Abstract is missing.
- Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face RecognitionPhalguni Gupta, Dakshina Ranjan Kisku, Jamuna Kanta Sing, Massimo Tistarelli. 1-8 [doi]
- Security Improvement on a Remote User Authentication Scheme Using Smart CardsTien-Ho Chen, Han-Cheng Hsiang, Wei Kuan Shih. 9-16 [doi]
- Dual-Byte-Marker Algorithm for Detecting JFIF HeaderKamaruddin Malik Mohamad, Tutut Herawan, Mustafa Mat Deris. 17-26 [doi]
- Hiding Data in JPEG Using in-DQT TechniqueKamaruddin Malik Mohamad, Tutut Herawan, Mustafa Mat Deris. 27-36 [doi]
- An Analysis of Syndrome CodingMd. Amiruzzaman, Mohammad Abdullah-Al-Wadud, Yoojin Chung. 37-50 [doi]
- Intrusion Correlation Using Ontologies and Multi-agent SystemsGustavo A. Isaza, Andrés G. Castillo, Marcelo López, Luis Fernando Castillo, Manuel López. 51-63 [doi]
- Tag ID Subdivision Scheme for Efficient Authentication and Security-Enhancement of RFID System in USNKijeong Lee, Byungjoo Park, Gil Cheol Park. 64-71 [doi]
- Fault Attacks against the Miller's Algorithm in Edwards CoordinatesNadia El Mrabet. 72-85 [doi]
- A Cryptosystem for Encryption and Decryption of Long Confidential MessagesDebasis Giri, Prithayan Barua, P. D. Srivastava, Biswapati Jana. 86-96 [doi]
- Lane Design for Speed OptimizationDebnath Bhattacharyya, Arijit Chakraborty, Feruza Sattarova Yusufovna, Young-hun Lee, Tai-Hoon Kim. 97-107 [doi]
- Biometric Authentication Using Infrared Imaging of Hand Vein PatternsDebnath Bhattacharyya, A. Shrotri, S. C. Rethrekar, M. H. Patil, Farkhod A. Alisherov, Tai-Hoon Kim. 108-115 [doi]
- IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem ApproachMaricel O. Balitanas, Tai-Hoon Kim. 116-127 [doi]
- Fuzzy-Based Detection of Injected False Data in Wireless Sensor NetworksHae Young Lee, Tae Ho Cho, Hyung-Jong Kim. 128-137 [doi]
- Pattern Recognition Using Artificial Neural Network: A ReviewTai-Hoon Kim. 138-148 [doi]
- PeerReview Analysis and Re-evaluation for Accountability in Distributed Systems or NetworksZhifeng Xiao, Yang Xiao. 149-162 [doi]
- Tracing Potential School Shooters in the Digital SphereJari Veijalainen, Alexander Semenov, Jorma Kyppö. 163-178 [doi]
- Infrastructure Aided Privacy Preserving-Authentication in VANETsBrijesh Kumar Chaurasia, Shekhar Verma, G. S. Tomar. 179-189 [doi]
- Attacks on Bluetooth Security Architecture and Its CountermeasuresMian Muhammad Waseem Iqbal, Firdous Kausar, Muhammad Arif Wahla. 190-197 [doi]
- Modified Anonymous Authentication Scheme with Enhanced Security for Wireless CommunicationMuhammad Asif Khan, Firdous Kausar, Ashraf Masood. 198-208 [doi]
- Security Risks of Cloud Computing and Its Emergence as 5th Utility ServiceMushtaq Ahmad. 209-219 [doi]
- Performance Evaluation of Video Streaming in Vehicular Adhoc NetworkAneel Rahim, Zeeshan Shafi Khan, Fahad Bin Muhaya. 220-224 [doi]
- Receiver Based Traffic Control Mechanism to Protect Low Capacity Network in Infrastructure Based Wireless Mesh NetworkSyed Sherjeel Ahmad Gilani, Muhammad Zubair, Zeeshan Shafi Khan. 225-232 [doi]
- Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh NetworksRehan Shafi, Aneel Rahim, Fahad Bin Muhaya, Shehzad Ashraf, Muhammad Sher. 233-240 [doi]
- MPLS Unleashed: Remedy Using IPSEC over MPLS VPNSyed Noor-ul-Hassan Shirazi, Muhammad Asim, Muhammad Irfan, Nassar Ikram. 241-248 [doi]
- A New Holistic Security Approach for Government Critical Systems: Flooding PreventionMohammed A. Alhabeeb, Abdullah M. Almuhaideb, Phu Dung Le, Bala Srinivasan. 249-264 [doi]
- Sensor Aided AuthenticationXin Huang, Yang Jiang, Xiong Gao, Rong Fu, Tingting Zhang. 265-277 [doi]
- Knowledge-Base Semantic Gap Analysis for the Vulnerability DetectionRaymond Wu, Keisuke Seki, Ryusuke Sakamoto, Masayuki Hisada. 278-285 [doi]
- TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on SmartphonesMohammad Nauman, Tamleek Ali. 286-297 [doi]
- An Improved EKG-Based Key Agreement Scheme for Body Area NetworksAftab Ali, Farrukh Aslam Khan. 298-308 [doi]
- Multi-agent Reinforcement Learning Model for Effective Action SelectionSang-Jo Youk, Bong-Keun Lee. 309-317 [doi]