Abstract is missing.
- Formalising Security in Ubiquitous and Cloud ScenariosChiara Bodei, Pierpaolo Degano, Gian Luigi Ferrari, Letterio Galletta, Gianluca Mezzetti. 1-29 [doi]
- Designing Smart Cities: Security IssuesYoung-Im Cho. 30-40 [doi]
- Certificate-Based Encryption Scheme with General Access StructureTomasz Hyla, Jerzy Pejas. 41-55 [doi]
- Security Margin Evaluation of SHA-3 Contest Finalists through SAT-Based AttacksEkawat Homsirikamol, Pawel Morawiecki, Marcin Rogawski, Marian Srebrny. 56-67 [doi]
- Usage Control Model Specification in XACML Policy Language - XACML Policy Engine of UCONUm-e-Ghazia, Rahat Masood, Muhammad Awais Shibli, Muhammad Bilal. 68-79 [doi]
- TIDS: Trust-Based Intrusion Detection System for Wireless Ad-hoc NetworksNovarun Deb, Nabendu Chaki. 80-91 [doi]
- Intruder Data Classification Using GM-SOMPetr Gajdos, Pavel Moravec. 92-100 [doi]
- Method for Identification of Suitable Persons in Collaborators' NetworksPavla Drázdilová, Alisa Babskova, Jan Martinovic, Katerina Slaninová, Stepan Minks. 101-110 [doi]
- A Graph-Based Formalism for Controlling Access to a Digital Library OntologySubhasis Dasgupta, Aditya Bagchi. 111-122 [doi]
- Role Approach in Access Control Development with the Usage Control ConceptAneta Poniszewska-Maranda. 123-134 [doi]
- A New Algorithm for Rotation Detection in Iris Pattern RecognitionKrzysztof Misztal, Jacek Tabor, Khalid Saeed. 135-145 [doi]
- Outlier Removal in 2D Leap Frog AlgorithmRyszard Kozera, Jacek Tchórzewski. 146-157 [doi]
- Dynamic Signature Recognition Based on Modified Windows TechniqueRafal Doroz, Krzysztof Wrobel. 158-167 [doi]
- Rigid and Non-rigid Shape Matching for Mechanical Components RetrievalAndrea Albarelli, Filippo Bergamasco, Andrea Torsello. 168-179 [doi]
- Embedding of the Extended Euclidean Distance into Pattern Recognition with Higher-Order Singular Value Decomposition of Prototype TensorsBoguslaw Cyganek. 180-190 [doi]
- DTW and Voting-Based Lip Print Recognition SystemPiotr Porwik, Tomasz Orczyk. 191-202 [doi]
- Advances in the Keystroke Dynamics: The Practical Impact of Database QualityMariusz Rybnik, Piotr Panasiuk, Khalid Saeed, Marcin Rogowski. 203-214 [doi]
- Advanced Intracardial Biosignal ProcessingMarek Penhaker, Petr Klimes, Jakub Pindor, David Korpas. 215-223 [doi]
- Multi-constraints Face Detect-Track SystemHazar Mliki, Mohamed Hammami, Hanêne Ben-Abdallah. 224-235 [doi]
- Using a Differential Pressure Sensor as SpirometerMartin Augustynek, Ondrej Adamec, David Micanik. 236-241 [doi]
- Hybrid Negative Selection Approach for Anomaly DetectionAndrzej Chmielewski, Slawomir T. Wierzchon. 242-253 [doi]
- Spectral Clustering Based on k-Nearest Neighbor GraphMalgorzata Lucinska, Slawomir T. Wierzchon. 254-265 [doi]
- A New Scale for Attribute Dependency in Large Database SystemsSoumya Sen, Anjan Dutta 0002, Agostino Cortesi, Nabendu Chaki. 266-277 [doi]
- Left-Right Oscillate Algorithm for Community Detection Used in E-Learning SystemJan Martinovic, Pavla Drázdilová, Katerina Slaninová, Tomás Kocyan, Václav Snásel. 278-289 [doi]
- Plan and Goal Structure Reconstruction: An Automated and Incremental Method Based on Observation of a Single AgentBartlomiej Józef Dzienkowski, Urszula Markowska-Kaczmar. 290-301 [doi]
- On Spectral Partitioning of Co-authorship NetworksVáclav Snásel, Pavel Krömer, Jan Platos, Milos Kudelka, Zdenek Horak. 302-313 [doi]
- An Efficient Binary Playfair Algorithm Using a 4×4 Playfair Key MatrixSaswati Mukherjee, Matangini Chattopadhyay, Ayan Lahiri, Samiran Chattopadhyay. 314-325 [doi]
- Tuning of a Knowledge-Driven Harmonization Model for Tonal MusicMariusz Rybnik, Wladyslaw Homenda. 326-337 [doi]
- Efficient Processing the Braille Music NotationTomasz Sitarek, Wladyslaw Homenda. 338-350 [doi]
- ETSeM: A Energy-Aware, Trust-Based, Selective Multi-path Routing ProtocolManali Chakraborty, Nabendu Chaki. 351-360 [doi]
- Weighted Energy Efficient Cluster Based Routing for Wireless Sensor NetworksSoumyabrata Saha, Rituparna Chaki. 361-373 [doi]
- A Business Process Modeling Notation Extension for Risk HandlingBartosz Marcinkowski, Michal Kuciapski. 374-381 [doi]
- Modeling Consumer Decision Making Process with Triangular NormsAgnieszka Jastrzebska, Wladyslaw Homenda. 382-394 [doi]
- Neural Network Modeling of a Flexible Manipulator RobotRahma Boucetta, Mohamed Naceur Abdelkrim. 395-404 [doi]
- P Systems for Traffic Flow SimulationJiri Dvorský, Zbynek Janoska, Lukás Vojácek. 405-415 [doi]
- Using Extended Raster File for Real Time Traffic Information MiningMichal Radecký, Jan Martinovic, Dusan Fedorcák, Radek Tomis, Ivo Vondrák. 416-427 [doi]
- A Comparative Study of Risk Assessment Methods, MEHARI & CRAMM with a New Formal Model of Risk Assessment (FoMRA) in Information SystemsImed El Fray. 428-442 [doi]