Abstract is missing.
- Information Security Awareness Campaign: An Alternate ApproachBilal Khan, Khaled Alghathbar, Muhammad Khurram Khan. 1-10 [doi]
- Equivalent Key Recovery Attack on H 2-MAC Instantiated with MD5Wei Wang. 11-20 [doi]
- Recent Progress in Code-Based CryptographyPierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui, Gerhard Hoffmann, Mohammed Meziani, Robert Niebuhr. 21-32 [doi]
- GPU Implementation of the Keccak Hash Function FamilyPierre-Louis Cayrel, Gerhard Hoffmann, Michael Schneider 0002. 33-42 [doi]
- A Comparative Study of a New Associative Classification Approach for Mining Rare and Frequent Classification RulesInes Bouzouita, Michel Liquiere, Samir Elloumi, Ali Jaoua. 43-52 [doi]
- Secret Key Awareness Security Public Key Encryption SchemeGuoyan Zhang, Qiuliang Xu. 53-61 [doi]
- Using SAT Solving to Improve Differential Fault Analysis of TriviumMohamed Saied Emam Mohamed, Stanislav Bulygin, Johannes Buchmann. 62-71 [doi]
- Design of a Retargetable Decompiler for a Static Platform-Independent Malware AnalysisLukás Durfina, Jakub Kroustek, Petr Zemek, Dusan Kolár, Tomas Hruska, Karel Masarik, Alexander Meduna. 72-86 [doi]
- The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature ReviewSoltan Alharbi, Jens H. Weber-Jahnke, Issa Traoré. 87-100 [doi]
- Multistep Attack Detection and Alert Correlation in Intrusion Detection SystemsFabio Manganiello, Mirco Marchetti, Michele Colajanni. 101-110 [doi]
- 2SC: An Efficient Code-Based Stream CipherMohammed Meziani, Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui. 111-122 [doi]
- Towards Algebraic Cryptanalysis of HFE Challenge 2Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann. 123-131 [doi]
- S-FSB: An Improved Variant of the FSB Hash FamilyMohammed Meziani, Özgür Dagdelen, Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui. 132-145 [doi]
- Improved Identity-Based Identification and Signature Schemes Using Quasi-Dyadic Goppa CodesSidi Mohamed El Yousfi Alaoui, Pierre-Louis Cayrel, Mohammed Meziani. 146-155 [doi]
- A Detrministic Factorization and Primality Testing Algorithm for Integers of the Form Z Mod 6 = -1Noureldien Abdelrhman Noureldien, Mahmud Awadelkariem, DeiaEldien M. Ahmed. 156-165 [doi]
- Non-interactive Deniable Authentication Protocol Using Generalized ECDSA Signature SchemeJayaprakash Kar. 166-176 [doi]
- Lower Bounds for Interpolating Polynomials for Square Roots of the Elliptic Curve Discrete LogarithmGerasimos C. Meletiou, Yannis C. Stamatiou, Apostolos Tsiakalos. 177-187 [doi]
- Towards Next Generation System Architecture for Emergency ServicesJari Veijalainen, Veikko Hara. 188-202 [doi]
- Securing Communication between SCADA Master Station and Mobile Remote ComponentsRosslin John Robles, Gilcheol Park. 203-210 [doi]
- Retrofit to CAIN of IP-Based Supervisory Control and Data Acquisition SystemMaricel O. Balitanas, Seung-Hwan Jeon, Tai-Hoon Kim. 211-218 [doi]
- Application Program Interface as Back-Up Data Source for SCADA SystemsRosslin John Robles, Tai-Hoon Kim. 219-226 [doi]
- Supervisory Control and Data Acquisition System CAIN IssuesMaricel O. Balitanas, Tai-Hoon Kim. 227-235 [doi]
- RFID Implementation and Security IssuesYoung B. Choi, Tae-Hwan Oh, Rajath Chouta. 236-249 [doi]
- Vehicle Tracking Based on Kalman Filter in TunnelGyuyeong Kim, Hyuntae Kim, Jangsik Park, Yunsik Yu. 250-256 [doi]
- The Contents Based Music Retrieval Method Using Audio Feature Analysis against Polyphonic MusicChai-Jong Song, Seok-Pil Lee, Hochong Park. 257-263 [doi]
- A Noise Robust Echo Canceller with Post-processing Using Liner Predictor and Wiener filterHyuntae Kim, DaeHyun Ryu, Jangsik Park. 264-274 [doi]
- Implementation Fire Detection Algorithm Using Fixed Point Digital Signal ProcessorJangsik Park, Hyuntae Kim, Yunsik Yu. 275-281 [doi]
- An Efficient Private Registry Management System Using DHT Based on FIPA Agent PlatformSeung-Hyun Lee, Kyung-Soo Jang, Kee-Hyun Choi, Choon-Sung Nam, Dong Ryeol Shin. 282-291 [doi]
- A Study for Method of Construct Encryption Scheme for Supporting Range Query Based on Bucket ID Transformation about Sensor ApplicationsYou-Jin Song, Jae Sang Cha, Jang Mook Kang. 292-305 [doi]
- Improvement of Message Processing Method for SOA Based Digital Set-Top Box SystemJi-Yeon Hwang, Seung-Jung Shin, DaeHyun Ryu. 306-312 [doi]
- A Data Management Method to Secure Data in Cloud Computing EnvironmentYou-Jin Song, Jae Sang Cha, Jang Mook Kang, Wan Sik kim. 313-317 [doi]
- VLSI Architecture of Adaptive Viterbi Decoder for Wireless CommunicationDongjae Song, Soongyu Kwon, Chun-Guan Kim, Jong-Tae Kim. 318-325 [doi]
- A Study for Security Scheme and the Right to Be Forgotten Based on Social Network Service for Smart-Phone EnvironmentJang Mook Kang, You-Jin Song, Jae Sang Cha, Seon-Hee Lee. 326-332 [doi]
- Development of Integrated Adapter Based on Multi-sensor Networks for Tracking and SurveillanceJun-Pil Boo, Do-Hyeun Kim. 333-338 [doi]
- High Speed and Low-Complexity Mode Decision for Advanced Video CodingByoungman An, YoungSeop Kim, Oh-Jin Kwon. 339-348 [doi]
- Robust Congestion Control Design for Input Time Delayed AQM SystemJi Hoon Yang, Seung-Jung Shin, Dong Kyun Lim, Jeong Jin Kang. 349-358 [doi]
- An Intelligent Clustering Method for Highly Similar Digital Photos Using Pyramid Matching with Human Perceptual 25 Color HistogramDong-Sung Ryu, Kwanghwi Kim, Hwan-Gue Cho. 359-366 [doi]
- Requirements Analysis and Critical Requirement Derivation Method Using MacrostrukturYong-Kyun Cho, Young-Bum Park. 367-377 [doi]
- A Scheme for Role-Based 3D CCTV Using CS-RBAC (Context-Sensitivity Role-Based Access Control)Jang Mook Kang, Jae Sang Cha, You-Jin Song, Goo-Man Park, Eun-Young Ko, Myong-chul Shin, Jeong Jin Kang, YouSik Hong. 378-383 [doi]
- Vessel Tracking Using Adaboost Algorithm and AIS InformationJangsik Park, Hyuntae Kim, Gyuyeong Kim, Yunsik Yu. 384-388 [doi]
- Relative Self-Localization Base on Fish-Eye Lenses and SIFT Algorithm for Indoor Mobile RobotXing Xiong, Byung-Jae Choi. 389-394 [doi]
- User-Oriented Pseudo Biometric Image Based One-Time Password Mechanism on Smart PhoneWonjun Jang, Sikwan Cho, Hyung-Woo Lee. 395-404 [doi]