Abstract is missing.
- A SDKEY-Based Secure Storage and Transmission Approach for Android PhoneLicui Ma, Meihong Li, Lun Li, Ye Du, Dawei Zhang. 1-6 [doi]
- Random Characteristics for LSR, RC4, and Logistic Stream CipherHuijuan Xiao, Chengliang Deng. 7-9 [doi]
- A Robust Collaborative Threshold Authenticated Encryption Scheme Based on Message BlockingZhen Chen, Wenfang Zhang, Xiaomin Wang. 10-13 [doi]
- An Efficient Trusted Mobile Router Selection Mechanism for Multihomed NEMO NetworkShuaishuai Tan, Xiaoping Li, Qingkuan Dong. 14-18 [doi]
- A Multilayer Evolutionary Homomorphic Encryption Approach for Privacy Preserving over Big DataAmine Rahmani, Abdelmalek Amine, Reda Mohamed Hamou. 19-26 [doi]
- A Robust Collaborative Threshold Authenticated Encryption Scheme Based on Message BlockingZhen Chen, Wenfang Zhang, Xiaomin Wang. 27-30 [doi]
- Automated Intrusion Response System Algorithm with Danger TheoryLing-Xi Peng, Tian-Wei Chen. 31-34 [doi]
- Exponential Optimal Synchronization of Chaotic Cryptosystems: Neural-Network-Based ApproachFeng-Hsiag Hsiao, Kai-Ping Hsieh, Zhe-Hao Lin. 35-42 [doi]
- A Heuristic Method of Attack Graph Analysis for Network Security HardeningChao Zhao, Huiqiang Wang, Fangfang Guo, Mo Zhou, Yushu Zhang. 43-47 [doi]
- Shell-Based Block Ciphering Structure (SBCS) for AES Parallelism with Feedback-Data ModeYi-Nan Lin, Kuo-Tsang Huang. 48-55 [doi]
- Positive Selection-Inspired Anomaly Detection Model with Artificial ImmuneLing-Xi Peng, Yue-Feng Chen. 56-59 [doi]
- DBSCAN Clustering Algorithm Applied to Identify Suspicious Financial TransactionsYan Yang, Bin Lian, Chen Chen, Pu Li. 60-65 [doi]
- Generating Repudiable, Memorizable, and Privacy Preserving Security Questions Using the Propp Theory of NarrativeLei Pan, Shaun Bangay. 66-72 [doi]
- A Provable Secure Mutual RFID Authentication Protocol Based on Error-Correct CodeZehui Li, Ruoqing Zhang, Yatao Yang, Zichen Li. 73-78 [doi]
- Optimized MHealth Batch Verification for a Variant of DSAAngolo Shem Mbandu, Chunxiang Xu, Kamenyi Domenic Mutiria. 79-86 [doi]
- An Identity Authentication Scheme for Opportunistic Network Based on Multidimensional ScalingXiaomei Cao, Ying Yin. 87-93 [doi]
- Dummy Based Privacy Preservation in Continuous Querying Road Network ServicesYankson Herbert Gustav, Xiao Wu, Yan Ren, Yong Wang, Fengli Zhang. 94-101 [doi]
- EAC: A Framework of Authentication Property for the IOTsLicai Liu, Lihua Yin, Yunchuan Guo, Bingxing Fang. 102-105 [doi]
- A Privacy Preserving Group Recommender Based on Cooperative PerturbationZhifeng Luo, Zhanli Chen. 106-111 [doi]
- A New Architecture of Ajax Web Application Security Crawler with Finite-State MachineHuiyao An, Yang Song, Tao Yu, Hui Li, Peng Zhang, Jun Zha. 112-117 [doi]
- Attacking Random Keypads through Click Timing AnalysisCharles Fleming, Ning Cui, Dawei Liu, Haining Liang. 118-121 [doi]
- Performance Measurement of Decision Tree Excluding Insignificant Leaf NodesHae Sook Jeon, Won Don Lee. 122-127 [doi]
- A Data Processing Algorithm in EPC Internet of ThingsHuiqun Zhao, Chuancong Huang. 128-131 [doi]
- A Collaborative Traceback against P2P Botnet Using Information Sharing and Correlation AnalysisXiaolei Wang, Jie He, Yuexiang Yang. 132-138 [doi]
- The Security for Power Internet of Things: Framework, Policies, and CountermeasuresYiying Zhang, Weifu Zou, Xi Chen, Chengyue Yang, Jinping Cao. 139-142 [doi]
- Optimization of Communication in MPI-Based ClustersRashid Hassani, Ganesh Chavan, Peter Luksch 0001. 143-149 [doi]
- Ownership Management in the Context of the Internet of ThingsXuefei Leng, Keith Mayes, Yuanhung Lien. 150-153 [doi]
- The Key Algorithms of Promoter Data Parallel Processing Based on OpenMPYan Shi, Jun Lu, Xinyi Shi, Jinliang Zheng, Jun Li. 154-157 [doi]
- Data Clustering with Cluster Size Constraints Using a Modified K-Means AlgorithmNuwan Ganganath, Chi-Tsun Cheng, Chi K. Tse. 158-161 [doi]
- Big Data Processing with Probabilistic Latent Semantic Analysis on MapReduceYong Zhao, Yao Chen, Zhao Liang, Shuangshuang Yuan, Youfu Li. 162-166 [doi]
- Partitioner: A Distributed HDFS Metadata Server ClusterRuini Xue, Lixiang Ao, Shengli Gao, Zhongyang Guan, Lupeng Lian. 167-174 [doi]
- Transplantation of Data Mining Algorithms to Cloud Computing Platform When Dealing Big DataYong Wang, Ya-Wei Zhao. 175-178 [doi]
- Application of Data Mining Techniques in Universal DesignFangyan Zhang, Hao Liang. 179-182 [doi]
- Characterizing Patterns of Chinese Yiban Blogging ServiceJian Wang, Xiaolin Xu, Xiumei Wu, Xiaoming Hu, Yinchun Yang. 183-186 [doi]
- Class Imbalance Oriented Logistic RegressionYadong Dong, Huaping Guo, Weimei Zhi, Ming Fan. 187-192 [doi]
- Latent Semantic Analysis for Mining Rules in Big Data EnvironmentKyung Tae Kim, Woo Sik Seol, Ung-Mo Kim, Hee Yong Youn. 193-200 [doi]
- Hadoop Preemptive Deadline Constraint SchedulerIhsan Ullah, Jihyeon Choi, Yonjoong Ryou, Manyun Kim, Hee Yong Youn. 201-208 [doi]
- Refining LDA Results and Ranking Topics in Order of Quantity and Quality with an Application to Twitter Streaming DataIwao Fujino. 209-216 [doi]
- A Data Delivery Scheme Based on Sink Centrality for Delay Tolerant Mobile Sensor NetworksPuning Zhang, Yuan an Liu, Fan Wu, Bihua Tang, Hongguang Zhang, Wenhao Fan. 217-222 [doi]
- Top-N Frequent Itemsets Mining Algorithm Based on Greedy MethodMing Hu, Huan Cui, Hong-Mei Wang, Xin-Jing Zhang. 223-228 [doi]
- The Overtime Waiting Model for Web Server Performance EvaluationLijun Zhang, Qiuyu Zhu. 229-232 [doi]
- ParaSAIL: Bitmap Indexing Using Many CoresTao Zhong, Kshitij A. Doshi, Gang Deng. 233-240 [doi]
- A Distributed Redis Framework for Use in the UCWWZhanlin Ji, Ivan Ganchev, Mairtin O'Droma, Tiefan Ding. 241-244 [doi]
- A Smart Phone Healthcare Monitoring System for Oxygen Saturation and Heart RateDongjian Fang, Jicheng Hu, Xiaofeng Wei, Heng Shao, Yongen Luo. 245-247 [doi]
- SPDML: Graphical Modeling Language for Executable Architecture of SystemsJianpeng Hu, Linpeng Huang, Bei Cao, Xuling Chang. 248-255 [doi]
- Semantic-Based Publish/Subscribe for M2MMário Luis Pinto Antunes, Diogo Gomes, Rui L. Aguiar. 256-263 [doi]
- Pairing-Based Anonymous Boardroom Voting SchemeLong-Hai Li, Cheng-Qiang Huang, Shao-Feng Fu. 264-268 [doi]
- Forward Analysis of Timed Automata with Action Durations: Theory and ImplementationSouad Guellati, Ilham Kitouni, Riadh Matmat, Djamel-Eddine Saïdouni. 269-276 [doi]
- Configuration and Optimization for Virtualization Based Large-Scale IP Networks EmulationDawei Li. 277-281 [doi]
- Motif Recognition Parallel Algorithm Based on GPUJinliang Zheng, Jun Lu, Xinyi Shi, Yan Shi, Ruiqing Jing. 282-285 [doi]
- Effect of Embedding Way on Printed Watermarking Image by LithographyYong Xie, Yi Yuan, Haihu Tan, Juanjuan Wang. 286-289 [doi]
- A Study on the Use Contexts of Personal Computing Devices Using a Diary Study MethodJimin Kim, Younghoon Chang, Siew Fan Wong, Myeong-Cheol Park. 290-296 [doi]
- An Extension to Hub Algorithm Based on Triangular LoopXiongtao Ma, Chongming Bao, Lei Li, Lihua Zhou, Bing Kong. 297-303 [doi]
- Road Danger Estimation for Winter Road ManagementPavel Moiseets, Yuzuru Tanaka. 304-311 [doi]
- An Empirical Study on Consumer Acceptance of Mobile Payment Based on the Perceived Risk and TrustMingxing Shao, Jing Fan, Yafang Li. 312-317 [doi]
- A Push-Notification Service for Use in the UCWWZhanlin Ji, Ivan Ganchev, Mairtin O'Droma, Qingjuan Zhao. 318-322 [doi]
- A Sleep Scheduling Algorithm for Target Tracking in Energy Harvesting Sensor NetworksQian Zeng, Hongbin Chen, Feng Zhao, Xiaohuan Li. 323-330 [doi]
- A New Multipath Grid-Based Geographic Routing Protocol for Underwater Wireless Sensor NetworksFaiza Al-Salti, Nasser Alzeidi, Bassel R. Arafeh. 331-336 [doi]
- Energy Efficient Virtual MIMO for Cognitive Radio Sensor NetworksKancheng Lin, Hongjiang Si, Lin Kang, Xiuhua Li, Yinghai Zhang. 337-342 [doi]
- Decision Fusion Using Three-Level Censoring Scheme in Sensor Networks under Rician Fading ChannelsShoujun Liu, Kezhong Liu, Wei Chen. 343-348 [doi]
- Advancement of a Sensor Aided Smart Grid Node ArchitectureMarkus Duchon, Pragya Kirti Gupta, Dagmar Koss, Denis Bytschkow, Bernhard Schätz, Sebastian Wilzbach. 349-356 [doi]
- Simulation-Based Coverage Optimization for the Nearest Closer Protocol in Wireless Sensor NetworksNing Cao, Russell Higgs, Gregory M. P. O'Hare. 357-360 [doi]
- Fan-Shaped Clustering for Large-Scale Sensor NetworksHai Lin, Ping Chen, Lusheng Wang. 361-364 [doi]
- The Application of the Sensor Model Language in Sensor Observation Service of the HeiHe Experimental ResearchDongze Song, Wanming Luo, Ting Liu, Baoping Yan. 365-371 [doi]
- Spatio-temporal Event Detection: A Hierarchy Based Approach for Wireless Sensor NetworkXianfeng Pei, Xianda Chen, Kyung Tae Kim, Seung-Wan Kim, Hee Yong Youn. 372-379 [doi]
- A CPW-Fed Triple-Band Planar Monopole Antenna for Internet of Things ApplicationsYang Yang, Yuanan Liu. 380-383 [doi]
- A k-Means-Based Formation Algorithm for the Delay-Aware Data Collection Network StructurePat-Yam Tsoi, Chi-Tsun Cheng, Nuwan Ganganath. 384-388 [doi]
- Analysis of CSMA/CA in Narrowband Power Line Communication SystemWenjing Liu, Yanxin Yan. 389-394 [doi]
- A Performance Study of Zig Bee Broadcasts in Coexistence with Wi-FiZhizhong Zhang, Peiliang Dong, Jun Yao, Koen Holtman. 395-399 [doi]
- A High Efficient Common IPC for LTE Layer1 Multi-core DSP/SoC SystemHao Xiang, Xiaogen Jiang, Qunfeng Shang. 400-405 [doi]
- Efficient and Prompt Handover in LTE-Based Systems by Predicting the Target eNodeBsXianda Chen, Min-jae Kim, Sang Hyun Yoo, Na Young Park, Hee Yong Youn. 406-413 [doi]
- An Analysis of Different TCP Variants in Cognitive Radio NetworksRam Narayan Yadav, Rajiv Misra. 414-419 [doi]
- The Research of Pattern Synthesis of Linear Antenna Array Based on Seeker Optimization AlgorithmBing Wang, Chao Liu, Huaning Wu. 420-424 [doi]
- Low Power VCO and Mixer for Computing Miracast and Mobile Bluetooth ApplicationsWen Cheng Lai, Jhin-Fang Huang, Change-Ming Hsu, Pi-Gi Yang. 425-428 [doi]
- Machine Learning to Data Fusion Approach for Cooperative Spectrum SensingAhmed Mohammed Mikaeil, Bin Guo, Zhijun Wang. 429-434 [doi]
- An Approach for Optimal Two-Dimensional Independent Antenna Electrical AdjustmentJianfeng Du, Zhiwei Li. 435-440 [doi]
- Spectrum Allocation in Cognitive Radio - Quantum Immune Clonal Based ApproachJie Li, Yuxi Liu, Qiyue Li, Lusheng Wang. 441-447 [doi]
- A Configuration Compression Approach for Coarse-Grain Reconfigurable Architecture for Radar Signal ProcessingBo Liu, Wan-Yu Zhu, Yang Liu, Peng Cao. 448-453 [doi]
- Channel Availability Analysis for Sensing Order Selection in CRNs with Correlated ChannelsNingning Jiang, Junbo Hua. 454-457 [doi]
- FPGA Design and Implementation of MIMO Decoder for 1 Gbps Wireless LANRuyue Dong, Guixia Kang, Xiaoshuang Liu, YunCheng Liu. 458-463 [doi]
- Energy Efficient Spectrum Access for Cognitive Radio Sensor NetworksKancheng Lin, Hongjiang Si, Lin Kang, Xiuhua Li, Yinghai Zhang. 464-469 [doi]
- Resource Reallocation of Virtual Machine in Cloud Computing with MCDM AlgorithmByung Jun Lee, Kyung Hwan Oh, Hee-Jung Park, Ung-Mo Kim, Hee Yong Youn. 470-477 [doi]
- Joint Cooperative MAC and Network Coding for Two-way Relaying NetworksYubo Li, Yang Xie, Min Peng, Qing F. Zhou, Shengli Zhang. 478-482 [doi]