Abstract is missing.
- Electronic evidence preservation model based on blockchainYu Xiong, Jiang Du. 1-5 [doi]
- Lightweight authentication for MQTT to improve the security of IoT communicationRanbir Singh Bali, Fehmi Jaafar, Pavol Zavarsky. 6-12 [doi]
- Electronic medical record security sharing model based on blockchainSihua Wu, Jiang Du. 13-17 [doi]
- Enhancing MD5 hash algorithm using symmetric key encryptionAman Shakya, Nitesh Karna. 18-22 [doi]
- Applications of machine learning in cryptography: a surveyMohammed M. Alani. 23-27 [doi]
- Auditable zerocoin scheme with user awarenessYihan Jiang, Yong Li, Yan Zhu. 28-32 [doi]
- Multidimensional key RC6 algorithmRommel Evan J. Paje, Ariel M. Sison, Ruji P. Medina. 33-38 [doi]
- DSCA: an inline and adaptive application identification approach in encrypted network trafficZiaeddin Nazari, Morteza Noferesti, Rasool Jalili. 39-43 [doi]
- Enhanced key generation algorithm of hashing message authentication codeEnrique G. Abad, Ariel M. Sison. 44-48 [doi]
- Strengthening fawkescoin against double spending attack using merkle treeWidya Wirachantika, Ari Moesriami Barmawi, Bambang Ari Wahyudi. 49-54 [doi]
- Jumbled passsteps: a hotspot guessing attack resistant graphical password authentication scheme based on the modified passmatrix methodJerome P. Songcuan, Ariel M. Sison. 55-59 [doi]
- Controlled partial image encryption based on LSIC and chaotic mapParameshachari B. D, Kiran, Rashmi P, Supriya M. C, Rajashekarappa, Panduranga H. T. 60-63 [doi]
- An XBOX-based key generation technique for vigenere algorithmDaniel A. Neri, Ruji P. Medina, Ariel M. Sison. 66-70 [doi]
- Privacy in online dating: does it matter?Julia Ostheimer, Sarfraz Iqbal. 71-75 [doi]
- A novel attribute-based access control system for fine-grained privacy protectionHa Xuan Son, Nguyen Minh Hoang. 76-80 [doi]
- Privacy implications of accelerometer data: a review of possible inferencesJacob Leon Kröger, Philip Raschke, Towhidur Rahman Bhuiyan. 81-87 [doi]
- A comparative study on performance of XML parser APIs (DOM and SAX) in parsing efficiencyDayong Wu, Kien Tsong Chau, Jingyi Wang, ChuTing Pan. 88-92 [doi]
- Adaptive optimization based neural network for classification of stuttered speechG. Manjula, M. Shivakumar, Y. V. Geetha. 93-98 [doi]
- An investigation into the attractiveness level of commercial website for visitors: a case study on 66rpg websiteYan Zhang, Kien Tsong Chau, Jingfang Xu, Cuiting Liu. 99-102 [doi]
- Web: a lattice-based access control model for mobile thin client based on web OSesYing Yang, Zheng Song. 103-109 [doi]
- An academic review of current industrial and commercial cyber security social engineering solutionsHussain Aldawood, Geoffrey Skinner. 110-115 [doi]
- A dynamic solution for fine-grained policy conflict resolutionNguyen Minh Hoang, Ha Xuan Son. 116-120 [doi]
- The study of data-oriented and ownership-based security architecture in open internet environmentFang Miao, Wenjie Fan, Wenhui Yang, Yan Xie. 121-129 [doi]
- Security maturity model of web applications for cyber attacksRenato Rojas, Ana Muedas, David Mauricio. 130-137 [doi]
- Recombining TCP sessions based on finite state machine to detect cyber attackersWenchuan Yang, Zishuai Cheng, Baojiang Cui. 138-142 [doi]
- Mobile device management (MDM) technologies, issues and challengesMuhammad Mudassar Yamin, Basel Katt. 143-147 [doi]
- Research on executive control strategy of mimic web defense gatewayShuangxi Chen, Xiahui Xu, Chunming Wu, Xinyue Jiang. 148-152 [doi]
- "FoRent: vehicle forensics for car rental system"Nurul Nadia Che Saufi, Nur Shuhadah Mohd Ab Razak, Hafizah Mansor. 153-157 [doi]
- Security requirement prototyping with hyperledger composer for drug supply chain: a blockchain applicationDara Sinclair, Hossain Shahriar, Chi Zhang. 158-163 [doi]
- Authentication for ID cards based on colour visual cryptography and facial recognitionD. R. Ibrahim, R. Abdullah, J. S. Teh, B. Alsalibi. 164-167 [doi]
- Trust-based identity sharing for token grantsKavindu Dodanduwa, Ishara Kaluthanthri. 168-173 [doi]
- 2D legendre wavelet filter for iris recognition feature extractionDanlami Muktar, Sapiee Jamel, Sofia Najwa Ramli, Mustafa Mat Deris. 174-178 [doi]
- Palm vein recognition based on competitive code and DPLXiyu Wang, Heng-Jian Li, Jian Qiu, Changzhi Yu. 179-183 [doi]
- Improved face image super-resolution with restricted patch-searching areaSuhail Hamdan, Yohei Fukumizu, Tomonori Izumi, Hironori Yamauchi. 184-190 [doi]
- Multiway analysis for face recognitionSuriani Ab Rahman, Marcella Peter, Jacey-Lynn Minoi, Hamimah Ujir. 191-195 [doi]
- Person identification using SURF features of dental radiographGolam Shams Rabbani, Sharmin Sultana, Md. Nazmul Hasan, Salem Quddus Fahad, Jia Uddin. 196-200 [doi]
- Identifying the painter using texture features and machine learning algorithmsMark Jeremy G. Narag, Maricor N. Soriano. 201-205 [doi]
- Dress me up!: content-based clothing image retrievalMas Rina Mustaffa, Goh Sweet Wai, Lili Nurliyana Abdullah, Nurul Amelina Nasharuddin. 206-210 [doi]
- Privacy and protection of medical images ROI using SPLSB and bit-plane based watermarkingCh. Rupa, C. Devi. 211-215 [doi]
- Detection and localization of image tamper with scalable granularityYi Xie, Wenjia Ding, Yulin Wang. 216-219 [doi]
- Estimation of t-score and BMD values from X-ray images for detection of osteoporosisS. M. Nazia Fathima, R. Tamilselvi, M. Parisa Beham. 220-224 [doi]
- An assistive model for visually impaired people using YOLO and MTCNNFerdousi Rahman, Israt Jahan Ritun, Nafisa Farhin, Jia Uddin. 225-230 [doi]
- Graph cut segmentation of the right ventricle in cardiac MRI using multi-scale feature learningXuesong Lu, Xiangan Chen, Wei Li, Yuchuan Qiao. 231-235 [doi]
- Artifact removal in radiological ultrasound images using selective and adaptive median filterAnan Nugroho, Risanuri Hidayat, Hanung Adi Nugroho. 237-241 [doi]
- Improved active contour model for multi-phase MR image segmentation and bias field correctionYunyun Yang, Wenjing Jia, Dongcai Tian. 242-246 [doi]
- Spectral reflectance recovery of various materials based on linear interpolation with nonparametric metameric spectra of extreme pointsen Chen, Tzren-Ru Chou. 247-255 [doi]
- Single image super-resolution using fast sensing blockWeichen Lu, Anyong Qing, Ching Kwang Lee. 256-260 [doi]
- Real walking on a virtual campus: a VR-based multimedia visualization and interaction systemZhen Li, Di Xu, Yanning Zhang. 261-266 [doi]
- Preserving heritage sites using 3D modeling and virtual reality technologySalsabil Ahmed, Raisa Islam, Sadman Shawmik Himalay, Jia Uddin. 267-272 [doi]
- Identifying HID-based attacks through process event graph using guilt-by-association analysisChia-Yu Huang, Hahn-Ming Lee, Jiunn-Chin Wang, Ching-Hao Mao. 273-278 [doi]
- Dead-end free geographic routing protocol for WSNVenkatesh, Ananda Kumar S. 279-283 [doi]
- A comparative study on two XML editors (oxygon and ultraedit)YouXuan Li, Kien Tsong Chau, ZiHan Wei, QiBin Kang. 284-287 [doi]
- Automation of irrigation system through embedded computing technologyShiny Rajendrakumar, V. K. Parvati, Rajashekarappa, Parameshachari B. D. 289-293 [doi]