Abstract is missing.
- Highly Flexible and Extensible Storage Scheme for Virtualization Platforms under Cloud ComputingDi Lu, Jianfeng Ma, Yichuan Wang, Ning Xi. 1-8 [doi]
- V-MLR: A Multilevel Security Model for VirtualizationHui Zhu, Yingfang Xue, Yun Zhang, Xiaofeng Chen 0001, Hui Li, Ximeng Liu. 9-16 [doi]
- RangeTree: A Feature Selection Algorithm for C4.5 Decision TreeHui Zhu, Siyu Chen, Lexiang Zhu, Hui Li, Xiaofeng Chen. 17-22 [doi]
- An Adaptive Feedback Load Balancing Algorithm in HDFSKai Fan, Dayang Zhang, Hui Li, Yintang Yang. 23-29 [doi]
- Secure Obfuscation of Conditional Re-encryption with Keyword SearchRong Cheng, Fangguo Zhang. 30-37 [doi]
- FDR-ABE: Attribute-Based Encryption with Flexible and Direct RevocationYinghui Zhang, Xiaofeng Chen, Jin Li, Hui Li, FengHua Li. 38-45 [doi]
- Key Policy Attribute-Based Proxy Re-encryption with Matrix Access StructureKeying Li, Yinghui Zhang, Hua Ma. 46-50 [doi]
- Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access ControlXimeng Liu, Jianfeng Ma, Jinbo Xiong, Qi Li, Jun Ma. 51-57 [doi]
- Simulation of the Adaptive Multivariate Exploration for Routes GuidanceWalisa Romsaiyud. 58-63 [doi]
- Prediction of Multi-class Industrial DataJan Platos, Pavel Krömer. 64-68 [doi]
- Content Based Spam Text Classification: An Empirical Comparison between English and ChineseLiumei Zhang, Jianfeng Ma, Yichuan Wang. 69-76 [doi]
- Performance Evaluation of WMN-GA for Wireless Mesh Networks Considering Mobile Mesh ClientsTetsuya Oda, Shinji Sakamoto, Evjola Spaho, Makoto Ikeda, Fatos Xhafa, Leonard Barolli. 77-84 [doi]
- Game Optimization for Time-Critical Multicast Data Origin Authentication: Trade Off between Security and EfficiencyYichuan Wang, Jianfeng Ma, Di Lu, Liumei Zhang, Xiang Lu. 85-92 [doi]
- An Efficient Proof of Retrievability with Public Auditing in Cloud ComputingJin Li, Xiao Tan, Xiaofeng Chen 0001, Duncan S. Wong. 93-98 [doi]
- Secure Cloud File System with Attribute Based EncryptionShuaishuai Zhu, Xiaoyuan Yang 0002, Xuguang Wu. 99-102 [doi]
- Security Analysis of Gagne et al.'s Threshold Attribute-Based Signcryption SchemeChang-ji Wang, Jia-Sen Huang, Wen-long Lin, Hai-Tao Lin. 103-108 [doi]
- Public Key Encryption with Ranked Multi-keyword SearchChengyu Hu, Pengtao Liu. 109-113 [doi]
- An Efficient Pretopological Approach for Document ClusteringThanh Van Le, Trong Nghia Truong, Hong Nam Nguyen, Tran Vu Pham. 114-120 [doi]
- Towards the Modeling of Atomic and Molecular Clusters Energy by Support Vector RegressionAle Vitek, Martin Stachon, Pavel Krömer, Václav Snásel. 121-126 [doi]
- The Contextual Group RecommendationJing Wang, Hui Li, Hui Zhao. 127-131 [doi]
- Latent Dirichlet Allocation Based Semantic Clustering of Heterogeneous Deep Web SourcesUmara Noor, Ali Daud, Ayesha Manzoor. 132-138 [doi]
- Design of a Security Framework on MapReduceZhen Guo, Xudong Zhu, Lijun Guo, Si Kang. 139-145 [doi]
- Deceptive Detection and Security Reinforcement in Grid ComputingJianhua Yu, Yue Luo, Xueli Wang. 146-152 [doi]
- An Auditing Mechanism for the Security of Service in GridZhusong Liu, Sheng Sun, Yunfa Li. 153-156 [doi]
- An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data CommunicationsArcangelo Castiglione, Alfredo De Santis, Aniello Castiglione, Francesco Palmieri, Ugo Fiore. 157-165 [doi]
- Research on Polymorphism in Digital Text WatermarkingYuanyuan Cheng, Jin Zhang, Xiaowei Liu, Qingcheng Li, Zhenlu Chen. 166-172 [doi]
- Efficient Data Integrity Verification Using Attribute Based Multi-signature Scheme in Wireless NetworkXimeng Liu, Tao Zhang, Jianfeng Ma, Hui Zhu, Feng Cai. 173-180 [doi]
- Towards Designing Privacy-Preserving Signature-Based IDS as a Service: A Study and PracticeYuxin Meng, Wenjuan Li, Lam-for Kwok, Yang Xiang. 181-188 [doi]
- Short-Term Network Traffic Prediction with ACD and Particle FilterGaoyu Zhang, Duying Huang. 189-191 [doi]
- Information Entropy Model for Anonymity MeasurementJun Ye, Yong Ding, Xin-Guo Li. 192-195 [doi]
- Randomness and Chaos in Genetic Algorithms and Differential EvolutionPavel Krömer, Václav Snásel, Ivan Zelinka. 196-201 [doi]
- Wavelet Packet Variance Methods for Multi-period Analysis of SignalRuhua Cai. 202-206 [doi]
- Numerical Approach for Automatic Theorem Proving in Plane GeometrySiwen Guo. 207-209 [doi]
- RGTE: A Reputation-Based Global Trust Establishment in VANETsXiaoqing Li, Jicheng Liu, Xuejun Li, Weiying Sun. 210-214 [doi]
- GRTR: A Geocasting Routing Based Target Region for VANETXiaoqing Li, Weiying Sun, Xuejun Li, Jicheng Liu. 215-219 [doi]
- Fully Secure Decentralized Key-Policy Attribute-Based EncryptionQi Li, Jianfeng Ma, Jinbo Xiong, Tao Zhang, Ximeng Liu. 220-225 [doi]
- On Design of Nonlinear Operations and Round Functions of Block Ciphers with Resistance to ASCAsMing Tang, Weijin Sun, Si Gao, Yuan Wu, Hongbo Peng, Zhenlong Qiu, Xin Wang. 226-232 [doi]
- Efficient Client-to-Client Password Authenticated Key Exchange Based on RSAChuangui Ma, Fushan Wei, Fengxiu Gao. 233-238 [doi]
- A Secure Document Self-Destruction Scheme with Identity Based EncryptionJinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu, Qi Li. 239-243 [doi]
- Network Layout Visualization Based on Sammon's ProjectionMartin Radvanský, Milos Kudelka, Zdenek Horak, Václav Snásel. 244-249 [doi]
- Local Dependency in NetworksSarka Zehnalova, Zdenek Horak, Milos Kudelka, Václav Snásel. 250-254 [doi]
- Research of Space Robot Autonomous Operation ArchitectureHang Yin, Yongming Gao, Guoqiang Zeng, Chao Wang. 255-260 [doi]
- A Combined Predictor for Item-Based Collaborative FilteringZhonghuo Wu, Jun Zheng, Su Wang, Hongfeng Feng. 261-265 [doi]
- Context and the Virtual Campus: Collaboration in Tertiary EducationPhilip Moore, Andrew Thomas, Fatos Xhafa, Leonard Barolli. 266-272 [doi]
- A Social Semantic Repository for Special Needs EducationVincenza Benigno, Nicola Capuano, Giuseppina Rita Mangione, Saverio Salerno. 273-280 [doi]
- Building Intelligent Emotion Awareness for Improving Collaborative E-LearningThanasis Daradoumis, Marta Arguedas, Fatos Xhafa. 281-288 [doi]
- Providing Information Security to MOOC: Towards Effective Student AuthenticationJorge Miguel, Santi Caballé, Josep Prieto. 289-292 [doi]
- Analysis of P2P Communications in Online Collaborative Teamwork SettingsVladi Kolici, Fatos Xhafa, Leonard Barolli. 293-299 [doi]
- University Network-Design Based on Cloud ComputingHe Xueni. 300-303 [doi]
- On Obfuscating Set-Membership Predicate FunctionsRong Cheng, Feng Diao, Fangguo Zhang. 304-308 [doi]
- Fair Computation with Tit-for-Tat StrategyYilei Wang, Qiuliang Xu, Zhe Liu. 309-314 [doi]
- Improved Efficient Priority-and-Activity-Based QoS MAC ProtocolXiaoyu Li, Nan Chen, Changhua Zhu, Changxing Pei. 315-318 [doi]
- On Security Model of One-Round Authenticated Key ExchangeHaibo Tian. 319-322 [doi]
- Private Set Intersection via Public Key Encryption with Multiple Keywords SearchZhiyi Shao, Bo Yang 0003, Yong Yu. 323-328 [doi]
- A New Privacy-Preserving Broadcast Encryption Scheme from DPVSHao Wang, Zhihua Zheng, Yilei Wang. 329-334 [doi]
- IDPKC-to-TPKC Construction of Multi-receiver SigncryptionXiaotong Fu, Xiaowei Li, Wen Liu. 335-339 [doi]
- Efficient Algorithm for Detecting Firewall Rule ConflictYan Xu, Zhaoxia Wei, Qingrong Tang. 340-343 [doi]
- The Research on Algorithm for Congestion Control Based on Video TransmissionHao Yujie, Fang Wei. 344-347 [doi]
- Impact of Channel Estimation Error on Time Division Broadcast Protocol in Bidirectional Relaying SystemsMingying Wu, Jing Li, Jianhua Ge, Chensi Zhang, Florin Pop. 348-352 [doi]
- Guaranteed QoS Resource Scheduling Scheme Based on Improved Electromagnetism-Like Mechanism Algorithm in Cloud EnvironmentShang Yun. 353-357 [doi]
- Privacy-Preserving Cooperative Downloading for Value-Added Services in VANETsWujun Zhang, Shunrong Jiang, Xiaoyan Zhu, YuMin Wang. 358-362 [doi]
- Revocable Identity-Based Signature without PairingYinxia Sun, Futai Zhang, Limin Shen, Robert H. Deng. 363-365 [doi]
- Fixing the Sender-Equivocable Encryption Scheme in Eurocrypt 2010Zhengan Huang, Shengli Liu, Baodong Qin, Kefei Chen. 366-372 [doi]
- Application of Evolutionary Neural Network in Infrared Nondestructive TestZi-jun Wang, Jing-Min Dai, Zhao-Xuan Zhu. 373-375 [doi]
- Cloud Model-Based Multi-objective Estimation of Distribution Algorithm with Preference Order RankingYing Gao, Waixi Liu. 376-379 [doi]
- BDI Goal Recognition for Agent Program LearningHongyun Xu, Youqun Shi, Qiying Cao. 380-387 [doi]
- A New Construction of Proxy Signature Using Chameleon Hash FunctionYannan Li, Qi Xia, Jianbing Ni, Yong Yu. 388-391 [doi]
- General Certificateless Strong Designated Verifier Signature SchemesHaibo Tian. 392-397 [doi]
- Efficient Implementation of Tate Pairing with Montgomery Ladder MethodYulong Tian, Dawu Gu, Haihua Gu. 398-402 [doi]
- Blind Signature Scheme Based on Quartic ResiduesJianhua Yu, Kun Wang, Pingzhi Yuan, Xueli Wang. 403-407 [doi]
- A Similarity Measure for the Description Logic EL with Unfoldable TerminologiesBoontawee Suntisrivaraporn. 408-413 [doi]
- ProNet Framework: Network Management Using Semantics and CollaborationLuciana Pereira Oliveira, Djamel Fawzi Hadj Sadok. 414-421 [doi]
- Towards Software Infrastructure for the Systematic Virtualization of Collaborative Learning SessionsDavid Ganan Jimenez, Santi Caballé, Jordi Conesa. 422-429 [doi]
- Yet Another Way to Construct Digital Signature in the Standard ModelJindan Zhang, Xu an Wang. 430-433 [doi]
- New Construction of PVPKE Scheme Based on Signed Quadratic ResiduesJindan Zhang, Xu an Wang. 434-437 [doi]
- Efficient Predicate Encryption Supporting Construction of Fine-Grained Searchable EncryptionMinqing Zhang, Xu an Wang, Xiaoyuan Yang 0002, Weiyi Cai. 438-442 [doi]
- Constructing Connected Dominating Set Based on Crossed Cube in WSNJing Zhang, Li Xu, Shu-Ming Zhou, Wei Wu. 443-447 [doi]
- A Delay Sensitive Time Slots Scheduling in Vehicular Sensor NetworksChen Chen, Xiaolu Wei, Yanan Jin, Shengjin Ge. 448-455 [doi]
- Methods for Determining the Restoration Order of Base Nodes in the Virtual Segment NetworkHiroshi Tsuji, Akihiro Fujihara, Hiroyoshi Miwa. 456-461 [doi]
- Efficient Data Gathering in Intermittent Connected Mobile Sensor NetworksYongping Xiong, Shizhong Wu, Tao Zhang, Yubo Deng, Shiwu Chen. 462-469 [doi]
- A Secure and Efficient E-Cheque Protocol from Chameleon Hash FunctionYing Sun, Jiwen Chai, Huihui Liang, Jianbing Ni, Yong Yu. 470-475 [doi]
- Research on the Degeneration Problem of Key Sequence Based on ChaosJing-jing Wang, Ping Wei, Jia-Yong Chen. 476-479 [doi]
- Secure Multi-party Confidential Protocol of Matrix FactorizationHaiyan Xiao, Xiaoyuan Yang. 480-484 [doi]
- ID-Based Signcryption with Restrictive UnsigncryptionFei Tang, Changlu Lin, Hongda Li. 485-489 [doi]
- Ternary Method in Elliptic Curve Scalar MultiplicationNing Zhang, Xiaotong Fu. 490-494 [doi]
- Leakage-Resilient Proxy SignaturesFei Tang, Hongda Li, Qihua Niu, Bei Liang. 495-502 [doi]
- A Server-Aided Aggregate Verification Signature Scheme from Bilinear PairingHuai Wu, Chunxiang Xu, Jiang Deng. 503-506 [doi]
- Elliptic Curve Scalar Multiplication Based on Fibonacci NumberNing Zhang, Shichong Tan. 507-510 [doi]
- Proactive Secret Sharing without a Trusted PartyXiuqun Wang, Changlu Lin, Yong Li 0002. 511-515 [doi]
- Fault and Intrusion Tolerance of Complex Networks: A Controllability ViewYuehua Zhou, Yong Zeng, Zhihong Liu, Nan Li, Jianfeng Ma, Lihua Dong. 516-520 [doi]
- Fully Secure Attribute-Based Encryption with Non-monotonic Access StructuresXiaoyuan Yang, Weidong Du, Xuan Wang, Liqiang Wang. 521-527 [doi]
- Dynamic Trust Threshold Value Based on Market Theory in Cognitive Radio NetworksQing-Qi Pei, Conglin Wang, Zi Li. 528-534 [doi]
- RLWE-Based Homomorphic Encryption and Private Information RetrievalWei Zhang, Shuguang Liu, Xiaoyuan Yang. 535-540 [doi]
- A Secure Cloud Storage System from Threshold EncryptionChuan Yao, Li Xu, Xinyi Huang. 541-545 [doi]
- Outsourcing of Verifiable Composite Modular ExponentiationsJie Liu, Bo Yang 0002, Zhiguo Du. 546-551 [doi]
- A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext SecurityKaitai Liang, Liming Fang, Willy Susilo, Duncan S. Wong. 552-559 [doi]
- Anonymous Single Sign-On Schemes Transformed from Group SignaturesJingquan Wang, Guilin Wang, Willy Susilo. 560-567 [doi]
- Lattice-Based Multi-party Concurrent Signatures SchemeShangping Wang, Lihua Liu, Juanjuan Chen, Jin Sun, Xinwen Zhang, Yaling Zhang. 568-572 [doi]
- Attribute-Based Signatures with Efficient RevocationYanling Lian, Li Xu, Xinyi Huang. 573-577 [doi]
- Post-quantum Strongly Unforgeable Identity-Based Signature Scheme from Lattices without Random OraclesZhenhua Liu, Xiangsong Zhang, Tsuyoshi Takagi. 578-585 [doi]
- Public Verifiable Key Encapsulation Mechanism under FactoringZhen Liu, Xiaoyuan Yang. 586-590 [doi]
- Provably-Secure Certificateless Proxy Re-signature SchemeHaiyan Xiao, Minqing Zhang. 591-594 [doi]
- Research on Cloud Computing Based Data Processing for Financial Terminal EquipmentZhizhao Zhou. 595-598 [doi]
- Intelligent Network Course Platform Based on AgentYangjing Zhong, Xiangyang Li. 599-601 [doi]
- The Permanent Magnet Synchronous Linear Motor Position Control Based on Fuzzy Neural NetworkCailin Li, Dongmei Wang. 602-606 [doi]
- Low-Complexity Resource Allocation in Rate-Constrained OFDMA Downlink SystemsXiao-Mao Chen, Ou Yang Shan. 607-610 [doi]
- Design of Array Signal Processing System Based on TMS320C6678Xiangyang Li. 611-616 [doi]
- An Approach for Regression Test Case Selection Using Object Dependency GraphAdipat Larprattanakul, Taratip Suwannasart. 617-621 [doi]
- Optimal Design of the Joint Network LDPC Codes for Half-Duplex Cooperative Multi-access Relay ChannelJingyi Wang, Shuling Che, Ying Li, Junlong Wang. 622-625 [doi]
- Distributed SR-LDPC Codes over Multiple-Access Relay ChannelRong Sun, Jingwei Liu. 626-628 [doi]
- Research on Optimization for Cooperative Spectrum Sensing Based on Double Threshold Energy DetectionHuiqin Liu, Shubin Wang, Fei Li, Shaowen Zhan. 629-632 [doi]
- An Ultrahigh Speed AES Processor Method Based on FPGAXin Cai, Rong Sun, Jingwei Liu. 633-636 [doi]
- An Efficient and Lightweight Certificateless Authentication Protocol for Wireless Body Area NetworksLu Zhang, Jingwei Liu, Rong Sun. 637-639 [doi]
- Linear Complexity of Binary Generalized Cyclotomic Sequences of Order 6 over ZpqTongjiang Yan, Yanyan Liu. 640-644 [doi]
- A New Polyphase Generalized Sequence of Length pq and Its Linear ComplexityTongjiang Yan, Pan Xu. 645-648 [doi]
- (t, n) Threshold Digital Signature Scheme with Traceable Signers against Conspiracy AttacksLin-Sen Zhao, Jing-Mei Liu. 649-651 [doi]
- Lagrange Interpolation Attack against 6 Rounds of Rijndael-128Jingmei Liu, Shaopeng Chen, Linsen Zhao. 652-655 [doi]
- Empirical Analysis and Evolution Modeling of Network Topological Structure in MicroblogWeiguo Yuan, Yun Liu. 656-661 [doi]
- Visualization of Large Graphs Using GPU ComputingToma Jeowicz, Milos Kudelka, Jan Platos, Václav Snásel. 662-667 [doi]
- Evolution of Scale-Freeness in a Co-authorship NetworkPavel Krömer, Milos Kudelka, Zdenek Horak, Václav Snásel. 668-672 [doi]
- A Color Digital Watermarking in Nonsampled Contourlet Domain Using Generic AlgorithmPeng Luo, Ping Wei, Yi-Qun Liu. 673-676 [doi]
- Toward Construction of PVPKE in the Standard Model Based on Factoring AssumptionXu an Wang, Jinting Nie, Yi Ding, Junru Hu. 677-680 [doi]
- An Improved Secure Unidirectional Proxy Re-encryption SchemePing Wei, Shuaishuai Zhu. 681-684 [doi]
- Texture Image Denoising Algorithm Based on Structure Tensor and Total VariationCaixia Li, Chanjuan Liu, Yilei Wang. 685-690 [doi]
- A Learning-Based Framework for Image Segmentation EvaluationJian Lin, Bo Peng, Tianrui Li, Qin Chen. 691-696 [doi]
- Face Recognition Based on Shearlets Transform and Principle Component AnalysisZhiyong Zeng, Jianqiang Hu. 697-701 [doi]
- Moving Object Tracking and 3D Measurement Using Two PTZ CamerasGuang Zheng, Shunichiro Oe, Zengguo Sun. 702-707 [doi]
- A Hybrid Encryption Scheme for Scalable Video Coding Based on H.264Jianlong Zhang, Xinbao Gao. 708-711 [doi]
- A Real-Time Template Generation Algorithm to Identify RMB Crest NumberGaoyu Zhang, Yingying Wang. 712-715 [doi]
- Tensor Missing Value Recovery with Tucker Thresholding MethodJunxiu Zhou, Shigang Liu, Guoyong Qiu, Fengmin Zhang, Jiancheng Sun. 716-720 [doi]
- A Spatially Varying Mean and Variance Active Contour ModelYali Peng, Shigang Liu, Hong Fan, Jiamei Gao, Jiancheng Sun. 721-725 [doi]
- Pedestrian Classification Based on Improved Support Vector MachinesHongmin Xue, Zhijing Liu. 726-730 [doi]
- Fast 3D Ear Recognition Based on Local Surface Matching and ICP RegistrationHeng Liu. 731-735 [doi]
- Image Decomposition Using Bregman-GTV and Meyer's G-NormChengwu Lu, Daoqing Zhou. 736-740 [doi]
- Facial Emotion Recognition Using PHOG and a Hierarchical Expression ModelZhao Zhong, Gang Shen, Wenhu Chen. 741-746 [doi]
- Design and Implementation of Android Contacts Synchronization System Based on the SyncML ProtocolHao Yujie, Yan Chao. 747-750 [doi]
- Creation of Customer Evaluation Model in the Catering Industry Supply Chain EcosystemKai Wei, Juanqiong Gou, Rui Chai, Wei Dai. 751-756 [doi]
- A Collective Knowledge System for Business Partner Co-operationMatteo Gaeta, Francesco Orciuoli, Pierluigi Ritrovato, Giuseppe D'Aniello, Alfonso De Vivo. 757-762 [doi]
- Framework for Real-Time Process Modeling of Supply ChainsPaul Moynihan, Wei Dai. 763-768 [doi]
- On Three-Dimensional Digital Earth Application Development Framework and Its ApplicationsZenghui Zhao, Jingnong Weng, Huaizhou Wang, Junyi Zhao, Jingui Li, Anda Li. 769-774 [doi]
- An Improved Database Inspection System for E-commerce Companies Based on Web Data MiningFuzhi Chu, Runtong Zhang, Rongqian Ni, Wei Dai. 775-779 [doi]
- Finding Key Leakage in Hierarchical Distribution of Encrypted DataHua Deng, Bo Qin, RuiYing Du, Huanguo Zhang, Lina Wang, Jianwei Liu, Jian Mao. 780-785 [doi]
- An Effective Fuzzy Keyword Search Scheme in Cloud ComputingTuo He, Wenping Ma. 786-789 [doi]
- BaitAlarm: Detecting Phishing Sites Using Similarity in Fundamental Visual FeaturesJian Mao, Pei Li, Kun Li, Tao Wei, Zhenkai Liang. 790-795 [doi]
- Attribute-Based Signcryption Scheme with Non-monotonic Access StructureYiliang Han, Wanyi Lu, Xiaoyuan Yang 0002. 796-802 [doi]
- Secure Distributed Key Generation on Vector Space Access Structures in Bilinear GroupsJie Zhang, Futai Zhang. 803-808 [doi]
- An Improved Identity-Based Batch Verification Scheme for VANETsBao Liu, Lei Zhang. 809-814 [doi]
- A Multi-user Searchable Symmetric Encryption Scheme for Cloud Storage SystemYaling Zhang, Zhipeng Jia, Shangping Wang. 815-820 [doi]
- A Hybrid System for Authentication ServiceYongqiang Zhang, Qiang Liu, Haibo Tian. 821-826 [doi]
- Networking Technology Trend in Japan, Toward Earth-Friendly InfrastructureAkira Arutaki. 827-828 [doi]
- Network Design Problem by Link Protection to Keep Small Increase of Path Length during Link FailuresKohei Nishida, Hiroyoshi Miwa. 829-834 [doi]
- Delivering a File by Multipath-Multicast on OpenFlow NetworksAkira Nagata, Yoshiaki Tsukiji, Masato Tsuru. 835-840 [doi]
- Multi-Jain Fairness Index of Per-Entity Allocation Features for Fair and Efficient Allocation of Network ResourcesMario Köppen, Kei Ohnishi, Masato Tsuru. 841-846 [doi]
- An Efficient Tripartite Identity-Based Authenticated Key Agreement ProtocolXiaotong Fu, Shufang Guo, Ruijun Shi. 847-851 [doi]