Abstract is missing.
- An Anonymous Car Rental System Based on NFCJia-Ning Luo, Ming-Hour Yang, Ming-Chien Yang. [doi]
- New Identity-Based Sequential Aggregate Signature Scheme from RSAJia-Lun Tsai, Nai-Wei Lo, Tzong-Chen Wu. [doi]
- Bitrate-Saving Intra Coding for Depth Video Compression in H.264/MVC Based on D-NOSE ModelsPo-Chun Chang, Kuo-Liang Chung, Wei-Ning Yang, Yong-Huai Huang. [doi]
- Security Analysis and Enhancement of a Dynamic Identity Based Authentication Scheme Using Smart CardsXiong Li, Jianwei Niu, Muhammad Khurram Khan, Junguo Liao. [doi]
- Secure Mobile User Authentication and Key Agreement Protocol with Privacy Protection in Global Mobility NetworksQi Xie, Mengjie Bao, Na Dong, Bin Hu, Duncan S. Wong. [doi]
- Modeling of Contactless Smart Card Protocols and Automated Vulnerability FindingM. Henzl, Petr Hanácek. [doi]
- Security of Biometrics Using Multimodal ApproachA. H. Ahmed, H. Malik. [doi]
- A Blog Clustering Approach Based on Queried KeywordsYi-Hui Chen, Eric Jui-Lin Lu, Tsai-Ying Wu. 1-9 [doi]
- Automatic ROI Segmentation in B-Mode Ultrasound Image for Liver Fibrosis ClassificationNan-Han Lu, Chung Ming Kuo, Hueisch-Jy Ding. 10-13 [doi]
- Application of Network Analyzer Based on the Automatic Control of LabVIEW in Radio and Television TestJianhua Kang, Fangyi She, Weidong Zhang, Jie Ping. 14-19 [doi]
- Anticipating Dormant Functionality in Malware: A Semantics Based ApproachM. Noor, H. Abbas. 20-23 [doi]
- Data Hiding Using Flexible Multi-bit MERRong-Jian Chen, Yu-Cha Chen, Jui-Lin Lai, Shi-Jinn Horng. 24-31 [doi]
- Exploiting Unsupervised Learning in Publish Subscribe System DesignChyouhwa Chen, Po-Chung Tung, Wei-Chung Teng. 32-39 [doi]
- How to Build an Automated Fingerprint Identification SystemZeeshan-ul-hassan Usmani, S. Irum, H. Afzal, S. Mahmud. 40-47 [doi]
- Plug-n-Play AFIS Development for Criminal and Civil ApplicationsZeeshan-ul-hassan Usmani, S. Irum, H. Afzal, S. Mahmud. 48-55 [doi]
- A New Image Watermarking Scheme Using Non-dominated Sorting Genetic Algorithm IIJiann-Shu Lee, Fei-Hsiang Huang, Hsiao-Chen Kuo. 56-61 [doi]
- Enhanced Backward Error Concealment for H.264/AVC Videos on Error-Prone NetworksPing-Chin Wang, Chow-Sing Lin. 62-66 [doi]
- E-Health Design of EEG Signal Classification for Epilepsy DiagnosisChi-Chou Kao. 67-71 [doi]
- The Correlation Analysis between Breast Density and Cancer Risk Factor in Breast MRI ImagesDing-Horng Chen, Yi-Chen Chang, Pai-Jun Huang, Chia-Hung Wei. 72-76 [doi]
- A Geocasting Forwarding Scheme for Mobile Nodes in VANETsTz-Heng Hsu, Ding-Horng Chen, Yi-Hsing Tung. 77-81 [doi]
- Efficient Implementation of Block Cipher in JCAWu-Chuan Yang, Shyh-Yih Wang, Shu-Ling Liu. 82-84 [doi]
- Design and Implementation of the Travelling Time- and Energy-Efficient Android GPS Navigation App with the VANET-Based A* Route Planning AlgorithmIng-Chau Chang, Hung-Ta Tai, Dung-Lin Hsieh, Feng-Han Yeh, Siao-Hui Chang. 85-92 [doi]
- Interactive Multimedia Technology in Case-Based Medical E-LearningZong-Xian Yin, Chyi-Her Lin, Wei-Cheng Lin. 93-96 [doi]
- Robust Biometrics Based Three-Factor Remote User Authentication Scheme with Key AgreementXiong Li, Jianwei Niu, Muhammad Khurram Khan, Junguo Liao. 105-110 [doi]
- On Interoperation of Hybrid CloudJ. K. Chiang, E. Yen, Yu-Long Lin. 111-115 [doi]
- Authentication, Authorization and File Synchronization in Hybrid Cloud: On Case of Google Docs, Hadoop and Linux Local HostsJ. K. Chiang, E. H.-W. Yen, Yen-Hua Chen. 116-123 [doi]
- Personal Threshold in a Small Scale Text-Dependent Speaker RecognitionYanling Chen, E. Heimark, Danilo Gligoroski. 162-170 [doi]
- Subsampling Based Computation-Aware Motion EstimationChi-Kao Chang, Min-Yuan Fang, I.-Chang Jou, Nai-Chung Yang, Chung Ming Kuo. 171-175 [doi]
- Sleepy Eye's Recognition for Drowsiness DetectionS.-D. Lin, Jia-Jen Lin, Chin-Yao Chung. 176-179 [doi]
- H2T: A Simple Hadoop-to-Twister Translator for Cloud ComputingJunbo Zhang, Jian-Syuan Wong, Yi Pan, Tianrui Li. 180-186 [doi]
- Precision Enhancement and Performance Evaluation of a CORDIC-Based Tilting Angle Identification Algorithm for Three-Axis AccelerometersWei-Ting Liao, Wen-Yen Lin, Wen-Cheng Cheng, Kin-fong Lei, Ming-Yih Lee. 187-192 [doi]
- Score-Level Fusion in Biometric VerificationF. Alsaade, M. Zahrani, T. Alghamdi. 193-197 [doi]
- Design CAROM Module Used in AES Structure for Sub-byte and Inv-sub-byte TransformationJui-Lin Lai, Kuo-Hung Liao, Yi-Te Lai, Rong-Jian Chen. 198-202 [doi]
- Content-Based Image Retrieval on Reconfigurable Peer-to-Peer NetworksChun-Rong Su, Jiann-Jone Chen, Kai-Lin Chang. 203-211 [doi]
- A Novel Non-intrusive User Authentication Method Based on Touchscreen of SmartphonesChien-Cheng Lin, Chin-Chun Chang, Deron Liang. 212-216 [doi]
- A Novel Hybrid Multibiometrics Based on the Fusion of Dual Iris, Visible and Thermal Face ImagesNing Wang, Qiong Li, Ahmed A. Abd El-Latif, Xuehu Yan, Xiamu Niu. 217-223 [doi]
- Multibit Color-Mapping Steganography Using Depth-First SearchHanzhou Wu, Hongxia Wang. 224-229 [doi]
- Orientation Range for Transposition According to the Correlation Analysis of 2DPalmHash CodeLu Leng, Andrew Beng Jin Teoh, Ming Li, Muhammad Khurram Khan. 230-234 [doi]
- Privacy Preserving Frequent Pattern Mining on Multi-cloud EnvironmentChih-Hua Tai, Jen-Wei Huang, Meng-Hao Chung. 235-240 [doi]
- Core-Point Detection on Camera-Based Fingerprint ImageFajri Kurniawan, Mohammed Sayim Khalil, Muhammad Khurram Khan. 241-246 [doi]
- Cryptanalysis of "A Robust Smart-Card-Based Remote User Password Authentication Scheme"S. Kumari, F. Bin Muhaya, Muhammad Khurram Khan, R. Kumar. 247-250 [doi]
- Adaptive Non-Local Means for Image Denoising using Turbulent PSO with No-Reference MeasuresLing-Yuan Hsu, Shi-Jinn Horng, Pingzhi Fan, Hsien-Hsin Chou, Xian Wang, Minyi Guo. 251-258 [doi]
- Protecting Data Privacy and Security for Cloud Computing Based on Secret SharingChing-Nung Yang, Jia-Bin Lai. 259-266 [doi]
- An Architecture and Application of Cloud-Based Customer Knowledge Management Information SystemsJyhjong Lin, Shin-Jer Yang. 267-272 [doi]
- Design Role-Based Multi-tenancy Access Control Scheme for Cloud ServicesShin-Jer Yang, Pei-Ci Lai, Jyhjong Lin. 273-279 [doi]
- Towards Privacy Preserving Multimedia Surveillance System: A Secure Privacy Vault DesignM. A. Hossain, S. M. M. Rahman. 280-285 [doi]
- Comparison among Methods of Ensemble LearningShaohua Wan, Hua Yang. 286-290 [doi]
- Authentication and Tamper Detection of Digital Holy Quran ImagesFajri Kurniawan, Mohammed Sayim Khalil, Muhammad Khurram Khan, Y. M. Alginahi. 291-296 [doi]