Abstract is missing.
- A Spelling Based CAPTCHA System by Using ClickKuo-Feng Hwang, Cian-Cih Huang, Geeng-Neng You. 1-8 [doi]
- A New Non-intrusive Authentication Approach for Data Protection Based on Mouse DynamicsChien-Cheng Lin, Chin-Chun Chang, Deron Liang. 9-14 [doi]
- Improving Fault Tolerance through Crash RecoveryTsozen Yeh, Weian Cheng. 15-22 [doi]
- How Many Samples Does Convincible Performance Evaluation of a Biometric System Need?Rongfeng Li, Darun Tang, Beining Huang, Wenxin Li. 23-26 [doi]
- Multimodal Biometrics - Sources, Architecture and Fusion Techniques: An OverviewMadhavi Gudavalli, S. Viswanadha Raju, A. Vinaya Babu, D. Srinivasa Kumar. 27-34 [doi]
- Robust Multiple Minutiae Partitions for Fingerprint AuthenticationHao Ni, Dongju Li, Tsuyoshi Isshiki, Hiroaki Kunieda. 35-44 [doi]
- A Scalable Architecture for Dual Basis GF(2m) MultiplicationsLiang-Hwa Chen, Po-Lun Chang, Yen-Ching Chang, Chiou-Yng Lee. 45-50 [doi]
- Combining Local Binary Pattern and Local Phase Quantization for Face RecognitionBaohua Yuan, Honggen Cao, Jiuliang Chu. 51-53 [doi]
- Efficient Convertible Multi-authenticated Encryption Scheme for Group CommunicationsJia-Lun Tsai, Nai-Wei Lo, Tzong-Chen Wu. 54-58 [doi]
- Hardware Resource Manager for Reconfiguration SystemChih-Tung Lin, Shi-Jinn Horng, Yao-Lin Huang. 59-65 [doi]
- A Hybrid Forecasting Model Based on Adaptive Fuzzy Time Series and Particle Swarm OptimizationYao-Lin Huang, Shi-Jinn Horng, Tzong-Wann Kao, I-Hong Kuo, Takao Terano. 66-70 [doi]
- Enhancement of Generalized Ring Signatures with ConvertibilityShiang-Feng Tzeng, Shi-Jinn Horng. 71-76 [doi]
- Hardcopy Document Authentication Based on Public Key Encryption and 2D BarcodesMohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan. 77-81 [doi]
- Multi-bit Adaptive Embedding Algorithm for Anti-forensic SteganographyRong-Jian Chen, Shi-Jinn Horng. 82-89 [doi]
- An Integrated Algorithm of Liu's Generalized Lambda-Measure Based Choquet Integral and Hurst ExponentHsiang-Chuan Liu, Hsien-Chang Tsai, Yu-Ting Cheng, Yen-Kuei Yu. 90-95 [doi]
- A Method of Evolving Finger Vein TemplateDarun Tang, Beining Huang, Wenxin Li, Xiaoming Li. 96-101 [doi]
- Message Passing Using the Cover Text as Secret KeyYu-Chen Shu, Wen-Liang Hwang, Dean Chou. 102-107 [doi]
- Construction of a Taiwan Biodiversity Genetic Database in Cloud EnvironmentsHan-Yu Lin, Chien-Ming Chen, Yu-Lun Cheng, Ya-Hui Chang, Tun-Wen Pai. 108-112 [doi]
- Print-and-Scan Resilient Watermarking Based on Modulating the Averages of DCT CoefficientsYuan-Liang Tang, Chia-Jung Yang. 113-117 [doi]
- Introduction to Two P2P Network Based Reputation SystemsMing-Chang Huang. 118-125 [doi]
- Robust Hierarchical Linear Model Comparison for End-of-Utterance Detection under Noisy EnvironmentsRudolf B. Blazek, Wei-Tyng Hong. 126-133 [doi]
- An Efficient Run Time Control Flow Errors Detection by DCT TechniqueHung-Chuan Lai, Shi-Jinn Horng, Pingzhi Fan, Xian Wang, Yi Pan. 134-150 [doi]