Abstract is missing.
- Applications of Reversible Data Hiding Techniques with the Quick Response CodesHsiang-Cheh Huang, Feng-Cheng Chang, Wai-Chi Fang. 1-8 [doi]
- A New Approach in T-FA Authentication with OTP Using Mobile PhoneAbdulaziz S. Almazyad, Yasir Ahmad. 9-17 [doi]
- Correlating Alerts into Compressed Graphs Using an Attribute-Based Method and Time WindowsSeyed Hossein Ahmadinejad, Saeed Jalili. 18-25 [doi]
- A Study on Secure Contents Using in Urban ComputingHoon Ko, Jongmyung Choi, Carlos Ramos. 26-34 [doi]
- Shadow Generation Protocol in Linguistic Threshold SchemesMarek R. Ogiela, Urszula Ogiela. 35-42 [doi]
- Analysis of Handwritten Signature ImageDebnath Bhattacharyya, Poulami Das, Samir Kumar Bandyopadhyay, Tai-Hoon Kim. 43-50 [doi]
- The Design of Signature Selection for Protecting Illegal Outflow of Sensitive Information in Mobile DeviceBo-Heung Chung, Min-ho Han, Ki-Young Kim. 51-56 [doi]
- Hardware Based Data Inspection for USB Data Leakage PreventionDongHo Kang, BoHeung Jung, Kiyoung Kim. 57-63 [doi]
- Grayscale Image Classification Using Supervised Chromosome ClusteringDebnath Bhattacharyya, Poulami Das, Samir Kumar Bandyopadhyay, Tai-Hoon Kim. 64-71 [doi]
- Towards the Integration of Security Aspects into System Development Using Collaboration-Oriented ModelsLinda Ariani Gunawan, Peter Herrmann, Frank Alexander Kraemer. 72-85 [doi]
- Impact of Malicious Node on Broadcast SchemesAneel Rahim, Fahad bin Muyaha. 86-92 [doi]
- Hierarchical Identity-Based Identification SchemesJi-Jian Chin, Swee-Huay Heng, Bok-Min Goi. 93-99 [doi]
- The Trend of the Security Research for the Insider Cyber ThreatJaeseung Hong, Jongwung Kim, Jeonghun Cho. 100-107 [doi]
- MIMO Wiretap Channel: A Scalar ApproachMohammad Rakibul Islam, Jinsang Kim. 108-115 [doi]
- Security Testing for Operating System and Its System CallsGaoshou Zhai, Hanhui Niu, Na Yang, Minli Tian, Chengyu Liu, Hengsheng Yang. 116-123 [doi]
- Efficient Group Signature with Forward Secure RevocationHaimin Jin, Duncan S. Wong, Yinlong Xu. 124-131 [doi]
- Detecting Distributed Denial of Service Attack Based on Multi-feature FusionJieren Cheng, Jianping Yin, Yun Liu, Zhiping Cai, Chengkun Wu. 132-139 [doi]
- Researching on Cryptographic Algorithm Recognition Based on Static Characteristic-CodeTie-Ming Liu, Liehui Jiang, Hong-qi He, Ji-zhong Li, Xian Yu. 140-147 [doi]
- Verification of Security-Relevant Behavior Model and Security Policy for Model-Carrying CodeYonglong Wei, Xiaojuan Zheng, Jinglei Ren, Xudong Zheng, Chen Sun, Zhenhao Li. 148-156 [doi]
- Feature Level Fusion of Biometrics Cues: Human Identification with Doddington's CaricatureDakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing. 157-164 [doi]
- A Study on the Interworking for SIP-Based Secure VoIP Communication with Security Protocols in the Heterogeneous NetworkSeokung Yoon, Hyuncheol Jung, Kyung-Seok Lee. 165-175 [doi]
- DDoS Attack Detection Using Three-State Partition Based on Flow InteractionJieren Cheng, Boyun Zhang, Jianping Yin, Yun Liu, Zhiping Cai. 176-184 [doi]
- A Development of Finite State Machine Create Tool for Cryptography Module ValidationJae-goo Jeong, Seung-yong Hur, Gang-Soo Lee. 185-192 [doi]
- A Privacy-Aware System Using Threat-Based Evaluation and Feedback Method in Untrusted Ubiquitous EnvironmentsYuan Tian, Biao Song, Eui-nam Huh. 193-200 [doi]
- Fusion of Multiple Matchers Using SVM for Offline Signature IdentificationDakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing. 201-208 [doi]
- A Two-Factor Mutual Authentication Scheme Using Biometrics and Smart CardSheikh Ziauddin. 209-216 [doi]
- Secure Collection Tree Protocol for Tamper-Resistant Wireless SensorsPeter Pecho, Jan Nagy, Petr Hanácek, Martin Drahanský. 217-224 [doi]
- Accelerometer Based Digital Video Stabilization for Security Surveillance SystemsMartin Drahanský, Filip Orság, Petr Hanácek. 225-233 [doi]
- Escrowed Deniable Identification SchemesPairat Thorncharoensri, Qiong Huang, Willy Susilo, Man Ho Au, Yi Mu, Duncan S. Wong. 234-241 [doi]
- Insights into Malware Detection and Prevention on Mobile PhonesQiang Yan, Yingjiu Li, Tieyan Li, Robert H. Deng. 242-249 [doi]
- Automation of Post-exploitation - (Focused on MS-Windows Targets)Mohammad Tabatabai Irani, Edgar R. Weippl. 250-257 [doi]
- Speaker Dependent Frequency Cepstrum CoefficientsFilip Orság. 258-264 [doi]
- Towards the Detection of Encrypted BitTorrent Traffic through Deep Packet InspectionDavid A. Carvalho, Manuela Pereira, Mário M. Freire. 265-272 [doi]
- A Simple Encryption Scheme for Binary Elliptic CurvesBrian King. 273-280 [doi]
- Analysis of Text Complexity in a Crypto System - A Case Study on TeluguM. S. V. S. Bhadri Raju, B. Vishnu Vardhan, G. A. Naidu, L. Pratap Reddy, A. Vinaya Babu. 281-288 [doi]
- Symmetric-Key Encryption for Wireless Internet SCADARosslin John Robles, Min-Kyu Choi. 289-297 [doi]
- An Efficient Pre-filtering Mechanism for Parallel Intrusion Detection Based on Many-Core GPUChengkun Wu, Jianping Yin, Zhiping Cai, En Zhu, Jieren Cheng. 298-305 [doi]