature and Proxy Signcryption Form Bilinear PairingsQin Wang, Zhenfu Cao. 167-172 [doi]
- An Identity-Based Threshold Signcryption Scheme with Semantic SecurityChanggen Peng, Xiang Li. 173-179 [doi]
- A Token-Based Single Sign-On ProtocolLi Hui, Shen Ting. 180-185 [doi]
- Simple Threshold RSA Signature Scheme Based on Simple Secret SharingShaohua Tang. 186-191 [doi]
- Efficient Compilers for Authenticated Group Key ExchangeQiang Tang, Chris J. Mitchell. 192-197 [doi]
- Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple KeysLihua Wang, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto. 198-203 [doi]
- An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc NetworksKi-Won Yeom, Ji-Hyung Park. 204-211 [doi]
- A New User-Habit Based Approach for Early Warning of WormsPing Wang, Binxing Fang, Xiao-chun Yun. 212-219 [doi]
- A Multi-gigabit Virus Detection Algorithm Using Ternary CAMIl-Seop Song, Youngseok Lee, Taeck-Geun Kwon. 220-227 [doi]
- Sampling Distance Analysis of Gigantic Data Mining for Intrusion Detection SystemsYong Zeng, Jianfeng Ma. 228-235 [doi]
- Hardware-Software Hybrid Packet Processing for Intrusion Detection SystemsSaraswathi Sachidananda, Srividya Gopalan, Sridhar Varadarajan. 236-243 [doi]
- D-S Evidence Theory and Its Data Fusion Application in Intrusion DetectionJunfeng Tian, Weidong Zhao, Ruizhong Du. 244-251 [doi]
- A New Network Anomaly Detection Technique Based on Per-Flow and Per-Service StatisticsYuji Waizumi, Daisuke Kudo, Nei Kato, Yoshiaki Nemoto. 252-259 [doi]
- ::::SoIDPS::::: Sensor Objects-Based Intrusion Detection and Prevention System and Its ImplementationSeongje Cho, Hyeyoung Chang, HongGeun Kim, WoongChul Choi. 260-266 [doi]
- A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated ServicesMing Li, Wei Zhao. 267-272 [doi]
- Tamper Detection for Ubiquitous RFID-Enabled Supply ChainVidyasagar Potdar, Chen Wu, Elizabeth Chang. 273-278 [doi]
- Measuring the Histogram Feature Vector for Anomaly Network TrafficWei Yan. 279-284 [doi]
- Efficient Small Face Detection in Surveillance Images Using Major Color Component and LDA SchemeKyunghwan Baek, Heejun Jang, Youngjun Han, Hernsoo Hahn. 285-290 [doi]
- Fast Motion Detection Based on Accumulative Optical Flow and Double Background ModelJin Zheng, Bo Li, Bing Zhou, Wei Li. 291-296 [doi]
- Reducing Worm Detection Time and False Alarm in Virus ThrottlingJangbok Kim, Jaehong Shim, Gihyun Jung, Kyunghee Choi. 297-302 [doi]
- Protection Against Format String Attacks by Binary RewritingJin Ho You, Seong Chae Seo, Young Dae Kim, Jun Yong Choi, Sang-Jun Lee, Byung Ki Kim. 303-308 [doi]
- Masquerade Detection System Based on Principal Component Analysis and Radial Basics FunctionZhanchun Li, Zhitang Li, Yao Li, Bin Liu. 309-314 [doi]
- Anomaly Detection Method Based on HMMs Using System Call and Call Stack InformationCheng Zhang, Qinke Peng. 315-321 [doi]
- Parallel Optimization Technology for Backbone Network Intrusion Detection SystemXiaojuan Sun, Xinliang Zhou, Ninghui Sun, Mingyu Chen. 322-327 [doi]
- Attack Scenario Construction Based on Rule and Fuzzy ClusteringLinru Ma, Lin Yang, Jianxin Wang. 328-333 [doi]
- A CBR Engine Adapting to IDSLingjuan Li, Wenyu Tang, Ruchuan Wang. 334-339 [doi]
- Application of Fuzzy Logic for Distributed Intrusion DetectionHee Suk Seo, Tae Ho Cho. 340-347 [doi]
- Dynamic Access Control for Pervasive Grid ApplicationsSyed Naqvi, Michel Riguidel. 348-355 [doi]
- On the Security of the Canetti-Krawczyk ModelXinghua Li, Jianfeng Ma, Sang-Jae Moon. 356-363 [doi]
- A Novel Architecture for Detecting and Defending Against Flooding-Based DDoS AttacksYi Shi, Xinyu Yang. 364-374 [doi]
- A Variant of Poly1305 MAC and Its Security ProofDayin Wang, Dongdai Lin, Wenling Wu. 375-380 [doi]
- Covert Channel Identification Founded on Information Flow AnalysisJianjun Shen, Sihan Qing, Qingni Shen, LiPing Li. 381-387 [doi]
- Real-Time Risk Assessment with Network Sensors and Intrusion Detection SystemsAndré Årnes, Karin Sallhammar, Kjetil Haslum, Tønnes Brekne, Marie Elisabeth Gaup Moe, Svein J. Knapskog. 388-397 [doi]
- Design and Implementation of a Parallel Crypto ServerXiaofeng Rong, Xiaojuan Gao, Ruidan Su, Lihua Zhou. 398-406 [doi]
- Survivability Computation of Networked Information SystemsXuegang Lin, RongSheng Xu, Miaoliang Zhu. 407-414 [doi]
- Assessment of Windows System Security Using Vulnerability Relationship GraphYongzheng Zhang, Binxing Fang, Yue Chi, Xiao-chun Yun. 415-420 [doi]
- A New (::::t::::, ::::n::::)-Threshold Multi-secret Sharing SchemeHui-Xian Li, Chun-Tian Cheng, Liao-Jun Pang. 421-426 [doi]
- An Efficient Message Broadcast Authentication Scheme for Sensor NetworksSang Ho Park, Taekyoung Kwon. 427-432 [doi]
- Digital Image Authentication Based on Error-Correction CodesFan Zhang, Xinhong Zhang, Zhiguo Chen. 433-438 [doi]
- Design and Implementation of Efficient Cipher Engine for IEEE 802.11i Compatible with IEEE 802.11n and IEEE 802.11eDuhyun Bae, Gwanyeon Kim, Jiho Kim, Sehyun Park, Ohyoung Song. 439-444 [doi]
- Secure Delegation-by-Warrant ID-Based Proxy Signcryption SchemeShanshan Duan, Zhenfu Cao, Yuan Zhou. 445-450 [doi]
- Building Security Requirements Using State Transition Diagram at Security Threat LocationSeong Chae Seo, Jin Ho You, Young Dae Kim, Jun Yong Choi, Sang-Jun Lee, Byung Ki Kim. 451-456 [doi]
- Study on Security iSCSI Based on SSHWeiping Liu, Wandong Cai. 457-462 [doi]
- A Scheduling Algorithm Based on a Trust Mechanism in GridKenli Li, Yan He, Renfa Li, Tao Yang. 463-468 [doi]
- Enhanced Security and Privacy Mechanism of RFID Service for Pervasive Mobile DeviceByungil Lee, Howon Kim. 469-475 [doi]
- Worm Propagation Modeling and Analysis on NetworkYunkai Zhang, Fangwei Wang, Changguang Wang, Jianfeng Ma. 476-481 [doi]
- An Extensible AAA Infrastructure for IPv6Hong Zhang, Hai-Xin Duan, Wu Liu, Jianping Wu. 482-487 [doi]
- The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11iFan Zhang, Jianfeng Ma, Sang-Jae Moon. 488-493 [doi]
- A Noble Key Pre-distribution Scheme with LU Matrix for Secure Wireless Sensor NetworksChang-Won Park, Sung Jin Choi, Hee Yong Youn. 494-499 [doi]
- A Virtual Bridge Certificate Authority ModelHaibo Tian, Xi Sun, YuMin Wang. 500-507 [doi]
- Weak Signals in Information Security ManagementJorma Kajava, Reijo Savola, Rauno Varonen. 508-517 [doi]
- PDTM: A Policy-Driven Trust Management Framework in Distributed SystemsWu Liu, Hai-Xin Duan, Jianping Wu, Xing Li. 518-525 [doi]
- Methodology of Quantitative Risk Assessment for Information System SecurityMengquan Lin, Qiangmin Wang, Jianhua Li. 526-531 [doi]
- A Secure and Efficient (::::t::::, ::::n::::) Threshold Verifiable Multi-secret Sharing SchemeMei-juan Huang, Jian-zhong Zhang, Shu-cui Xie. 532-537 [doi]
- Improvement on an Optimized Protocol for Mobile Network Authentication and SecurityChin-Chen Chang, Jung-San Lee. 538-541 [doi]
- Neural Network Based Flow Forecast and DiagnosisQian-Mu Li, Man-Wu Xu, Hong Zhang, Fengyu Liu. 542-547 [doi]
- Protecting Personal Data with Various Granularities: A Logic-Based Access Control ApproachBat-Odon Purevjii, Masayoshi Aritsugi, Sayaka Imai, Yoshinari Kanamori, Cherri M. Pancake. 548-553 [doi]
- Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way FunctionHui-Feng Huang, Chin-Chen Chang. 554-559 [doi]
- Topology-Based Macroscopical Response and Control Technology for Network Security EventHui He, Mingzeng Hu, Weizhe Zhang, Hongli Zhang, Zhi Yang. 560-566 [doi]
- Adaptive Hiding Scheme Based on VQ-Indices Using Commutable CodewordsChin-Chen Chang, Chia-Chen Lin, Jun-Bin Yeh. 567-572 [doi]
- Reversible Data Hiding for Image Based on Histogram Modification of Wavelet CoefficientsXiaoping Liang, Xiaoyun Wu, Jiwu Huang. 573-580 [doi]
- An Image Steganography Using Pixel CharacteristicsYoung-Ran Park, Hyun-Ho Kang, Sanguk Shin, Ki-Ryong Kwon. 581-588 [doi]
- Alternatives for Multimedia Messaging System SteganographyKonstantinos Papapanagiotou, Emmanouel Kellinis, Giannis F. Marias, Panagiotis Georgiadis. 589-596 [doi]
- Error Concealment for Video Transmission Based on WatermarkingShuai Wan, Yilin Chang, Fuzheng Yang. 597-604 [doi]
- Applying the AES and Its Extended Versions in a General Framework for Hiding Information in Digital ImagesTran Minh Triet, Duong Anh Duc. 605-610 [doi]
- An Image Hiding Algorithm Based on Bit PlaneBin Liu, Zhitang Li, Zhanchun Li. 611-616 [doi]
- A Blind Audio Watermarking Algorithm Robust Against Synchronization AttackXiangyang Wang, Hong Zhao. 617-622 [doi]
- Semi-fragile Watermarking Algorithm for Detection and Localization of Temper Using Hybrid Watermarking Method in MPEG-2 VideoHyun-Mi Kim, Ik-Hwan Cho, A-Young Cho, Dong-Seok Jeong. 623-628 [doi]
- Public Watermarking Scheme Based on Multiresolution Representation and Double Hilbert ScanningZhiqiang Yao, Liping Chen, Rihong Pan, Boxian Zou, Licong Chen. 629-634 [doi]
- Performance Evaluation of Watermarking Techniques for Secure Multimodal Biometric SystemsDaesung Moon, Taehae Kim, Seunghwan Jung, Yongwha Chung, Kiyoung Moon, Dosung Ahn, Sang-Kyoon Kim. 635-642 [doi]
- An Improvement of Auto-correlation Based Video Watermarking Scheme Using Independent Component AnalysisSeong-Whan Kim, HyunSung Sung. 643-648 [doi]
- A Digital Watermarking Technique Based on Wavelet PackagesChen Xu, Weiqiang Zhang, Francis R. Austin. 649-654 [doi]
- A Spectral Images Digital Watermarking AlgorithmLong Ma, Changjun Li, Shuni Song. 655-660 [doi]
- Restoration in Secure Text Document Image Authentication Using Erasable WatermarksNiladri B. Puhan, Anthony T. S. Ho. 661-668 [doi]
- The Study of RED Algorithm Used Multicast Router Based Buffer ManagementWon-Hyuck Choi, Doo-Hyun Kim, Kwang-Jae Lee, Jung-Sun Kim. 669-678 [doi]
- Genetic Algorithm Utilized in Cost-Reduction Driven Web Service SelectionLei Cao, Jian Cao, Minglu Li. 679-686 [doi]
- MacroOS: A Pervasive Computing Platform Supporting Context Awareness and Context ManagementXiaohua Luo, Kougen Zheng, Zhaohui Wu, Yunhe Pan. 687-694 [doi]
- A Frame for Selecting Replicated Multicast Servers Using Genetic AlgorithmQin Liu, Chanle Wu. 695-702 [doi]
- On a Novel Methodology for Estimating Available Bandwidth Along Network PathsShaohe Lv, Jianping Yin, Zhiping Cai, Chi Liu. 703-710 [doi]
- A New AQM Algorithm for Enhancing Internet Capability Against Unresponsive FlowsLiyuan Zhao, Keqin Liu, Jun Zheng. 711-718 [doi]
- Client Server Access: Wired vs. Wireless LEO Satellite-ATM Connectivity; A (MS-Ro-BAC) ExperimentTerry C. House. 719-724 [doi]
- An Algorithm for Automatic Inference of Referential Integrities During Translation from Relational Database to XML SchemaJinhyung Kim, Dongwon Jeong, Doo-Kwon Baik. 725-730 [doi]
- A Fuzzy Integral Method to Merge Search Engine Results on WebShuning Cui, Boqin Feng. 731-736 [doi]
- The Next Generation PARLAY X with QoS/QoESungjune Hong, Sunyoung Han. 737-742 [doi]
- A Design of Platform for QoS-Guaranteed Multimedia Services Provisioning on IP-Based Convergence NetworkSeong-Woo Kim, Young-Chul Jung, Young-Tak Kim. 743-748 [doi]
- Introduction of Knowledge Management System for Technical Support in Construction IndustriesTai Sik Lee, Dong-Wook Lee, Jeong Hyun Kim. 749-756 [doi]
- An Event Correlation Approach Based on the Combination of IHU and CodebookQiuhua Zheng, Yuntao Qian. 757-763 [doi]
- Face Recognition Based on Support Vector Machine Fusion and Wavelet TransformBicheng Li, Hujun Yin. 764-771 [doi]
- A Dynamic Face and Fingerprint Fusion System for Identity AuthenticationJun Zhou, Guangda Su, Yafeng Deng, Kai Meng, Congcong Li. 772-779 [doi]
- Image Recognition for Security Verification Using Real-Time Joint Transform Correlation with Scanning TechniqueKyu B. Doh, Jungho Ohn, Ting-C Poon. 780-787 [doi]
- Binarized Revocable Biometrics in Face RecognitionYing-Han Pang, Andrew Teoh Beng Jin, David Ngo Chek Ling. 788-795 [doi]
- Short Critical Area Computational Method Using Mathematical MorphologyJunping Wang, Yue Hao. 796-803 [doi]
- A Robust Lane Detection Approach Based on MAP Estimate and Particle Swarm OptimizationYong Zhou, Xiaofeng Hu, Qingtai Ye. 804-811 [doi]
- MFCC and SVM Based Recognition of Chinese VowelsFuhai Li, Jinwen Ma, Dezhi Huang. 812-819 [doi]
- A Spatial/Frequency Hybrid Vector Quantizer Based on a Classification in the DCT DomainZhe-Ming Lu, Hui Pei, Hans Burkhardt. 820-825 [doi]
- Removing of Metal Highlight Spots Based on Total Variation Inpainting with Multi-sources-flashingJi Bai, Lizhuang Ma, Li Yao, Tingting Yao, Ying Zhang. 826-831 [doi]
- Component-Based Online Learning for Face Detection and VerificationKyoung-Mi Lee. 832-837 [doi]
- SPIHT Algorithm Based on Fast Lifting Wavelet Transform in Image CompressionWenbing Fan, Jing Chen, Jina Zhen. 838-844 [doi]
- Modified EZW Coding for Stereo ResidualHan-Suh Koo, Chang-Sung Jeong. 845-850 [doi]
- Optimal Prototype Filters for Near-Perfect-Reconstruction Cosine-Modulated Filter BanksXuemei Xie, Guangming Shi, Xuyang Chen. 851-856 [doi]
- Fast Motion Estimation Scheme for Real Time Multimedia Streaming with H.264Chan Lim, Hyun Soo Kang, Tae-Yong Kim. 857-862 [doi]
- Motion-Compensated 3D Wavelet Video Coding Based on Adaptive Temporal Lifting Filter ImplementationGuiguang Ding, Qionghai Dai, Wenli Xu. 863-868 [doi]
- Accurate Contouring Technique for Object Boundary Extraction in Stereoscopic ImageriesShin-Hyoung Kim, Jong-Whan Jang, Seung Phil Lee, Jae-Ho Choi 0002. 869-874 [doi]
- Robust Object Tracking Based on Uncertainty Factorization Subspace Constraints Optical FlowYunshu Hou, Yanning Zhang, Rongchun Zhao. 875-880 [doi]
- Bearings-Only Target Tracking Using Node Selection Based on an Accelerated Ant Colony OptimizationBenlian Xu, Zhiquan Wang. 881-886 [doi]
- Image Classification and Delineation of FragmentsWeixing Wang. 887-892 [doi]
- A Novel Wavelet Image Coding Based on Non-uniform Scalar QuantizationGuoyou Wang, Wentao Wang. 893-898 [doi]
- A General Image Based Nematode Identification System DesignBai-Tao Zhou, Won Nah, Kang Woong Lee, Joong-Hwan Baek. 899-904 [doi]
- A Novel SVD-Based RLS Blind Adaptive Multiuser Detector for CDMA SystemsLing Zhang, Xianda Zhang. 905-910 [doi]
- New Electronic Digital Image Stabilization Algorithm in Wavelet Transform DomainJung-Youp Suk, Gun Woo Lee, Kuhn-Il Lee. 911-916 [doi]
- Line Segments and Dominate Points Detection Based on Hough TransformZ. W. Liao, S. X. Hu, T. Z. Huang. 917-922 [doi]
- The Study of the Auto Color Image SegmentationJian Zhuang, Haifeng Du, Jinhua Zhang, Sunan Wang. 923-928 [doi]
- Regularized Image Restoration by Means of Fusion for Digital Auto FocusingVivek Maik, Jeongho Shin, Joon Ki Paik. 929-934 [doi]
- Fast Ray-Space Interpolation Based on Occlusion Analysis and Feature Points DetectionGangyi Jiang, Liangzhong Fan, Mei Yu, Rangding Wang, Xien Ye, Yong-Deak Kim. 935-940 [doi]
- Non-parametric ICA Algorithm for Hybrid Sources Based on GKNN EstimationFasong Wang, Hongwei Li, Rui Li, Shaoquan Yu. 941-946 [doi]
- SUSAN Window Based Cost Calculation for Fast Stereo MatchingKyu-Yeol Chae, Won-Pyo Dong, Chang-Sung Jeong. 947-952 [doi]
- An Efficient Adaptive De-blocking AlgorithmZhiliang Xu, Shengli Xie, Youjun Xiang. 953-958 [doi]
- Facial Features Location by Analytic Boosted Cascade DetectorLei Wang, Beiji Zou, Jiaguang Sun. 959-964 [doi]
- New Approach for Segmentation and Pattern Recognition of Jacquard ImagesZhilin Feng, Jianwei Yin, Zhaoyang He, Wuheng Zuo, Jinxiang Dong. 965-970 [doi]
- Nonstationarity of Network Traffic Within Multi-scale Burstiness ConstraintJinwu Wei, Jiangxing Wu. 971-976 [doi]
- Principle of Image Encrypting Algorithm Based on Magic Cube TransformationLi Zhang, Shiming Ji, Yi Xie, Qiaoling Yuan, Yuehua Wan, Guanjun Bao. 977-982 [doi]
- A Study on Motion Prediction and Coding for In-Band Motion Compensated Temporal FilteringDongDong Zhang, Wenjun Zhang, Li Song, Hongkai Xiong. 983-988 [doi]
- Adaptive Sampling for Monte Carlo Global Illumination Using Tsallis EntropyQing Xu, Shiqiang Bao, Rui Zhang, Ruijuan Hu, Mateu Sbert. 989-994 [doi]
- Incremental Fuzzy Decision Tree-Based Network Forensic SystemZaiqiang Liu, Dengguo Feng. 995-1002 [doi]
- Robust Reliable Control for a Class of Fuzzy Dynamic Systems with Time-Varying DelayYouqing Wang, Donghua Zhou. 1003-1010 [doi]
- Using Concept Taxonomies for Effective Tree InductionHong Yan Yi, Beatriz de la Iglesia, Victor J. Rayward-Smith. 1011-1016 [doi]
- A Similarity-Based Recommendation Filtering Algorithm for Establishing Reputation-Based Trust in Peer-to-Peer Electronic CommunitiesJingtao Li, Yinan Jing, Peng Fu, Gendu Zhang, Yongqiang Chen. 1017-1024 [doi]
- Automatic Classification of Korean Traditional Music Using Robust Multi-feature ClusteringKyu-Sik Park, Youn-Ho Cho, Sang-Hun Oh. 1025-1029 [doi]
- A Private and Efficient Mobile Payment ProtocolChangjie Wang, Ho-Fung Leung. 1030-1035 [doi]
- Universal Designated-Verifier Proxy Blind Signatures for E-CommerceTianjie Cao, Dongdai Lin, Rui Xue. 1036-1041 [doi]
- An Efficient Control Method for Elevator Group Control SystemUlvi Dagdelen, Aytekin Bagis, Dervis Karaboga. 1042-1047 [doi]
- Next Generation Military Communication Systems ArchitectureQijian Xu, Naitong Zhang, Jie Zhang, Yu Sun. 1048-1053 [doi]
- Early Warning for Network WormsAntti Tikkanen, Teemupekka Virtanen. 1054-1059 [doi]
- Skeleton Representation of Character Based on Multiscale ApproachXinhua You, Bin Fang, Xinge You, Zhenyu He, Dan Zhang, Yuan Yan Tang. 1060-1067 [doi]
- Channel Equalization Based on Two Weights Neural NetworkWenming Cao, Wanfang Chai, Shoujue Wang. 1068-1073 [doi]
- Assessment of Uncertainty in Mineral Prospectivity Prediction Using Interval Neutrosophic SetPawalai Kraipeerapun, Chun Che Fung, Warick Brown. 1074-1079 [doi]
- Ring-Based Anonymous Fingerprinting SchemeQiang Lei, Zhengtao Jiang, YuMin Wang. 1080-1085 [doi]
- Scalable and Robust Fingerprinting Scheme Using Statistically Secure Extension of Anti-collusion CodeJae-Min Seol, Seong-Whan Kim. 1086-1091 [doi]
- Broadcast Encryption Using Identity-Based Public-Key CryptosystemXixiang Lv, Bo Yang. 1092-1097 [doi]
- Multimedia Digital Right Management Using Selective Scrambling for Mobile HandsetGoo-Rak Kwon, Tea-Young Lee, Kyoung-Ho Kim, Jae-Do Jin, Sung Jea Ko. 1098-1103 [doi]
- Design and Implementation of Crypto Co-processor and Its Application to Security SystemsHowon Kim, Mun-Kyu Lee, Dong Kyue Kim, Sang-Kyoon Chung, Kyoil Chung. 1104-1109 [doi]
- Continuous Speech Research Based on HyperSausage NeuronWenming Cao, Jianqing Li, Shoujue Wang. 1110-1115 [doi]
- Variable-Rate Channel Coding for Space-Time Coded MIMO SystemChangcai Han, Dongfeng Yuan. 1116-1121 [doi]
- A New Watermarking Method Based on DWTXiang-chu Feng, Yongdong Yang. 1122-1126 [doi]
- Efficient Point Rendering Method Using Sequential Level-of-DetailDaniel Kang, Byeong-Seok Shin. 1127-1133 [doi]
- Construction of a Class of Compactly Supported Biorthogonal Multiple Vector-Valued WaveletsTongqi Zhang, Qingjiang Chen. 1134-1139 [doi]
- Metabolic Visualization and Intelligent Shape Analysis of the HippocampusYoo-Joo Choi, Jeong-Sik Kim, Min-Jeong Kim, Soo-Mi Choi, Myoung-Hee Kim. 1140-1148 [doi]
- Characteristic Classification and Correlation Analysis of Source-Level Vulnerabilities in the Linux KernelKwangsun Ko, Insook Jang, Yong-hyeog Kang, Jinseok Lee, Young Ik Eom. 1149-1156 [doi]