Abstract is missing.
- A Certificate-Based Authenticated Key Agreement Protocol for SIP-Based VoIP NetworksMing Luo, Yingyou Wen, Hong Zhao. 3-10 [doi]
- Analyzing Euler-Fermat Theorem Based Multicast Key Distribution Schemes with Chinese Remainder TheoremWen Tao Zhu. 11-17 [doi]
- Conditional Privacy Using Re-encryptionSuriadi Suriadi, Ernest Foo, Jason Smith. 18-25 [doi]
- Using Outlier Detection to Reduce False Positives in Intrusion DetectionFu Xiao, Xie Li. 26-33 [doi]
- Identity-Based On-Line/Off-Line SigncryptionDongdong Sun, Xinyi Huang, Yi Mu, Willy Susilo. 34-41 [doi]
- Attribute Delegation Authorization Based on Subjective Trust EvaluationBo Chen, Guosun Zeng, Li Li. 42-49 [doi]
- A Multi-core Supported Intrusion Detection SystemDaxin Tian, Yang Xiang. 50-55 [doi]
- Synchronization of Discrete Chaotic Dynamical Systems Using Active ControlDonglin Liu. 56-59 [doi]
- Secure Prophet Address Allocation for Mobile Ad Hoc NetworksHongbo Zhou. 60-67 [doi]
- Two Security Problems of RFID Security Method with Ownership TransferEun-Jun Yoon, Kee-Young Yoo. 68-73 [doi]
- Novel Stream Cipher Using 2-D Hybrid CA and Variable Ordered Recursive CA SubstitutionsRong-Jian Chen, Jui-Lin Lai. 74-81 [doi]
- Cryptanalysis and Improvement of EC2C-PAKA Protocol in Cross-RealmFucai Zhou, Xiumei Liu, Hong Yan, Guiran Chang. 82-87 [doi]
- A Dynamic and Self-Adaptive Network Security Policy Realization MechanismChenghua Tang, Shunzheng Yu. 88-95 [doi]
- Experimental Tests on SCTP over IPSecMaria-Dolores Cano, Juan A. Romero, Fernando Cerdán. 96-102 [doi]
- A Dual-Head Cluster Based Secure Aggregation Scheme for Sensor NetworksFei Gao, Wen Tao Zhu. 103-110 [doi]
- Ontology-Based Knowledge Representation for a P2P Multi-agent Distributed Intrusion Detection SystemDayong Ye, Quan Bai, Minjie Zhang. 111-118 [doi]
- Multicast Cryptosystem: A Cryptosystem for Secure Multicast CommunicationA. John Prakash, V. Rhymend Uthariaraj. 119-124 [doi]
- Secure Bit Enhanced Canary: Hardware Enhanced Buffer-Overflow ProtectionKrerk Piromsopa, Sirisara Chiamwongpaet. 125-131 [doi]
- An Improved Method for Ranking of Search Results Based on User InterestHong-Rong Yang, Ming Xu, Ning Zheng. 132-138 [doi]
- ROAD: An RFID Offline Authentication, Privacy Preserving Protocol with Dos ResilienceFen Liu, Lei Hu. 139-146 [doi]
- Characterization of Attackers? Activities in Honeypot Traffic Using Principal Component AnalysisS. Almotairi, A. Clark, G. Mohay, J. Zimmermann. 147-154 [doi]
- Towards Time Limited Secure Agent Execution on Malicious Host: A Concept PaperSarosh Hashmi, John Brooke. 155-162 [doi]
- Self-Authentication of Encrypted Channels in Service Network GraphDavid Lai, Zhongwei Zhang. 163-167 [doi]
- A Novel Sliding Window Based Change Detection Algorithm for Asymmetric TrafficEjaz Ahmed, Andrew Clark, George M. Mohay. 168-175 [doi]
- Anomaly Detection Based on Available Bandwidth EstimationLi He, Shunzheng Yu, Min Li. 176-183 [doi]
- Spam Mail Filtering Based on Network ProcessorLian Lin, Zhongwen Li, Liang Shi. 184-189 [doi]
- Extending BAN Logic for Reasoning with Modern PKI-Based ProtocolsSufatrio, Roland H. C. Yap. 190-197 [doi]
- Detecting Network-Wide Traffic Anomalies Based on Spatial HMMMin Li, Shunzheng Yu, Li He. 198-203 [doi]
- A Stable Clock Synchronization Based on Clock Drift RateYing Zhao, Yini Wang, Jiumei Huang, Xuelin Shi. 204-209 [doi]
- Multi-classifier Classification of Spam Email on a Ubiquitous Multi-core ArchitectureMd. Rafiqul Islam, Jaipal Singh, Ashley Chonka, Wanlei Zhou. 210-217 [doi]
- A Service Trust Model with Passive TrustYanli Yu, Keqiu Li, Yong Zhang, Lianpeng Xu. 218-225 [doi]
- A Maximum Entropy Based Multi-dimensional Trust ModelXinjie Guan, Xili Wan, Junzhou Luo. 226-232 [doi]
- An Effective P2P Collaborative Mode for Mobile Web SurfingYunpeng Xiao, Yang Tao, Wenji Li, Qian Li. 235-241 [doi]
- Automatic Chatbot Knowledge Acquisition from Online Forum via Rough Set and Ensemble LearningYu Wu, Gongxiao Wang, Weisheng Li, Zhijun Li. 242-246 [doi]
- An MAODV-Based Energy Saving Multicast Routing AlgorithmGuofeng Zhao, Wei Yang, Hong Tang, Yanbing Liu. 247-250 [doi]
- Chaos of Software RequirementsJunwei Ge, Yiqiu Fang, Shayne Flint. 251-257 [doi]
- A Parallel Algorithm for Simulating Photochemical ReactionHongjian Li, Hong Tang, Shixin Sun, Yusheng Dou. 258-262 [doi]
- A Novel Genetic Algorithm and Its Application in TSPYanbing Liu, Jun Huang. 263-266 [doi]
- Parallel Computing in Semiclassical Dynamics Simulation of Photochemical ReactionsYusheng Dou, Mingze Bai, Hongjian Li, Hong Tang. 267-272 [doi]
- Community Detection Based on Weighted NetworksAixiang Cui, Duanbing Chen, Yan Fu. 273-280 [doi]
- A New Efficient Algorithm for Detecting Communities in Complex NetworksYing Wan, Duanbing Chen, Yan Fu. 281-286 [doi]
- Construction and Application of Linux Virtual Server Cluster for Scientific ComputingHong Tang, Rui She, Chen He, Yusheng Dou. 287-289 [doi]
- An Empirical Study on the Informatization and E-commerce Development Level in ChongqingYue Liu, Daowei Zhang. 290-295 [doi]
- MP-MAODV: A MAODV-Based Multipath Routing AlgorithmHong Tang, Fei Xue, Peng Huang. 296-301 [doi]
- Benefit Optimization Resource Scheduling Algorithm in Three-Dimensional QoS Model in Grid ComputingXing-jiang Yu, Yang Tao. 302-305 [doi]
- Classified Optimization Scheduling Algorithm Driven by Multi-QoS Attributes in Economical GridXing-jiang Yu, Yang Tao. 306-309 [doi]
- A Spatial Renewal Video Traffic Model Based on Buffering MetricsPeng Lin, WenLong Luo, Yanbing Liu. 310-314 [doi]
- An Exception Handling Framework for Service-Oriented ComputingQin Lu, Weishi Zhang, Bo Su. 315-322 [doi]
- Research on Mapping of MPCC SCF to SIP Protocol in Parlay/OSA APIZi-fu Fan, Xu-yan Yang, Xiao-Yu Wan. 323-327 [doi]
- A Scheme of Detecting Cheaters Wholly in Threshold Secret Sharing for Mobile Ad Hoc NetworksYi Zhang, Wenxing Chen. 328-330 [doi]
- Research on T-bridge Algorithm of Web Session Fuzzy ClusteringZixiang Zhao, Kun Bai. 331-335 [doi]
- A New Secure E-mail Scheme Based on Elliptic Curve Cryptography Combined Public KeyYi Zhang, Tianxi Cui, Hong Tang. 336-340 [doi]
- Traflow: Design and Complementation of a Real Time Traffic Measurement System in High-Speed NetworksChuan Xu, Hong Tang, Guofeng Zhao. 341-344 [doi]
- Research on Design and Its Key Technologies of Web Service Platform in P2P EnvironmentJin-yu Shi, Wei-shi Zhang, Jian-Ping Jiang, Xiu-guo Zhang. 345-350 [doi]
- Wiretap Channel with Side Information from Part of EncoderBin Dai, Yuan Luo, A. J. Han Vinck. 353-357 [doi]
- Relay Aided Wireless Multicast Utilizing Network Coding: Outage Behaviour and Diversity GainChen Zhi, Chen Wei, Pingyi Fan, Khaled Ben Letaief. 358-364 [doi]
- Generation-Based Network Coding over Networks with DelayXiaofu Wu, Chunming Zhao, Xiaohu You. 365-368 [doi]
- Capacity and Delay of the Wireless Network with Special Relay NodesJianwei Xie, Pingyi Fan. 369-374 [doi]
- A Distributed Fast Light-path Set-up Protocol for Grid over OBS NetworksMin Li, Xueyue Cao, Leiming Xu, Ping Zhang, Chi Yuan, Shuping Peng, Zhengbin Li. 375-382 [doi]
- A Volunteer Computing in High Performance Environment Based on Availability ModelWang Yu, Zhijian Wang, Xiaofeng Zhou. 383-386 [doi]
- A Probabilistic Approach to Analyze the Effect of Free-Riders in P2P Streaming ServicesShuang Yang, Xin Wang. 387-391 [doi]
- Network Coding for P2P Live Media StreamingHan Liu, Xiaodong Tu, Jun Xie. 392-398 [doi]
- Optimal Placement of Mesh Points in a Wireless Mesh Network Using Multi-path Routing ProtocolSuk Yu Hui, Kai Hau Yeung, Kin Yeung Wong. 399-403 [doi]
- Towards Mapping Large Scale Ontologies Based on RFCA with Attribute ReductionPingli Gu, Jiuyun Xu, Changbao Li, Youxiang Duan. 407-411 [doi]
- Design of a Collaborative Ontology Editing System for Enterprise Process IntegrationHong-fei Zhan, Xin-Jian Gu, Guo-Ning Qi. 412-417 [doi]
- Emerging Autopoietic Communities - Scalability of Knowledge Transfer in Complex SystemsSusu Nousala, William P. Hall. 418-425 [doi]
- Fostering the Knowledge-Sharing Behavior of Customers in Interorganizational Healthcare CommunitiesGeorg von Krogh, Seonwoo Kim, Zeynep Erden. 426-433 [doi]
- Fitting Grey Relation Model for the Performance of E-government Service: The Case of Kaohsiung City Service On-Line System in TaiwanTien-Chin Wang, Echo Huang, Hsing-Hui Yang, Juh-Cheng Yang. 434-439 [doi]
- CUCS: A Web Page Classification Algorithm for Large Training SetJing Wang, Hongming Cai, Boyi Xu, Lihong Jiang. 440-445 [doi]
- A DL-Based Approach for Eliminating Concept Restriction Conflicts in Ontology MergingYao Lu, Guoyi Zhang. 446-451 [doi]
- Knowledge Mining and Visualization on News Webpages and Large-Scale News Video DatabaseHangzai Luo, Jiahang Yang, Aoying Zhou, Jianping Fan, Tianming Hu. 452-459 [doi]
- Object Lifecycle Evolution History Modeling and Reuse for Knowledge ManagementYinglin Wang. 460-466 [doi]
- MFDSSF: A Mobile Fuzzy Decision Support System for Firefighter Cooperation in Ad Hoc NetworksYanwei Chen, Demin Li, Chenwen Wang, Jiacun Wang. 475-482 [doi]
- Behavior-Based Web Services MatchmakingBensheng Yun, Junwei Yan, Min Liu. 483-487 [doi]
- A Semantic Approach to Recommendation System Based on User Ontology and Spreading Activation ModelQi Gao, Junwei Yan, Min Liu. 488-492 [doi]
- Semantic Mapping in Product Design and Catalog IntegrationYi Yu, Junwei Yan, Min Liu. 493-498 [doi]
- Research on the Modeling of Semantic-Based Web Resources FeatureJi-Xi Chen, Qi Xu, Xin-Jian Gu, Guo-Ning Qi, Hong-fei Zhan. 499-503 [doi]
- A Semantic Annotation Based Software Knowledge Sharing SpaceQiang Lu, Ming Chen, Zhiguang Wang. 504-509 [doi]
- Research on Product Design Knowledge Reuse through Linkage with Design Iteration RecordsXijuan Liu. 510-515 [doi]
- A Method to Guarantee Ontology Consistency on Property Range ChangesRongwei Ye, Yinglin Wang, Jianmei Guo, Qi Xiong. 516-521 [doi]
- An Adaptive Transmission Control Mechanism for Underwater Acoustic Sensor NetworkZhongwen Guo, Xiaodong Liu, Yuan Feng. 525-530 [doi]
- EBMD: Energy-Balanced Multi-path Data Propation Algorithm for Sensor NetworksYuan Feng, Lipeng Zhang, Peng Zhou. 531-540 [doi]
- A Novel Communication Structure for Wireless Sensor NetworkWenjin Xu, Jianfeng Liu. 541-544 [doi]
- Quantum Secure Communication Network on EPR StatesShumei Wang, Hongyang Ma. 545-548 [doi]
- A Group Quantum Communication Network Using Quantum Secret SharingHongyang Ma, Zhongwen Guo. 549-552 [doi]
- Data Gathering Approaches for Underwater Sensor NetworksChongqing Zhang, Ruisheng Jia, Sheng Fang. 553-560 [doi]
- The Application and Research of Ontology in Knowledge Management FieldYong Liu, Xu-hao Liu, Ai-guang Yang. 561-564 [doi]
- EBAT: Energy Balanced Adaptive Transmission Algorithm for Sensor NetworksYu Ting Sun, Wei-qin Lv, Lipeng Zhang, Peng Zhou. 565-574 [doi]
- Implementation and Optimization of MPICH2 Multicast on Optical Fiber NetworkXiaokun Liu, Minglu Li, Xinhua Lin, Xiaozheng Cheng. 577-582 [doi]
- A Resource Scheduling Strategy for Intrusion Detection on Multi-core PlatformZhuojun Zhuang, Yuan Luo, Minglu Li, Chuliang Weng. 583-590 [doi]