


default search action
IAS 2009: Xi'An, China
- Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3744-3

Volume I
Digital Rights Management
- Xiaojiang Chen, Dingyi Fang

, Jingbo Shen, Feng Chen, Wenbo Wang, Lu He:
A Dynamic Graph Watermark Scheme of Tamper Resistance. 3-6 - Zhen Yang, Kefeng Fan, Yingxu Lai:

Trusted Computing Based Mobile DRM Authentication Scheme. 7-10 - Xiaoyuan Yang, Yao Guo, Ke Niu, Xiang Wu:

An Authenticating Algorithm with Multi-compression Compatible in DCT Domain. 11-14 - Xiaoyuan Yang, Xiang Wu, Minqing Zhang:

Audio Digital Signature Algorithm with Tamper Detection. 15-18 - Huixian Li, Man Wang, Liaojun Pang, Weidong Zhang:

Key Binding Based on Biometric Shielding Functions. 19-22 - Yang Zhan, Haibo Tian, Qingqi Pei, Yueyu Zhang, Yumin Wang, Weidong Zhang:

A Deep Copy Protection Framework for Electronic Devices within Home. 23-26 - Yanping Li, Liaojun Pang, Yuming Wang:

Attacks on a Universal Designated Verifier Signature Scheme. 27-30 - Yuxin Ma, Jiancang Xie, Jungang Luo:

Image Enhancement Based on Nonsubsampled Contourlet Transform. 31-34
Multimedia in Ubiquitous Computing and Security Services
- Mn-Ta Lee, Hsuan T. Chang, Mu-Liang Wang:

Image Watermarking Using Phase-Shifting Digital Holography Embedded in the Wavelet Domain. 37-40 - Iuon-Chang Lin, Shu-Yan Huang:

A Polynomial Based Key Establishment Scheme for Heterogeneous Sensor Networks. 41-44 - Meng-Hsiun Tsai, Ming-Hung Wang, Ting-Yuan Chang, Pei-Yan Pai, Yung-Kuan Chan

:
An Adaptable Threshold Decision Method. 45-48 - Ching-Lung Chang, Jia-Yi Syu, Yuan-Sun Chu:

Zero Packet Loss Hand-off Mechanism in SIP-Based Wireless Networks. 49-52 - Shin-Jia Hwang, Ming-Jhang Chai:

A New Authenticated Key Agreement Protocol for Wireless Mobile Networks. 53-56 - Hsien-Huang P. Wu, Shih-Hsin Chang, Ping-Kuo Weng, Soon-Lin Chen:

Economical Dental Stereoradiography in Digital Era. 57-60 - Chin-Chen Chang, Yen-Chang Chen, Chia-Chen Lin

:
A Resistant Secret Sharing Scheme. 61-64
Image Processing and Intelligent Control
- Liu Yang, Baolong Guo, Jianmin Lv:

A Modified Feature Based Image Watermarking Scheme in NSCT Domain. 67-70 - Liqiang Liu, Xianjue Luo, Tao Niu, Kai Wang:

Grounding Grid Corrosion Diagnosis Based on Large Change Sensitivity. 71-74 - Jun Ma, Guanzhong Dai, Jing Zhou:

Anomalous Payload Detection System Using Analysis of Frequent Sequential Pattern. 75-78 - Jie Jiang, Wei Mo, Jianmin Lv:

An Enhanced Block Mode Selection Method for Surveillance Video Communication. 79-82 - Mei Wang, Huifeng Zhang, Yong Yan:

The Detection of Bi-frequency Weak Signal Based on Chaos and Correlation. 83-86 - Xian-Min Ma, Che Liang:

Application of Rough Set Theory in Coal Gangue Image Process. 87-90 - Yu Han, Aidong Men, Kan Chang, Ziyi Quan:

GOP-Level Transmission Distortion Modeling for Video Streaming over Mobile Networks. 91-95 - Cheng Deng, Jie Li, Meng Jia, Xinbo Gao:

Sinusoidal Signals Pattern Based Robust Video Watermarking in the 3D-CWT Domain. 96-99
Video Coding Schemes
- Fuqiang Zhang, Junli Li, Gang Chen, Jiaju Man:

Assessment of Color Video Quality with Singular Value Decomposition of Complex Matrix. 103-106 - Min Li, Bo Wang:

Hybrid Video Transcoder for Bitrate Reduction of H.264 Bit Streams. 107-110 - Min Li, Bo Wang:

Whole Frame Loss Recovery Algorithm for H.264 Decoders. 111-114 - Bo Wang, Dichen Liu:

A Frequent-Domain VideoTranscoder with Spatial Downscaling for H.264/AVC. 115-118 - Yin Wang, Xiangming Wen, Xinqi Lin, Peizhou He, Wei Zheng:

A Novel Video Shot Segmentation Based on Textural Features. 119-122 - Zhaopeng Cui, Dujuan Wang, Guang Jiang, Chengke Wu:

Octagonal Search Algorithm with Early Termination for Fast Motion Estimation on H.264. 123-126 - Anhong Wang, Yao Zhao, Zhihong Li:

A Two-Description Distributed Video Coding. 127-130
Fuzzy Applications
- Ximing Li

, Bo Yang, Yubin Guo:
Fuzzy Identity Based Encryption Scheme with Some Assigned Attributes. 133-136 - Quan Feng, Fei Su, Anni Cai:

Encrypted Fuzzy Vault Based on Fingerprint. 137-140 - Qiuqin Lu, Guangqiu Huang:

An Attack Model Based on Both-Branch Fuzzy Logic and Fuzzy Petri Net. 141-144 - Xuyan Wu, Huiling Gu, Xujie Hu, Yuhong Dong:

Application of the Fuzzy Entropy Weight in Risk Assessment of the Engineering Project. 145-148 - Xian-Bo He, Li Yang, Xian-hua Zeng, Gang-yuan Zhang, Xing-qiang Zhao:

An Adaptive Fuzzy Scheduling and Fuzzy-PID Perfomance Control Model Being Suitable to Soft Real-Time Systems. 149-153 - Mohammad Akbarpour Sekeh

, Mohd. Aizani Bin Maarof:
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls. 154-157 - Qingnian Wang, Kun Yan, Xiaofeng Wan, Meiling Yuan:

Application of Particle Swarm Optimization in Fussy Neural Networks. 158-161
System-on-Chip for Signal Processing
- Jing-Wun Lin, Chen-Chieh Wang, Chin-Yao Chang, Chung-Ho Chen, Kuen-Jong Lee, Yuan-Hua Chu, Jen-Chieh Yeh, Ying-Chuan Hsiao:

Full System Simulation and Verification Framework. 165-168 - Yin-Tsung Hwang, Hua-Hsin Luo:

Automatic IP Interface Synthesis Supporting Multi-layer Communication Protocols in SoC Designs. 169-172 - Chih-Hsien Hsia

, Ding-Wei Huang, Jen-Shiun Chiang, Zong-Jheng Wu:
Moving Object Tracking Using Symmetric Mask-Based Scheme. 173-176 - Chia-Cheng Lo, Jung-Guan Luo, Ming-Der Shieh:

Hardware/Software Codesign of Resource Constrained Real-Time Systems. 177-180 - Tsung-Han Tsai, Chung-Yuan Lin, De-Zhang Peng, Giua-Hua Chen:

Design and Integration for Background Subtraction and Foreground Tracking Algorithm. 181-184 - Shyue-Wen Yang, Ming-Hwa Sheu, Jun-Jie Lin, Chuang-Chun Hu, Tzu-Hsiung Chen, Shau-Yin Tseng:

Parallel 3-Pixel Labeling Method and its Hardware Architecture Design. 185-188 - Kan Chang

, Bo Yang, Wenhao Zhang:
Novel Fast Mode Decision Algorithm for P-Slices in H.264/AVC. 189-193
Digital Rights Management
- Jing-Ming Guo, Yun-Fu Liu:

Majority-Parity-Guided Watermarking for Block-Truncated Images. 197-200 - Jing-Ming Guo, Jia-Jin Tsai:

Data Hiding in Halftone Images Using Adaptive Noise-Balanced Error Diffusion and Quality-Noise Look Up Table. 201-204 - Yongsoo Choi, Hyoung Joong Kim:

Improving the Modified Matrix Encoding on Steganography Method. 205-208 - Masaaki Fujiyoshi

, Seungwu Han, Hitoshi Kiya:
Reversible Information Hiding Considering Hierarchical Access Control. 209-212 - Hui Li, Zhijin Guan, Shanli Chen, Yuxin Chen:

The Reversible Network Cascade Based on Reversible Logic Gate Coding Method. 213-216 - Shengbing Che, Zuguo Che, Haiyang Wang, Qiangbo Huang:

Image Compression Algorithm Based on Decreasing Bits Coding. 217-220 - Xiang He, Jianjun Liu:

A Digital Watermarking Algorithm for DEM Image Based on Stationary Wavelet Transform. 221-224 - Yan Li, Shengqian Wang, Chengzhi Deng:

Redundant Ridgelet Transform and its Application to Image Processing. 225-228 - Xiao Gang, Jiancang Xie:

Performance Analysis of Chinese Webpage Categorizing Algorithm Based on Support Vector Machines (SVM). 231-235 - Pang Baomao, Shi Haoshan:

Research on Improved Algorithm for Chinese Word Segmentation Based on Markov Chain. 236-238 - Xin-Wei Li, Bao-Long Guo, Lei-Da Li

, Hong-Xin Shen:
A New Histogram Based Image Watermarking Scheme Resisting Geometric Attacks. 239-242 - Ming-Xiang Zang, Na Zhang, Jian-Guo Jiang:

An Adaptive Digital Watermarking Algorithm Based on Balanced Multi-wavelet. 243-246 - Dong-Mei Wu, Jiang-Nan Wang:

An Improved Iris Recognition Method Based on Gray Surface Matching. 247-249 - Fan-jie Meng, Baolong Guo, Lei Guo:

Image Retrieval Based on 2D Histogram of Interest Points. 250-253 - Mei Wang, Li Wang:

An Improved Fusion Algorithm of the Weighted Features and its Application in Image Retrieval. 254-257 - Hongbin Zhang, Jianfeng Ma, Yinchuan Wang, Qingqi Pei:

An Active Defense Model and Framework of Insider Threats Detection and Sense. 258-261
Image Processing and Intelligent Control
- Ye Hou, Bao-Long Guo, Jeng-Shyang Pan

:
The Application and Study of Graph Cut in Motion Segmentation. 265-268 - Fan Yang, Xiaoping Li, Qingkuan Dong, Yanming Liu:

A Dynamic Layering Scheme of Multicast Key Management. 269-272 - Zhanli Li, Yuan Wang:

Research on 3D Reconstruction Procedure of Marked Points for Large Workpiece Measurement. 273-276 - Yang Qiu, Jin Tian, Liuyu Qian:

Research on Video Information Camouflage Processing Algorithm Based on Pulse Amplitude Modulation. 277-280 - Long Chen, Baolong Guo, Wei Sun:

A New Multiple-Objects Tracking Method with Particle Filter. 281-284 - Du Jingyi, Wang Mei, Cai Wenhao:

Support Vector Machine Based on Possibility Degrees and Fault Diagnosis. 285-288 - Yu Han, Bo Yang, Kan Chang, Ziyi Quan:

Optimal Combination of H.264/AVC Coding Tools for Mobile Multimedia Broadcasting Application. 289-293 - Hongxia Ma, Yao Zhao, Chunyu Lin

, Anhong Wang:
Distributed Video Coding Based on Multiple Description. 294-297
Cryptography and Watermarking
- Guosheng Cheng, Jianwei Yang:

A Watermarking Scheme Based on Two-dimensional Wavelet Filter Parametrization. 301-304 - Chuanxian Jiang, Xiaowei Chen, Zhi Li:

Watermarking Relational Databases for Ownership Protection Based on DWT. 305-308 - Changle Zhang, Hong Peng, Xianzhong Long, Zheng Pan, Ying Wu:

A Fragile Software Watermarking for Tamper-Proof. 309-312 - Chengzhi Deng, Huasheng Zhu, Shengqian Wang:

Curvelet Domain Watermark Detection Using Alpha-Stable Models. 313-316 - Enke Li, Shangqian Liu, Shimin Yin, Xiaoning Fu:

Nonuniformity Correction Algorithms of IRFPA Based on Radiation Source Scaling. 317-321 - Zhiyuan Wang, Jianhua Huang, Ziming Guan:

The SOBER Family Ciphers Reconfigurable Processing Architecture Design. 322-326 - Bai Zhongying, Qin Jiancheng:

Webpage Encryption Based on Polymorphic Javascript Algorithm. 327-330 - Dingguo Yu, Nan Chen:

The Improving of IKE with PSK for Using in Mobile Computing Environments. 331-334
Cryptography and its Applications
- Shin-Yan Chiou, Shih-Ying Chang, Hung-Min Sun:

Common Friends Discovery with Privacy and Authenticity. 337-340 - Wu-Chuan Yang, Jhih-Syue Jhou:

Known Signature Attack of ID-Based Multisignature Schemes. 341-343 - Chien-Yuan Chen, Chih-Cheng Hsueh, Yu-Feng Lin:

A Generalization of de Weger's Method. 344-347 - Wu-Chuan Yang:

New Strategy of Efficient SPA-resistant Exponentiations. 348-351 - Huajun Huang, Shaohong Zhong, Junshan Tan:

Browser-Side Countermeasures for Deceptive Phishing Attack. 352-355 - Lu He, Jianbin Lin, Tianzhi Li, Dingyi Fang:

An Anti-attack Watermarking Based on Synonym Substitution for Chinese Text. 356-359 - Wu Peng, Zhigang Wang, Junhua Chen:

Research on Attack Intention Recognition Based on Graphical Model. 360-363 - Jing-pei Wang, Shuifa Sun, Ming Jiang, Dan-gui Xie, Bang Jun Lei:

Anti-protocol Attacks Digital Watermarking Based on Media-Hash and SVD. 364-367
Image Retrieval and Image Analysis
- Yung-Chiang Wei, Jui-Che Teng, Chien-Wen Chung:

Intra-mode Dependent Coding Method for Image Compression. 371-374 - Fu-Kun Chen, Jui-Che Teng, Yue-Dar Jou, Wen-Yuan Liao:

Dynamically Constrained One-Bit Transform for Motion Vector Estimation. 375-378 - Ding-Hrong Chen, Shiang-En Tang:

A Name Recommendation Photo Album Using Probability Neural Network. 379-382 - Jiann-Shu Lee, Hsing-Hsien Wu, Ming-Zheng Yuan:

Lung Segmentation for Chest Radiograph by Using Adaptive Active Shape Models. 383-386 - Jun-qiao Qi, Chang-long Wang, Yan-ming Qi:

The Application on the Evaluation of Quality of Universities Undergraduate Theory Teaching Work Based on Artificial Neural Network. 387-390 - Qunting Yang, Tiegang Gao, Li Fan, Qiaolun Gu:

Analysis of One-way Alterable Length Hash Function Based on Cell Neural Network. 391-395 - Yuanbin Hou, Chunfeng Song, Ning Li:

The Sync Tracing Based on Improved Genetic Algorithm Neural Network. 396-399 - Dianbo Jiang, Yahui Yang, Min Xia:

Research on Intrusion Detection Based on an Improved SOM Neural Network. 400-403
Clustering and Target Detection
- Liu Hua

:
Words Clustering Based on Keywords Indexing from Large-scale Categorization Corpora. 407-410 - Xuedou Yu:

Research on Active Defence Technology with Host Intrusion Based on K-Nearest Neighbor Algorithm of Kernel. 411-414 - Lijian Lu, Xiaojun Ye:

An Improved Weighted-Feature Clustering Algorithm for K-anonymity. 415-418 - Xiaolong Deng, Pingfang Zhou:

A New Interacting Multiple Model Algorithm Based on the Unscented Particle Filter. 419-422 - Xiaokang Zhang, Jianmei Shuai:

A New Feature Selection Method for Malcodes Detection. 423-426 - Rongxian Nie, Guiguang Ding, Jianmin Wang

, Li Zhang:
A New Fingerprint Sequences Matching Algorithm for Content-Based Copy Detection. 427-430 - Gaoyu Zhang:

Infrared Small Weak Target Detection via HOSA. 431-434 - Jun Li, Youdong Ding, Yunyu Shi, Qingyue Zeng:

DWT-Based Shot Boundary Detection Using Support Vector Machine. 435-438
Swarm Intelligence and Data Mining
- Yaping Jiang, Yong Gan, Jianhua Zhou, Zengyu Cai:

A Model of Intrusion Prevention Base on Immune. 441-444 - Ming Li, Kunpeng Wang:

New Greedy Algorithm for Computing Double-Base Chains. 445-450 - Tongrang Fan, Yan Sun, Yongbin Zhao:

An Eco-Defending Architecture for Network Security Based on Immuninty and Mobile Agents. 451-454 - Youchan Zhu, Xueying Guo, Jing Li:

An Improved Genetic Algorithm for Power Grid. 455-458 - Jing Zhou, Guanzhong Dai, De-Quan He, Jun Ma, Xiao-Yan Cai:

Swarm Intelligence: Ant-Based Robot Path Planning. 459-463 - Hsiang-Cheh Huang

, Yueh-Hong Chen, Guan-Yu Lin:
DCT-Based Robust Watermarking with Swarm Intelligence Concepts. 464-467 - Jianming Zhu:

A New Scheme to Privacy-Preserving Collaborative Data Mining. 468-471 - Guangjuan Lv, Ruzhi Xu, Xiangrong Zu, Liwu Deng:

Information Security Monitoring System Based on Data Mining. 472-475
Internet Techniques
- Wei-Min Shi:

ID-Based Non-interactive Deniable Authentication Protocol. 479-482 - Wuping Chen, Lei Zhang, Bo Qin, Qianhong Wu, Huanguo Zhang:

Certificateless One-Way Authenticated Two-Party Key Agreement Protocol. 483-486 - Mengbo Hou, Qiuliang Xu:

A Secure ID-Based Explicit Authenticated Key Agreement Protocol without Key Escrow. 487-490 - Yanping Li, Liaojun Pang:

Multi-party Non-repudiation Protocol with Different Message Exchanged. 491-494 - Yang Jian:

An Improved Scheme of Single Sign-on Protocol. 495-498 - Qingfeng Cheng, Guangguo Han, Chuangui Ma:

A New Efficient and Strongly Secure Authenticated Key Exchange Protocol. 499-502 - Yahui Yang, Yunfei Chen, Min Xia, Juan Ma:

An Automated Mechanism of Security Test on Network Protocols. 503-506 - Jian Liu, Fangmin Li

:
An Improvement of AODV Protocol Based on Reliable Delivery in Mobile Ad Hoc Networks. 507-510
Information Security
- Lih-Chyau Wuu, Yen-Ju Chen, Chi-Hsiang Hung, Wen-Chung Kuo:

Zero-Collision RFID Tags Identification Based on CDMA. 513-516 - Chun-Ta Li

:
An Enhanced Remote User Authentication Scheme Providing Mutual Authentication and Key Agreement with Smart Cards. 517-520 - Yung-Cheng Lee, Wen-Chung Kuo, Yi-Chih Hsieh, Ta-Cheng Chen

:
Security Enhancement of the Authentication Protocol for RFID Systems. 521-524 - Yu-Chih Huang:

Secure Access Control Scheme of RFID System Application. 525-528 - Ling-feng Shi, Xin-Quan Lai, Bao-Long Guo:

Paper Study of Embedded System Design Based on RFID Securities. 529-531 - Kuo-Hui Yeh, Nai-Wei Lo:

Improvement of an EPC Gen2 Compliant RFID Authentication Protocol. 532-535 - Lingling Wang:

A New Multi-bank E-cash Protocol with Anonymity Control. 536-539 - Yang Wu, Li Yang:

Practical Quantum No-key Protocol with Identification. 540-543
Multimedia Processing and Multimedia Interaction
- Jzau-Sheng Lin, Shao-Han Liu, Wu-Chih Hsieh, Yu-Yi Liao, HongChao Wang, QingHua Lan:

Facial Expression Recognition Based on Field Programmable Gate Array. 547-550 - Shen-Chuan Tai, Yi-Ying Chang, Ting-Chou Tsai, Li-Man Liao:

Analysis and Evaluation of Contrast Enhancement Methods in Digital Images. 551-554 - Shen-Chuan Tai, Yi-Ying Chang, Kang-Ming Li, Ting-Chou Tsai:

Contrast Enhancement Method Based on Average Luminance with Weighted Histogram Equalization. 555-558 - Chuin-Mu Wang, Jau-An Chen, Jui-Hsing Chu:

Application of Averaged Learning Subspace Method in MRI Classification. 559-562 - Xiao-Hong Yuan, Zhaoda Zhu, Gong Zhang:

Low Bit Rate ROI-Based SAR Image Compression. 563-567 - Wenbing Chen, Qizhou Li, Jianwei Yang:

Image Retrieval Based on Composite of Mean Shift and Assignment Model. 568-571 - Jianzhen Wu:

A RST Invariant Watermarking Scheme Utilizing Support Vector Machine and Image Moments for Synchronization. 572-574 - Jianzhen Wu:

Image Moment Based Registration Scheme Utilizing Support Vector Machine. 575-577
Image Engineering and Network Security
- Xiaoyue Wu, Baolong Guo, Shengli Qu, Zhuo Wang:

A New Adaptive Image Denoising Method Combining the Nonsubsampled Contourlet Transform and Total Variation. 581-584 - Fu Yan, Wang Mei, Zhang Chunqin:

SAR Image Target Recognition Based on Hu Invariant Moments and SVM. 585-588 - Tao Niu, Yingjiao Zhang, Debo Zhang, Liqiang Liu, Xianjue Luo:

Testability Analysis of Grounding Grids Using Network Transformation. 589-592 - Jin Tian, Yang Qiu, Liuyu Qian:

Research on Algorithm of Digital Filtering Based on Video Information Security. 593-596 - Feng Tong-an, He Jin, Luo Ying:

ISAR Imaging of High Speed Moving Targets Based-on Radon Transform. 597-600 - Xianxiang Wu, Bao-long Guo, Juan Wang:

Octa-Log-Polar Fourier Transform for Image Registration. 601-604 - Juan Li, Yong Feng

, Xuqiang Yang:
An Improved Image Encryption Scheme Based on Line Maps. 605-608 - Xiao-Hong Yuan, Zhaoda Zhu, Gong Zhang:

Multiresolution Target Detection in Wavelet Domain for SAR Imagery. 609-613
Information Security
- Hisham A. Kholidy, Khaled Alghathbar:

A New Accelerated RC4 Scheme Using "Ultra Gridsec" and "HIMAN" and use this Scheme to Secure "HIMAN" Data. 617-622 - Xiang Can, You Lin:

A New Conic Curve Digital Signature Scheme. 623-626 - Xiaoyuan Yang, Zhen Liu, Wei Zhang, Dun-Tao Guo:

A High-efficiency Data Distribution Algorithm in Distributed Storage. 627-630 - Tien-Chin Wang, Shu-Chen Peng, Shu-Chen Hsu, Jui-Fang Chang:

An Approach to Group Decision Making Based on Incomplete Linguistic Preference Relations. 631-634 - Tongjiang Yan, Li Hong:

Constructions of Some Difference-Balanced d-form Functions. 635-637 - Xin Zhao, Yuqin Lv, Wenxin He:

A Novel Micropayment Scheme with Complete Anonymity. 638-642 - Yahui Lu, Li Zhang:

Domain Administration of Task-role Based Access Control for Process Collaboration Environments. 643-647
Anti-attack Schemes and Analysis
- Qiong Liu, Yupu Hu:

A Fast Correlation Attack via Parallel Computing. 651-654 - Liwu Deng, Ruzhi Xu, Lizheng Jiang, Guangjuan Lv:

A Database Protection System Aiming at SQL Attack. 655-657 - Lin Ding

, Guan Jie:
Guess and Determine Attack on SOSEMANUK. 658-661 - Wen Ji, Lei Hu, Haiwen Ou:

Algebraic Attack to SMS4 and the Comparison with AES. 662-665 - Fanyu Kong, Jia Yu:

Number-Theoretic Attack on Lyuu-Wu's Multi-proxy Multi-signature Scheme. 666-668 - Jie Nie, Zhiqiang Wei, Zhen Li:

A New JPEG Resistant Color Image Watermarking Algorithm Based on Quantization Index Modulation. 669-672 - Rey-Sern Lin, Shang-Wen Hu:

A Modified Run-length Image Data Hiding for High Embedding Capacity. 673-676
Soft Computing and Hybrid Intelligent Approaches in Computer Security
- Maheyzah Md Siraj

, Mohd Aizaini Maarof, Siti Zaiton Mohd Hashim:
Intelligent Clustering with PCA and Unsupervised Learning Algorithm in Intrusion Alert Correlation. 679-682 - Anazida Binti Zainal

, Den Fairol Samaon, Mohd Aizaini Maarof, Siti Mariyam Hj. Shamsuddin:
Fuzzy c-Means Sub-Clustering with Re-sampling in Network Intrusion Detection. 683-686 - Ajith Abraham, Crina Grosan

, Hongbo Liu, Yuehui Chen:
Hierarchical Takagi-Sugeno Models for Online Security Evaluation Systems. 687-692 - Jan Platos

, Václav Snásel, Pavel Krömer
, Ajith Abraham:
Detecting Insider Attacks Using Non-negative Matrix Factorization. 693-696 - Xiaodong Shen, Guiguang Ding, Yizheng Chen, Jianmin Wang

:
Adaptive-Push Peer-to-Peer Video Streaming System Based on Dynamic Unstructured Topology. 697-700 - Zengming Tian, Xiangming Wen, Wei Zheng, Yong Sun, Yinbo Cheng:

Evaluation and Simulation on the Performance of DHTs Required by P2PSIP. 701-704 - Qiang Song, Gang Li:

The Research on the Measurement of China Internet Illegal and Harmful Content. 705-709 - Xiaorong Cheng, Kun Xie, Dong Wang:

Network Traffic Anomaly Detection Based on Self-Similarity Using HHT and Wavelet Transform. 710-713
Multimedia Signal Processing for Public Safety and Privacy
- Kazumasa Yamamoto

, Seiichi Nakagawa:
Privacy Protection for Speech Information. 717-720 - Naoki Tadokoro, Tetsuo Kosaka, Masaharu Katoh, Masaki Kohda:

Improvement of Speaker Vector-Based Speaker Verification. 721-724 - Hiroaki Nanjo, Takanobu Nishiura, Hiroshi Kawano:

Acoustic-Based Security System: Towards Robust Understanding of Emergency Shout. 725-728 - Mitsuru Kawamoto

, Futoshi Asano, Koichi Kurumatani, Yingbo Hua:
A System for Detecting Unusual Sounds from Sound Environment Observed by Microphone Arrays. 729-732 - Akinori Ito

, Akihito Aiba, Masashi Ito, Shozo Makino:
Detection of Abnormal Sound Using Multi-stage GMM for Surveillance Microphone. 733-736 - Xiao-li Liu, Shuifa Sun, Jian-wei Zhu, Ming Jiang, Dan-gui Xie:

An Audio Watermarking Method of Resistance Statistics Attack Based on Psychoacoustic Model. 737-739 - Xiaoming Zhang, Zhaoyang Yu:

Cepstrum-Based Audio Watermarking Algorithm against the A/D and D/A Attacks. 740-743 - Limin Hou, Juanmin Xie:

Compensating Function of Formant Instantaneous Characteristics in Speaker Identification. 744-747
Image Engineering and Network Security
- Ya-min Wang, Yan Liu:

Design of DBA Algorithm in EPON Uplike. 751-753 - Jie Liu, Xiaoji Liu, Lin Zheng

:
Cramer-Rao Lower Bound for Non-coherent TOA Estimation with Impulse Signal. 754-757 - Shulin Liu, Li Yan:

Research on Intrinsic Safety Behavior of Inductor-Disconnected-Discharge of Boost DC-DC Converters. 758-761 - Yanzhao Li, Shengli Qu, Jiahui Zhu, Jianqin Sun:

Study on the Control of a Two-wheeled Unstable Vehicle Based on Sensitivity Analysis. 762-765 - Jin Tian, Yang Qiu, Ankun Lin:

Generalized Analysis Model of Information Security of Computer System Based on Electromagnetic Topology. 766-769 - Jizhen Liu, Kehe Wu, Tong Zhang, Gang Ma:

The Design and Implementation of Security Defense Technology Based on Mandatory Running Control. 770-773 - Jianquan Xie, Qing Xie, Chunhua Yang

:
An Accurate Image Juggling Authentication Algorithm. 774-777 - Shaohui Liu

, Lin Ma, Hongxun Yao, Debin Zhao:
Universal Steganalysis Based on Statistical Models Using Reorganization of Block-based DCT Coefficients. 778-781
Volume II
Security Coding Algorithms and Analysis
- Yue Zhang, Jie Liu, Bo Song:

A New Algorithm for Outlier Detection Based on Offset. 3-6 - Lin Chen, Li Li, Yong Hu, Ke Lian:

Information Security Solution Decision-Making Based on Entropy Weight and Gray Situation Decision. 7-10 - Xin-yuan Yang, Zhi Ma, Xin Lu, Hong-Xin Li:

Quantum Secure Direct Communication Based on Partially Entangled States. 11-14 - Faling Yi, Wei Xiong, Zhanpeng Huang, Jie Zhao:

A Multi-view Nonlinear Active Shape Model Based on 3D Transformation Shape Search. 15-18 - Chao Lv, Hui Li, Jianfeng Ma:

Analysis the Properties of TLS Based on Temporal Logic of Knowledge. 19-22 - Wang Yingsong, Chen Wei:

f8 Keystream Generator with SMS4 as Core Algorithm. 23-26 - Yuhui Wang, Ju Dai:

Waveform Analysis Mathematic Based on Ultrasonic Displacement Measurement. 27-29 - Hui Wang, Heli Xu, Bibo Lu, Zihao Shen:

Research on Security Architecture for Defending Insider Threat. 30-33
Cryptanalysis and its Application
- Xu An Wang

, Xiaoyuan Yang, Qingquan Peng:
On Security Notions for Verifiably Encrypted Signature. 37-40 - Fangyong Hou, Nong Xiao, Fang Liu, Hongjun He:

Secure Disk with Authenticated Encryption and IV Verification. 41-44 - Liang Chen, Chengmin Gao, Yong Xu:

Non-interactive Evaluation of Encrypted Elementary Functions. 45-48 - Baocang Wang, Hui Liu, Yupu Hu:

Cryptanalysis of a Knapsack Public Key Cryptosystem. 49-52 - Weidong Zhang, Baocang Wang, Yupu Hu:

A New Knapsack Public-Key Cryptosystem. 53-56 - Yang Lu, Jiguo Li:

Forward-Secure Certificate-Based Encryption. 57-60 - Lin Zhang, Jianhua Wu, Nanrun Zhou

:
Image Encryption with Discrete Fractional Cosine Transform and Chaos. 61-64 - Jianhong Zhang, Qin Geng:

Cryptoanalysis of Two Signcryption Schemes. 65-68
3D Model Retrieval and Data Hiding
- Lin-Lin Tang, Zhe-Ming Lu, Fa-Xin Yu:

A Novel Multiple Description Coding Frame Based on Reordered DCT Coefficients and SPIHT Algorithm. 71-74 - Ji-Xin Liu, Zhe-Ming Lu, Hao Luo:

A CELP-Speech Information Hiding Algorithm Based on Vector Quantization. 75-78 - Yue-nan Li, Zhe-ming Lu:

Video Identification Using Spatio-temporal Salient Points. 79-82 - Mazdak Zamani

, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Akram M. Zeki
, Pritheega Magalingam
:
A Novel Approach for Audio Watermarking. 83-86 - Yang Ming, Yumin Wang:

Efficient Certificate-Based Signature Scheme. 87-90 - Rashidah Kadir, Mohd Aizaini Maarof:

A Comparative Statistical Analysis of Pseudorandom Bit Sequences. 91-94 - Kai Wang, Yan Liu, Xiaowei Sun:

Small Moving Infrared Target Detection Algorithm under Low SNR Background. 95-97 - Yueh-Hong Chen, Hsiang-Cheh Huang

:
Collusion-Resilient Fingerprinting Using Cropping and Subsampling. 98-101
Internet Security and Electronic Commerce Security
- Yu-Chi Chen

, Gwoboa Horng
, Chang-Chin Huang:
Privacy Protection in On-line Shopping for Electronic Documents. 105-108 - Yu-Yi Chen, Jun-Chao Lu, Shin-I Chen, Jinn-ke Jan:

A Low-cost RFID Authentication Protocol with Location Privacy Protection. 109-113 - Hung-Min Sun, Muh-Chyi Leu:

A Real-Time Selective Video Encryption Using Context-Key Control. 114-117 - Changlu Lin, Lein Harn, Dingfeng Ye:

Ideal Perfect Multilevel Threshold Secret Sharing Scheme. 118-121 - Chung-Huang Yang, Shih-Yi Tu, Pei-Hua Yen:

Implementation of an Electronic Voting System with Contactless IC Cards for Small-Scale Voting. 122-125 - Chu-Hsing Lin, Jung-Chun Liu, Ching-Ru Chen:

Access Log Generator for Analyzing Malicious Website Browsing Behaviors. 126-129 - Sebastian Roschke, Feng Cheng, Christoph Meinel:

An Extensible and Virtualization-Compatible IDS Management Architecture. 130-134 - Qinqin Ni, Weizhen Sun, Sen Ma:

Deadlock Detection Based on Resource Allocation Graph. 135-138
Network Security
- Lidong Wang, Liping Qian:

Exploiting RFC2828 as a Domain Vocabulary for Identifying IT Security Literature. 141-144 - Hongshan Kong, Mingqing Zhang, Jun Tang, Changyuan Luo:

The Research of Simulation for Network Security Based on System Dynamics. 145-148 - Xiaobin Tan, Guihong Qin, Yong Zhang, Ping Liang:

Network Security Situation Awareness Using Exponential and Logarithmic Analysis. 149-152 - David Wampler, Huirong Fu, Ye Zhu:

Security Threats and Countermeasures for Intra-vehicle Networks. 153-157 - Zhanyong Tang, Rui Qi, Dingyi Fang

, Yangxia Luo:
W-Aegis: A Propagation Behavior Based Worm Detection Model for Local Networks. 158-162 - Lina Zhu, Chao-yi Sun, Li Feng:

Research on Early Warning for Worm Propagation Based on Area-Alert-Level. 163-166 - Junhua Chen, Shengjun Wei:

Modeling and Analyzing the Spread of Worms with Bilinear Incidence Rate. 167-170 - Pantelis Kammas

, Thodoros Komninos, Yannis C. Stamatiou
:
Modeling the Co-evololution DNS Worms and Anti-worms in IPv6 Networks. 171-174
System Design and Implementation III
- Zhifang Wang, Qiong Li, Xiamu Niu, Christoph Busch:

Multimodal Biometric Recognition Based on Complex KFDA. 177-180 - Zhenjun Du, Rong Chen:

An Approach to Checking SOC Timing Safety. 181-184 - Yuzhu Cheng, Chunrong Qiu, Weiqi Tang, Wenda Deng:

Research on System of Chinese Document Copy Detection. 185-188 - Ruo-Fei Han, Hou-Xiang Wang, Yu-Hua Wang, Kai-Ling Zuo:

Membership-Based Access Control for Trust Negotiation in Open Systems. 189-192 - Guanghui Liu:

ECC-Cache: A Novel Low Power Scheme to Protect Large-Capacity L2 Caches from Transiant Faults. 193-199 - Xin Yu, Yuping Wang:

Secure Constructing Bluetooth Scatternet Based on BTCP. 200-203 - Feng Wang, Xia Liu, Marek E. Bialkowski:

Space Time Block Coded MIMO System with Redundant Antennas. 204-207 - D. Rajaveerappa, Abdelsalam Almarimi:

RSA/Shift Secured IFFT/FFT Based OFDM Wireless System. 208-211
Image Processing and its Applications
- Zhihua Xie, Shiqian Wu

, Guodong Liu, Zhijun Fang:
Infrared Face Recognition Based on Radiant Energy and Curvelet Transformation. 215-218 - Gaoping Li:

Fast Fractal Image Coding Using Ambient-Cross Sum of Normalized Block. 219-222 - Jing Zheng, QiGui Zhang, Xuemei Zhang:

Lossy Compression of CFA Image Based on Multiwavelet Packet. 223-226 - Baojun Han, Yan Liu:

An Improved SPECK Image Coding Algorithm. 227-229 - Hai-ying Gao, Guo-qiang Liu, Xu Li, Yin Xu:

A Robust Watermark Algorithm for JPEG2000 Images. 230-233 - Che Hong, Sun Longhe:

A Novel Method for Plane Array Infrared Image to Detect Point Target. 234-240 - Wenjuan Zhang, Weibin Zhang:

A New Image Restoration Algorithm Based on Variational Derivative. 241-244 - Wenbing Chen, Xiaolei Zhang, Jianwei Yang:

Visibility Estimation Based on Mean Shift. 245-248
Internet Security and Electronic Commerce Security
- Fang-Yie Leu, Zhi-Yang Li:

Detecting DoS and DDoS Attacks by Using an Intrusion Detection and Remote Prevention System. 251-254 - Fang-Yie Leu, Chia-Chi Pai:

Detecting DoS and DDoS Attacks Using Chi-Square. 255-258 - Shiuh-Jeng Wang, Yuh-Ren Tsai

, Chien-Chih Shen, Pin-You Chen:
Hierarchical Key Agreement Protocols in Group-User Systems. 259-262 - Yu Zhang, Xingshe Zhou, Yee Wei Law

, Marimuthu Palaniswami
:
Insider DoS Attacks on Epidemic Propagation Strategies of Network Reprogramming in Wireless Sensor Networks. 263-266 - Hamza Rahmani, Nabil Sahli

, Farouk Kamoun
:
Joint Entropy Analysis Model for DDoS Attack Detection. 267-271 - Jibin Ma, Huiling Gu, Yonghao Sun, Xujie Hu:

Risk Assessment Model on the Internal Corporate Governance Based on the SPA. 272-276 - Xuyan Wu, Huiling Gu, Xujie Hu, Yuhong Dong:

Appraisal Model of MIS in Enterprises Based on the Unascertained Measurement. 277-280 - Ying Sun, Chunxiang Xu, Fagen Li, Yong Yu

:
Identity Based Multi-proxy Multi-signcryption Scheme for Electronic Commerce. 281-284
Security in Sensor Networks
- Xiaoqing Li, Hui Li, Jianfeng Ma, Weidong Zhang:

An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks. 287-290 - Sibo Liu, Liaojun Pang, Qingqi Pei, Hua Ma, Qingquan Peng:

Distributed Event-Triggered Trust Management for Wireless Sensor Networks. 291-294 - Huixian Li, Liaojun Pang:

A Novel Biometric-Based Authentication Scheme with Privacy Protection. 295-298 - Liqiang Mao, Jianfeng Ma, Xuewen Dong:

Towards Provably Secure On-demand Source Routing in MANET. 299-302 - Feng Chen, Weihua Li, Dingyi Fang, Xiaojiang Chen:

Research on Integration of Safety Analysis in Model-Driven Software Development. 303-306 - Xiaoqing Gong, Yi Wang, Hui Li, Jian He:

An Authentication Protocol Applied to RFID Security Systems. 307-310 - Ying Chen, Jian Shu, Hong Liu, Linlan Liu, Jiajie Gong:

MRDWA: Multi-role Dynamic Weighting Aggregation Algorithm in Event Driven Wireless Sensor Networks. 311-314 - Jianwen Zhao, Yuanbin Hou:

An Identification Method for Transient Capacitive Current of Distribution Network by ICMAC. 315-318
Identity Validation and Internet Protocol
- Han Xiao, Zu-xun Zhang, Qiang Wang, Hua-liang Hu:

Development of a Java-Oriented Software General Component Library. 321-325 - Peng Sun, Hongtao Lu:

Two Efficient Fragile Web Page Watermarking Schemes. 326-329 - Yonghong Yu:

Researches on Integrating Database Access Control and Privacy Protection. 330-333 - Ningning Lu, Huachun Zhou, Hongke Zhang:

A New Source Address Validation Scheme Based on IBS. 334-337 - Xiao Dong Wang, Mike Jones

, Jens Jensen, Andrew Richards, David Wallom
, Tiejun Ma, Robert Frank, David Spence, Steven Young, Claire Devereux, Neil Geddes:
Shibboleth Access for Resources on the National Grid Service (SARoNGS). 338-341 - Rui Xu, Wen-li Ma, Wen-ling Zheng:

Defending against UDP Flooding by Negative Selection Algorithm Based on Eigenvalue Sets. 342-345 - Cui-Mei Bao:

Intrusion Detection Based on One-class SVM and SNMP MIB Data. 346-349 - Baoyi Wang, Ranran Jin, Shaomin Zhang, Xiaomin Zhao:

Research on Gravity-Based Anomaly Intrusion Detection Algorithm. 350-353
Image Clustering and Feature Analysis
- Wenbing Chen, Jianwei Yang, Wangwei:

Image Retrieve Based on Primary Clusters. 357-360 - Xiaosheng Wu, Junding Sun:

An Effective Texture Spectrum Descriptor. 361-364 - Xiao-ning Fu, En-ke Li, Wen-jing Gao:

Texture Feature Analysis on Erosion and Wear in Artillery Chamber. 365-368 - Shan Zhao, Jing Liu:

Image Retrieval Based on Character-Matching Technology. 369-372 - Ping Ye, Guirong Weng:

Microarray Image Segmentation Using Region Growing Algorithm and Mathematical Morphology. 373-376 - Yongyue Chen, Huosong Xia:

A Study on the Algorithm Based on Image Color Correlation Mining. 377-380 - Zhenhua Zhang, Wenhui Li, Bo Li:

An Improving Technique of Color Histogram in Segmentation-based Image Retrieval. 381-384 - Ming-Kan Wu, Jing-Siang Wei, Hao-Chung Shih, Chian C. Ho:

2-Level-Wavelet-Based License Plate Edge Detection. 385-388
System Design and Implementation
- Dan Zhang, Wentao Sui:

Bearings Fault Diagnosis Based on the Optimal Impulse Response Wavelet. 391-394 - Kefeng Fan, Subing Zhang, Wei Mo:

A Digital Certificate Application Scheme in Content Protection System for High Definition Digital Interface. 395-398 - Ning-ning Liang, Xuan-yong Zhu:

Research on Equiponderant Forwarding within Multi-nexthop Interfaces. 399-401 - Qing-hua Zhang, Han Zhang, Zhao-hui Li:

One-way Hash Function Construction Based on Conservative Chaotic Systems. 402-405 - Ji-fang Jin, Er-hong Lu, Xian-wei Gao:

Resistance DPA of RSA on Smartcard. 406-409 - Wenbiao Peng, Chaojun Yan, Xinqiong Liu, Lihua Deng:

Emergency Command System for Geologic Disasters Prevention. 410-413 - Lihua Deng:

Study on Ultrasonic Ranging System Design. 414-416 - Zhenping Zhang, Jitao Fang, Runhuan Jing:

Interactive Visualisation of 3D City Models Based on Adaptive Streaming of 3D-GIS Data. 417-420
Security in Sensor Networks
- Yulong Shen, Qijian Xu, Zuoshun Wu, Hao Yin, Jianfeng Ma:

A New Hybrid Routing Protocol in Heterogeneous Wireless Networks. 423-426 - Qingqi Pei, Lei Wang, Hao Yin, Liaojun Pang, Hong Tang:

Layer Key Management Scheme on Wireless Sensor Networks. 427-431 - Xiaoyan Zhu, Hao Yue, Yumin Wang:

C and M: A New Network Coding Scheme for Wireless Networks. 432-436 - Wang Mei, Xiaochuan Sun, Zheng Hao:

Range-Free Fast and Rough Nodes Localization Algorithm in Wireless Sensor Networks. 437-440 - Li Mingming, Li Baiping, Li Wei, Chen Lei:

Information Security Wireless Sensor Grid. 441-445 - Chen Chen, Li Hui, Qingqi Pei, Ning Lv, Qingquan Peng:

An Effective Scheme for Defending Denial-of-Sleep Attack in Wireless Sensor Networks. 446-449 - Wei Ren

, Yi Ren, Hui Zhang:
H2S: A Secure and Efficient Data Aggregative Retrieval Scheme in Unattended Wireless Sensor Networks. 450-453 - Faeiz Alserhani, Monis Akhlaq, Irfan-Ullah Awan, John Mellor, Andrea J. Cullen, Pravin Mirchandani:

Evaluating Intrusion Detection Systems in High Speed Networks. 454-459
E-commerce and E-payment Security
- Jielin Fu, Yongjun Tang:

A Parity Check Node Synchronization Based Method for Solving Phase Ambiguity Problem in DVB-S Systems. 463-466 - Kai Fan, Hui Li, Yue Wang:

Security Analysis of the Kerberos Protocol Using BAN Logic. 467-470 - Xing Liu, Yan Li, Mian Cai, Ying Guo:

The Testing and Evaluating System for the Security Operating System Based on the Mechanism of Keyword-Driven. 471-474 - Yike Yu, Xuefeng Zheng, Mingde Zhang, Qingguo Zhang:

An Identity-Based Authentication Model for Mobile Agent. 475-478 - Lin Zheng

, Wei Ge, Hongbing Qiu:
Performance Analysis of Analog LMS Multiuser Receiver in Transmitted-Reference UWB System. 479-482 - Jin-fu Wang:

E-government Security Management: Key Factors and Countermeasure. 483-486 - Shuliang Zheng, Doingxing Jiang, Qixin Liu:

A Role and Activity Based Access Control Model for University Identity and Access Management System. 487-490 - Shaomin Zhang, Xiayan Zhang, Baoyi Wang:

History and Future Information Based Trust Model in C2C E-commerce. 491-494
Image Filtering and its Application
- Weibin Zhang, Wenjuan Zhang:

A Variational Model Combining Curvelet Shrinkage and Nonlinear Anisotropic Diffusion for Image Denoising. 497-500 - Han Yu:

Image De-noising Based on Nonlocal Diffusion Tensor. 501-504 - Jin He, Yinpei Sun, Ying Luo, Qun Zhang:

A Joint Multiscale Algorithm with Auto-adapted Threshold for Image Denoising. 505-508 - Liu Weiguang, Wang Wenqi, Cui Jiangtao:

A New Scheme for Multisensor Image Fusion System. 509-512 - Li Li, Han Yu:

Nonlocal Curvature-Driven Diffusion Model for Image Inpainting. 513-516 - Jin Wang, Heechang Kim, Jongho Kim, Jechang Jeong:

Adaptive Spatially Postprocessing Technique to Remove Blocking Artifacts for DCT Coded Image. 517-520 - Benyong Liu, Xiang Liao:

Image Denoising and Magnification via Kernel Fitting and Modified SVD. 521-524
System Design and Implementation (II)
- Bryan Stewart Cline:

Organizational Barriers to the Implementation of Security Engineering. 527-531 - Yanzhao Li:

National Information Infrastructure Security and Cyber Terrorism in the Process of Industrializations. 532-535 - Xiaorong Cheng, Yan Wei, Xin Geng:

A Support Vector Machines Security Assessment Method Based on Group Decision-Marking for Electric Power Information System. 536-539 - Ganthan Narayana Samy

, Rabiah Ahmad, Zuraini Ismail
:
Threats to Health Information Security. 540-543 - Li-zhong Geng, Hui-bo Jia:

An Intrusion Detection System for Network Storage Based on System Calls. 544-547 - Zhao Wusheng, Fu Yongqing, Han Zhixue:

The Method of Equalization Based on Iterative Interference Cancellation for SCCPM System. 548-551 - Yalei Cui, Zibin Dai:

The Research of NULL Convention Logic Circuit Computing Model Targeted at Block Cipher Processing. 552-555 - Damin Zhang, Shaohong Cai:

Dynamic Behavior of SIS Epidemic Model with Feedback on Regular Lattic. 556-559
Network Security
- Shangping Zhong, Xiangwen Liao

, Xue Zhang, Jingqu Lin:
A Novel Distributed Single Sign-On Scheme with Dynamically Changed Threshold Value. 563-566 - Yuan Bai, Xing Zhang, Bin Sun:

Building Trust Territory in Ad Hoc Networks. 567-570 - Qiang Song, Gang Li:

Cost-Benefit Analysis of China's Internet Content Regulation. 571-575 - Damin Zhang

, Shaohong Cai:
Dynamic Behavior of SIRS Model with Feedback on Complex Networks. 576-579 - Deepa Susan Rajan, Chetan Yeole, Harsha Nakade, Huirong Fu, Ye Zhu:

Position Verification in Multi-hop Vehicular Networks. 580-584 - Ji Lu, Song Xiao, Chengke Wu:

Efficient Protection Scheme for SVC Content Based on Network Coding. 585-588 - Zhenyu Liu, Weijun Li, Yue Lai:

Application of Bloom Filter for GTP Stateful Inspection in Network Processor. 589-592 - Kazuhiro Kono, Shinnosuke Nakano, Yoshimichi Ito, Noboru Babaguchi:

Performance Analysis of Anonymous Communication System 3-Mode Net. 593-596
Watermarking Techniques, Steganography, and Visual Cryptography
- Tzu-Chuen Lu, Ying-Hsuan Huang:

An Effective Lossless Hiding Technique Based on Reversible Contrast Mapping and Histogram Embedding Methods. 599-602 - Chyuan-Huei Thomas Yang, Chun-Hao Hsu:

A High Quality Reversible Data Hiding Method Using Interpolation Technique. 603-606 - Cheng-Hsing Yang, Cheng-Ta Huang, Shiuh-Jeng Wang:

Reversible Steganography Based on Side Match and Hit Pattern for VQ-Compressed Images. 607-610 - Zhao-Xia Yin, Chin-Chen Chang, Yan-Ping Zhang:

A High Embedding Efficiency Steganography Scheme for Wet Paper Codes. 611-614 - Chin-Feng Lee, Kuo-Nan Chen, Chin-Chen Chang, Meng-Cheng Tsai:

A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation. 615-618 - Jing-Ming Guo, Chia-Hao Chang:

Prediction-Based Watermarking Schemes for DCT-Based Image Coding. 619-622 - Kuo-Cheng Liu:

Human Visual System Based Watermarking for Color Images. 623-626 - Xiaoyuan Yang, Shifeng Wang, Jia Liu:

Universal Steganalysis to Images with WBMC Model. 627-630
E-commerce and E-payment Security
- Kai Fan, Yue Wang, Hui Li:

A New Abuse-Free Fair Electronic Payment Protocol. 633-636 - Fenghua Li, Wei Wang, Jianfeng Ma, Haoxin Su:

Action-Based Access Control for Web Services. 637-642 - Xiaoyuan Yang, Zhongyin Liang, Ping Wei, Junwei Shen:

A Provably Secure Certificateless Blind Signature Scheme. 643-646 - Mingde Zhang, Xuefeng Zheng, Wensheng Yang, Shuwang Lv, Qingguo Zhang:

Research on Model of Trust Degrees for PKI. 647-650 - Li Wei, Chen Ming, Li Mingming:

Information Security Routing Protocol in the WSN. 651-656 - Xu An Wang

, Xiaoyuan Yang:
Proxy Re-encryption Scheme Based on SK Identity Based Encryption. 657-660 - Ying Sun, Chunxiang Xu, Qi Xia, Yong Yu

:
Analysis and Improvement of a Proxy Blind Multi-signature Scheme without a Secure Channel. 661-664 - Wei Ding

, Matthew J. Hausknecht, Shou-Hsuan Stephen Huang, Zach Riggle:
Detecting Stepping-Stone Intruders with Long Connection Chains. 665-669
Hybrid Techniques
- Jingran Wang, Haifeng Qian:

An Optimal Blind Signature Padding with Message Recovery. 673-676 - Ruichao Zhang, Lianhai Wang, Shuhui Zhang:

Windows Memory Analysis Based on KPCR. 677-680 - Jing Wang, Xiaola Lin

:
An Efficient Hierarchical Group Key Management Scheme Based on Orthogonal Vectors. 681-684 - Xin Yu, Yu Bai:

A Method for Accessing Trusted Services Based on Service-Oriented Architecture. 685-688 - Lihua Yin, Yunchuan Guo:

Research on Quantitative Evaluation for Integrity. 689-692 - Shudong Wang, Xiaohua Wang:

Research on New Classification Methods of Remote Sensing of Mass Ingredient without Vegetation of Hei Shan Gorge in Yellow River Basin. 693-696 - Baiwen Fu:

A Rapid Algorithm and its Implementation for Modular Inversion. 697-700 - Mingkun Yang:

Optimal Information Rates of Novel Graph Based Access Structures. 701-704
Security Applications
- Lei Xiong, Duyan Bi, Xu Zhou, Shiping Ma:

Boosting Graph Embedding with Application to Facial Expression Recognition. 707-710 - Feng Tian, Xiao-bing Han, Ying Wei:

Application and Research of Mobile E-commerce Security Based on WPKI. 711-714 - Bachar Alrouh

, Gheorghita Ghinea
:
A Performance Evaluation of Security Mechanisms for Web Services. 715-718 - Xiao-Long Ma, Zhiwei Wang, Lize Gu, Yixian Yang:

Remark on Yu et al.'s Online/Offline Signature Scheme in CT-RSA 2008. 719-720 - Mohammad Ashiqur Rahaman, Henrik Plate, Yves Roudier, Andreas Schaad:

Towards Secure Content Based Dissemination of XML Documents. 721-724 - Li Chang Jiang, Zhong Zhang, Tetsuo Miyake, Takashi Imamura, Hisanaga Fujiwa:

Reducing Specular Reflection Components of Chrome-Plated Surface with Varying Light Direction. 725-728 - Qiang Gao, Miao Han, Shu-liang Hu, Hai-jie Dong:

Design of Fault Diagnosis System of FPSO Production Process Based on MSPCA. 729-733 - Caimei Wang, Zhengmao Li

:
Self-selecting Sub-secret Keys Sharing Scheme Based on Polynomials over Elliptic Curve. 734-737
System Design and Implementation
- Huan Shen, Shun Ming Li, Jian Guo Mao, Fang Chao Bo, Fang Pei Li, Hua Peng Zhou:

A Robust Vehicle Tracking Approach Using Mean Shift Procedure. 741-744 - Guo-jing Li, Tao Wen:

Augmented Addition Operation of Conic Curves over Ring Zn. 745-748 - Yang Zhang, Jingjun Zhang, Dongwen Zhang:

Implementing and Testing Producer-Consumer Problem Using Aspect-Oriented Programming. 749-752 - Hao-Chung Shih, Chian C. Ho:

Soft DSP Design Methodology of Face Recognition System on Nios II Embedded Platform. 753-756 - Rabiah Ahmad, Ganthan Narayana Samy

, Nuzulha Khilwani Ibrahim, Peter A. Bath
, Zuraini Ismail
:
Threats Identification in Healthcare Information Systems Using Genetic Algorithm and Cox Regression. 757-760 - Baoyi Wang, Jing Li, Shaomin Zhang, Xueying Guo:

Scanning Task Scheduling Strategy in Distributed Vulnerability Detection System. 761-764 - Donghai Tian, Changzhen Hu, Yang Qi, Jianqiao Wang:

Hierarchical Distributed Alert Correlation Model. 765-768 - Shaomin Zhang, Haiyan Zhang, Baoyi Wang:

Study on Centralized Authorization Model Supporting Multiple Access Control Models. 769-772

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














