default search action
IAS 2009: Xi'An, China
- Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3744-3
Volume I
Digital Rights Management
- Xiaojiang Chen, Dingyi Fang, Jingbo Shen, Feng Chen, Wenbo Wang, Lu He:
A Dynamic Graph Watermark Scheme of Tamper Resistance. 3-6 - Zhen Yang, Kefeng Fan, Yingxu Lai:
Trusted Computing Based Mobile DRM Authentication Scheme. 7-10 - Xiaoyuan Yang, Yao Guo, Ke Niu, Xiang Wu:
An Authenticating Algorithm with Multi-compression Compatible in DCT Domain. 11-14 - Xiaoyuan Yang, Xiang Wu, Minqing Zhang:
Audio Digital Signature Algorithm with Tamper Detection. 15-18 - Huixian Li, Man Wang, Liaojun Pang, Weidong Zhang:
Key Binding Based on Biometric Shielding Functions. 19-22 - Yang Zhan, Haibo Tian, Qingqi Pei, Yueyu Zhang, Yumin Wang, Weidong Zhang:
A Deep Copy Protection Framework for Electronic Devices within Home. 23-26 - Yanping Li, Liaojun Pang, Yuming Wang:
Attacks on a Universal Designated Verifier Signature Scheme. 27-30 - Yuxin Ma, Jiancang Xie, Jungang Luo:
Image Enhancement Based on Nonsubsampled Contourlet Transform. 31-34
Multimedia in Ubiquitous Computing and Security Services
- Mn-Ta Lee, Hsuan T. Chang, Mu-Liang Wang:
Image Watermarking Using Phase-Shifting Digital Holography Embedded in the Wavelet Domain. 37-40 - Iuon-Chang Lin, Shu-Yan Huang:
A Polynomial Based Key Establishment Scheme for Heterogeneous Sensor Networks. 41-44 - Meng-Hsiun Tsai, Ming-Hung Wang, Ting-Yuan Chang, Pei-Yan Pai, Yung-Kuan Chan:
An Adaptable Threshold Decision Method. 45-48 - Ching-Lung Chang, Jia-Yi Syu, Yuan-Sun Chu:
Zero Packet Loss Hand-off Mechanism in SIP-Based Wireless Networks. 49-52 - Shin-Jia Hwang, Ming-Jhang Chai:
A New Authenticated Key Agreement Protocol for Wireless Mobile Networks. 53-56 - Hsien-Huang P. Wu, Shih-Hsin Chang, Ping-Kuo Weng, Soon-Lin Chen:
Economical Dental Stereoradiography in Digital Era. 57-60 - Chin-Chen Chang, Yen-Chang Chen, Chia-Chen Lin:
A Resistant Secret Sharing Scheme. 61-64
Image Processing and Intelligent Control
- Liu Yang, Baolong Guo, Jianmin Lv:
A Modified Feature Based Image Watermarking Scheme in NSCT Domain. 67-70 - Liqiang Liu, Xianjue Luo, Tao Niu, Kai Wang:
Grounding Grid Corrosion Diagnosis Based on Large Change Sensitivity. 71-74 - Jun Ma, Guanzhong Dai, Jing Zhou:
Anomalous Payload Detection System Using Analysis of Frequent Sequential Pattern. 75-78 - Jie Jiang, Wei Mo, Jianmin Lv:
An Enhanced Block Mode Selection Method for Surveillance Video Communication. 79-82 - Mei Wang, Huifeng Zhang, Yong Yan:
The Detection of Bi-frequency Weak Signal Based on Chaos and Correlation. 83-86 - Xian-Min Ma, Che Liang:
Application of Rough Set Theory in Coal Gangue Image Process. 87-90 - Yu Han, Aidong Men, Kan Chang, Ziyi Quan:
GOP-Level Transmission Distortion Modeling for Video Streaming over Mobile Networks. 91-95 - Cheng Deng, Jie Li, Meng Jia, Xinbo Gao:
Sinusoidal Signals Pattern Based Robust Video Watermarking in the 3D-CWT Domain. 96-99
Video Coding Schemes
- Fuqiang Zhang, Junli Li, Gang Chen, Jiaju Man:
Assessment of Color Video Quality with Singular Value Decomposition of Complex Matrix. 103-106 - Min Li, Bo Wang:
Hybrid Video Transcoder for Bitrate Reduction of H.264 Bit Streams. 107-110 - Min Li, Bo Wang:
Whole Frame Loss Recovery Algorithm for H.264 Decoders. 111-114 - Bo Wang, Dichen Liu:
A Frequent-Domain VideoTranscoder with Spatial Downscaling for H.264/AVC. 115-118 - Yin Wang, Xiangming Wen, Xinqi Lin, Peizhou He, Wei Zheng:
A Novel Video Shot Segmentation Based on Textural Features. 119-122 - Zhaopeng Cui, Dujuan Wang, Guang Jiang, Chengke Wu:
Octagonal Search Algorithm with Early Termination for Fast Motion Estimation on H.264. 123-126 - Anhong Wang, Yao Zhao, Zhihong Li:
A Two-Description Distributed Video Coding. 127-130
Fuzzy Applications
- Ximing Li, Bo Yang, Yubin Guo:
Fuzzy Identity Based Encryption Scheme with Some Assigned Attributes. 133-136 - Quan Feng, Fei Su, Anni Cai:
Encrypted Fuzzy Vault Based on Fingerprint. 137-140 - Qiuqin Lu, Guangqiu Huang:
An Attack Model Based on Both-Branch Fuzzy Logic and Fuzzy Petri Net. 141-144 - Xuyan Wu, Huiling Gu, Xujie Hu, Yuhong Dong:
Application of the Fuzzy Entropy Weight in Risk Assessment of the Engineering Project. 145-148 - Xian-Bo He, Li Yang, Xian-hua Zeng, Gang-yuan Zhang, Xing-qiang Zhao:
An Adaptive Fuzzy Scheduling and Fuzzy-PID Perfomance Control Model Being Suitable to Soft Real-Time Systems. 149-153 - Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof:
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls. 154-157 - Qingnian Wang, Kun Yan, Xiaofeng Wan, Meiling Yuan:
Application of Particle Swarm Optimization in Fussy Neural Networks. 158-161
System-on-Chip for Signal Processing
- Jing-Wun Lin, Chen-Chieh Wang, Chin-Yao Chang, Chung-Ho Chen, Kuen-Jong Lee, Yuan-Hua Chu, Jen-Chieh Yeh, Ying-Chuan Hsiao:
Full System Simulation and Verification Framework. 165-168 - Yin-Tsung Hwang, Hua-Hsin Luo:
Automatic IP Interface Synthesis Supporting Multi-layer Communication Protocols in SoC Designs. 169-172 - Chih-Hsien Hsia, Ding-Wei Huang, Jen-Shiun Chiang, Zong-Jheng Wu:
Moving Object Tracking Using Symmetric Mask-Based Scheme. 173-176 - Chia-Cheng Lo, Jung-Guan Luo, Ming-Der Shieh:
Hardware/Software Codesign of Resource Constrained Real-Time Systems. 177-180 - Tsung-Han Tsai, Chung-Yuan Lin, De-Zhang Peng, Giua-Hua Chen:
Design and Integration for Background Subtraction and Foreground Tracking Algorithm. 181-184 - Shyue-Wen Yang, Ming-Hwa Sheu, Jun-Jie Lin, Chuang-Chun Hu, Tzu-Hsiung Chen, Shau-Yin Tseng:
Parallel 3-Pixel Labeling Method and its Hardware Architecture Design. 185-188 - Kan Chang, Bo Yang, Wenhao Zhang:
Novel Fast Mode Decision Algorithm for P-Slices in H.264/AVC. 189-193
Digital Rights Management
- Jing-Ming Guo, Yun-Fu Liu:
Majority-Parity-Guided Watermarking for Block-Truncated Images. 197-200 - Jing-Ming Guo, Jia-Jin Tsai:
Data Hiding in Halftone Images Using Adaptive Noise-Balanced Error Diffusion and Quality-Noise Look Up Table. 201-204 - Yongsoo Choi, Hyoung Joong Kim:
Improving the Modified Matrix Encoding on Steganography Method. 205-208 - Masaaki Fujiyoshi, Seungwu Han, Hitoshi Kiya:
Reversible Information Hiding Considering Hierarchical Access Control. 209-212 - Hui Li, Zhijin Guan, Shanli Chen, Yuxin Chen:
The Reversible Network Cascade Based on Reversible Logic Gate Coding Method. 213-216 - Shengbing Che, Zuguo Che, Haiyang Wang, Qiangbo Huang:
Image Compression Algorithm Based on Decreasing Bits Coding. 217-220 - Xiang He, Jianjun Liu:
A Digital Watermarking Algorithm for DEM Image Based on Stationary Wavelet Transform. 221-224 - Yan Li, Shengqian Wang, Chengzhi Deng:
Redundant Ridgelet Transform and its Application to Image Processing. 225-228 - Xiao Gang, Jiancang Xie:
Performance Analysis of Chinese Webpage Categorizing Algorithm Based on Support Vector Machines (SVM). 231-235 - Pang Baomao, Shi Haoshan:
Research on Improved Algorithm for Chinese Word Segmentation Based on Markov Chain. 236-238 - Xin-Wei Li, Bao-Long Guo, Lei-Da Li, Hong-Xin Shen:
A New Histogram Based Image Watermarking Scheme Resisting Geometric Attacks. 239-242 - Ming-Xiang Zang, Na Zhang, Jian-Guo Jiang:
An Adaptive Digital Watermarking Algorithm Based on Balanced Multi-wavelet. 243-246 - Dong-Mei Wu, Jiang-Nan Wang:
An Improved Iris Recognition Method Based on Gray Surface Matching. 247-249 - Fan-jie Meng, Bao-Long Guo, Lei Guo:
Image Retrieval Based on 2D Histogram of Interest Points. 250-253 - Mei Wang, Li Wang:
An Improved Fusion Algorithm of the Weighted Features and its Application in Image Retrieval. 254-257 - Hongbin Zhang, Jianfeng Ma, Yinchuan Wang, Qingqi Pei:
An Active Defense Model and Framework of Insider Threats Detection and Sense. 258-261
Image Processing and Intelligent Control
- Ye Hou, Bao-Long Guo, Jeng-Shyang Pan:
The Application and Study of Graph Cut in Motion Segmentation. 265-268 - Fan Yang, Xiaoping Li, Qingkuan Dong, Yanming Liu:
A Dynamic Layering Scheme of Multicast Key Management. 269-272 - Zhanli Li, Yuan Wang:
Research on 3D Reconstruction Procedure of Marked Points for Large Workpiece Measurement. 273-276 - Yang Qiu, Jin Tian, Liuyu Qian:
Research on Video Information Camouflage Processing Algorithm Based on Pulse Amplitude Modulation. 277-280 - Long Chen, Bao-Long Guo, Wei Sun:
A New Multiple-Objects Tracking Method with Particle Filter. 281-284 - Du Jingyi, Wang Mei, Cai Wenhao:
Support Vector Machine Based on Possibility Degrees and Fault Diagnosis. 285-288 - Yu Han, Bo Yang, Kan Chang, Ziyi Quan:
Optimal Combination of H.264/AVC Coding Tools for Mobile Multimedia Broadcasting Application. 289-293 - Hongxia Ma, Yao Zhao, Chunyu Lin, Anhong Wang:
Distributed Video Coding Based on Multiple Description. 294-297
Cryptography and Watermarking
- Guosheng Cheng, Jianwei Yang:
A Watermarking Scheme Based on Two-dimensional Wavelet Filter Parametrization. 301-304 - Chuanxian Jiang, Xiaowei Chen, Zhi Li:
Watermarking Relational Databases for Ownership Protection Based on DWT. 305-308 - Changle Zhang, Hong Peng, Xianzhong Long, Zheng Pan, Ying Wu:
A Fragile Software Watermarking for Tamper-Proof. 309-312 - Chengzhi Deng, Huasheng Zhu, Shengqian Wang:
Curvelet Domain Watermark Detection Using Alpha-Stable Models. 313-316 - Enke Li, Shangqian Liu, Shimin Yin, Xiaoning Fu:
Nonuniformity Correction Algorithms of IRFPA Based on Radiation Source Scaling. 317-321 - Zhiyuan Wang, Jianhua Huang, Ziming Guan:
The SOBER Family Ciphers Reconfigurable Processing Architecture Design. 322-326 - Bai Zhongying, Qin Jiancheng:
Webpage Encryption Based on Polymorphic Javascript Algorithm. 327-330 - Dingguo Yu, Nan Chen:
The Improving of IKE with PSK for Using in Mobile Computing Environments. 331-334
Cryptography and its Applications
- Shin-Yan Chiou, Shih-Ying Chang, Hung-Min Sun:
Common Friends Discovery with Privacy and Authenticity. 337-340 - Wu-Chuan Yang, Jhih-Syue Jhou:
Known Signature Attack of ID-Based Multisignature Schemes. 341-343 - Chien-Yuan Chen, Chih-Cheng Hsueh, Yu-Feng Lin:
A Generalization of de Weger's Method. 344-347 - Wu-Chuan Yang:
New Strategy of Efficient SPA-resistant Exponentiations. 348-351 - Huajun Huang, Shaohong Zhong, Junshan Tan:
Browser-Side Countermeasures for Deceptive Phishing Attack. 352-355 - Lu He, Jianbin Lin, Tianzhi Li, Dingyi Fang:
An Anti-attack Watermarking Based on Synonym Substitution for Chinese Text. 356-359 - Wu Peng, Zhigang Wang, Junhua Chen:
Research on Attack Intention Recognition Based on Graphical Model. 360-363 - Jing-pei Wang, Shuifa Sun, Ming Jiang, Dan-gui Xie, Bang Jun Lei:
Anti-protocol Attacks Digital Watermarking Based on Media-Hash and SVD. 364-367
Image Retrieval and Image Analysis
- Yung-Chiang Wei, Jui-Che Teng, Chien-Wen Chung:
Intra-mode Dependent Coding Method for Image Compression. 371-374 - Fu-Kun Chen, Jui-Che Teng, Yue-Dar Jou, Wen-Yuan Liao:
Dynamically Constrained One-Bit Transform for Motion Vector Estimation. 375-378 - Ding-Hrong Chen, Shiang-En Tang:
A Name Recommendation Photo Album Using Probability Neural Network. 379-382 - Jiann-Shu Lee, Hsing-Hsien Wu, Ming-Zheng Yuan:
Lung Segmentation for Chest Radiograph by Using Adaptive Active Shape Models. 383-386 - Jun-qiao Qi, Chang-long Wang, Yan-ming Qi:
The Application on the Evaluation of Quality of Universities Undergraduate Theory Teaching Work Based on Artificial Neural Network. 387-390 - Qunting Yang, Tiegang Gao, Li Fan, Qiaolun Gu:
Analysis of One-way Alterable Length Hash Function Based on Cell Neural Network. 391-395 - Yuanbin Hou, Chunfeng Song, Ning Li:
The Sync Tracing Based on Improved Genetic Algorithm Neural Network. 396-399 - Dianbo Jiang, Yahui Yang, Min Xia:
Research on Intrusion Detection Based on an Improved SOM Neural Network. 400-403
Clustering and Target Detection
- Liu Hua:
Words Clustering Based on Keywords Indexing from Large-scale Categorization Corpora. 407-410 - Xuedou Yu:
Research on Active Defence Technology with Host Intrusion Based on K-Nearest Neighbor Algorithm of Kernel. 411-414 - Lijian Lu, Xiaojun Ye:
An Improved Weighted-Feature Clustering Algorithm for K-anonymity. 415-418 - Xiaolong Deng, Pingfang Zhou:
A New Interacting Multiple Model Algorithm Based on the Unscented Particle Filter. 419-422 - Xiaokang Zhang, Jianmei Shuai:
A New Feature Selection Method for Malcodes Detection. 423-426 - Rongxian Nie, Guiguang Ding, Jianmin Wang, Li Zhang:
A New Fingerprint Sequences Matching Algorithm for Content-Based Copy Detection. 427-430 - Gaoyu Zhang:
Infrared Small Weak Target Detection via HOSA. 431-434 - Jun Li, Youdong Ding, Yunyu Shi, Qingyue Zeng:
DWT-Based Shot Boundary Detection Using Support Vector Machine. 435-438
Swarm Intelligence and Data Mining
- Yaping Jiang, Yong Gan, Jianhua Zhou, Zengyu Cai:
A Model of Intrusion Prevention Base on Immune. 441-444 - Ming Li, Kunpeng Wang:
New Greedy Algorithm for Computing Double-Base Chains. 445-450 - Tongrang Fan, Yan Sun, Yongbin Zhao:
An Eco-Defending Architecture for Network Security Based on Immuninty and Mobile Agents. 451-454 - Youchan Zhu, Xueying Guo, Jing Li:
An Improved Genetic Algorithm for Power Grid. 455-458 - Jing Zhou, Guanzhong Dai, De-Quan He, Jun Ma, Xiao-Yan Cai:
Swarm Intelligence: Ant-Based Robot Path Planning. 459-463 - Hsiang-Cheh Huang, Yueh-Hong Chen, Guan-Yu Lin:
DCT-Based Robust Watermarking with Swarm Intelligence Concepts. 464-467 - Jianming Zhu:
A New Scheme to Privacy-Preserving Collaborative Data Mining. 468-471 - Guangjuan Lv, Ruzhi Xu, Xiangrong Zu, Liwu Deng:
Information Security Monitoring System Based on Data Mining. 472-475
Internet Techniques
- Wei-Min Shi:
ID-Based Non-interactive Deniable Authentication Protocol. 479-482 - Wuping Chen, Lei Zhang, Bo Qin, Qianhong Wu, Huanguo Zhang:
Certificateless One-Way Authenticated Two-Party Key Agreement Protocol. 483-486 - Mengbo Hou, Qiuliang Xu:
A Secure ID-Based Explicit Authenticated Key Agreement Protocol without Key Escrow. 487-490 - Yanping Li, Liaojun Pang:
Multi-party Non-repudiation Protocol with Different Message Exchanged. 491-494 - Yang Jian:
An Improved Scheme of Single Sign-on Protocol. 495-498 - Qingfeng Cheng, Guangguo Han, Chuangui Ma:
A New Efficient and Strongly Secure Authenticated Key Exchange Protocol. 499-502 - Yahui Yang, Yunfei Chen, Min Xia, Juan Ma:
An Automated Mechanism of Security Test on Network Protocols. 503-506 - Jian Liu, Fangmin Li:
An Improvement of AODV Protocol Based on Reliable Delivery in Mobile Ad Hoc Networks. 507-510
Information Security
- Lih-Chyau Wuu, Yen-Ju Chen, Chi-Hsiang Hung, Wen-Chung Kuo:
Zero-Collision RFID Tags Identification Based on CDMA. 513-516 - Chun-Ta Li:
An Enhanced Remote User Authentication Scheme Providing Mutual Authentication and Key Agreement with Smart Cards. 517-520 - Yung-Cheng Lee, Wen-Chung Kuo, Yi-Chih Hsieh, Ta-Cheng Chen:
Security Enhancement of the Authentication Protocol for RFID Systems. 521-524 - Yu-Chih Huang:
Secure Access Control Scheme of RFID System Application. 525-528 - Ling-feng Shi, Xin-Quan Lai, Bao-Long Guo:
Paper Study of Embedded System Design Based on RFID Securities. 529-531 - Kuo-Hui Yeh, Nai-Wei Lo:
Improvement of an EPC Gen2 Compliant RFID Authentication Protocol. 532-535 - Lingling Wang:
A New Multi-bank E-cash Protocol with Anonymity Control. 536-539 - Yang Wu, Li Yang:
Practical Quantum No-key Protocol with Identification. 540-543
Multimedia Processing and Multimedia Interaction
- Jzau-Sheng Lin, Shao-Han Liu, Wu-Chih Hsieh, Yu-Yi Liao, HongChao Wang, QingHua Lan:
Facial Expression Recognition Based on Field Programmable Gate Array. 547-550 - Shen-Chuan Tai, Yi-Ying Chang, Ting-Chou Tsai, Li-Man Liao:
Analysis and Evaluation of Contrast Enhancement Methods in Digital Images. 551-554 - Shen-Chuan Tai, Yi-Ying Chang, Kang-Ming Li, Ting-Chou Tsai:
Contrast Enhancement Method Based on Average Luminance with Weighted Histogram Equalization. 555-558 - Chuin-Mu Wang, Jau-An Chen, Jui-Hsing Chu:
Application of Averaged Learning Subspace Method in MRI Classification. 559-562 - Xiao-Hong Yuan, Zhaoda Zhu, Gong Zhang:
Low Bit Rate ROI-Based SAR Image Compression. 563-567 - Wenbing Chen, Qizhou Li, Jianwei Yang:
Image Retrieval Based on Composite of Mean Shift and Assignment Model. 568-571 - Jianzhen Wu:
A RST Invariant Watermarking Scheme Utilizing Support Vector Machine and Image Moments for Synchronization. 572-574 - Jianzhen Wu:
Image Moment Based Registration Scheme Utilizing Support Vector Machine. 575-577
Image Engineering and Network Security
- Xiaoyue Wu, Baolong Guo, Shengli Qu, Zhuo Wang:
A New Adaptive Image Denoising Method Combining the Nonsubsampled Contourlet Transform and Total Variation. 581-584 - Fu Yan, Wang Mei, Zhang Chunqin:
SAR Image Target Recognition Based on Hu Invariant Moments and SVM. 585-588 - Tao Niu, Yingjiao Zhang, Debo Zhang, Liqiang Liu, Xianjue Luo:
Testability Analysis of Grounding Grids Using Network Transformation. 589-592 - Jin Tian, Yang Qiu, Liuyu Qian:
Research on Algorithm of Digital Filtering Based on Video Information Security. 593-596 - Feng Tong-an, He Jin, Luo Ying:
ISAR Imaging of High Speed Moving Targets Based-on Radon Transform. 597-600 - Xianxiang Wu, Bao-Long Guo, Juan Wang:
Octa-Log-Polar Fourier Transform for Image Registration. 601-604 - Juan Li, Yong Feng, Xuqiang Yang:
An Improved Image Encryption Scheme Based on Line Maps. 605-608 - Xiao-Hong Yuan, Zhaoda Zhu, Gong Zhang:
Multiresolution Target Detection in Wavelet Domain for SAR Imagery. 609-613
Information Security
- Hisham A. Kholidy, Khaled Alghathbar:
A New Accelerated RC4 Scheme Using "Ultra Gridsec" and "HIMAN" and use this Scheme to Secure "HIMAN" Data. 617-622 - Xiang Can, You Lin:
A New Conic Curve Digital Signature Scheme. 623-626 - Xiaoyuan Yang, Zhen Liu, Wei Zhang, Dun-Tao Guo:
A High-efficiency Data Distribution Algorithm in Distributed Storage. 627-630 - Tien-Chin Wang, Shu-Chen Peng, Shu-Chen Hsu, Jui-Fang Chang:
An Approach to Group Decision Making Based on Incomplete Linguistic Preference Relations. 631-634 - Tongjiang Yan, Li Hong:
Constructions of Some Difference-Balanced d-form Functions. 635-637 - Xin Zhao, Yuqin Lv, Wenxin He:
A Novel Micropayment Scheme with Complete Anonymity. 638-642 - Yahui Lu, Li Zhang:
Domain Administration of Task-role Based Access Control for Process Collaboration Environments. 643-647
Anti-attack Schemes and Analysis
- Qiong Liu, Yupu Hu:
A Fast Correlation Attack via Parallel Computing. 651-654 - Liwu Deng, Ruzhi Xu, Lizheng Jiang, Guangjuan Lv:
A Database Protection System Aiming at SQL Attack. 655-657 - Lin Ding, Guan Jie:
Guess and Determine Attack on SOSEMANUK. 658-661 - Wen Ji, Lei Hu, Haiwen Ou:
Algebraic Attack to SMS4 and the Comparison with AES. 662-665 - Fanyu Kong, Jia Yu:
Number-Theoretic Attack on Lyuu-Wu's Multi-proxy Multi-signature Scheme. 666-668 - Jie Nie, Zhiqiang Wei, Zhen Li:
A New JPEG Resistant Color Image Watermarking Algorithm Based on Quantization Index Modulation. 669-672 - Rey-Sern Lin, Shang-Wen Hu:
A Modified Run-length Image Data Hiding for High Embedding Capacity. 673-676
Soft Computing and Hybrid Intelligent Approaches in Computer Security
- Maheyzah Md Siraj, Mohd Aizaini Maarof, Siti Zaiton Mohd Hashim:
Intelligent Clustering with PCA and Unsupervised Learning Algorithm in Intrusion Alert Correlation. 679-682 - Anazida Zainal, Den Fairol Samaon, Mohd Aizaini Maarof, Siti Mariyam Hj. Shamsuddin:
Fuzzy c-Means Sub-Clustering with Re-sampling in Network Intrusion Detection. 683-686 - Ajith Abraham, Crina Grosan, Hongbo Liu, Yuehui Chen:
Hierarchical Takagi-Sugeno Models for Online Security Evaluation Systems. 687-692 - Jan Platos, Václav Snásel, Pavel Krömer, Ajith Abraham:
Detecting Insider Attacks Using Non-negative Matrix Factorization. 693-696 - Xiaodong Shen, Guiguang Ding, Yizheng Chen, Jianmin Wang:
Adaptive-Push Peer-to-Peer Video Streaming System Based on Dynamic Unstructured Topology. 697-700 - Zengming Tian, Xiangming Wen, Wei Zheng, Yong Sun, Yinbo Cheng:
Evaluation and Simulation on the Performance of DHTs Required by P2PSIP. 701-704 - Qiang Song, Gang Li:
The Research on the Measurement of China Internet Illegal and Harmful Content. 705-709 - Xiaorong Cheng, Kun Xie, Dong Wang:
Network Traffic Anomaly Detection Based on Self-Similarity Using HHT and Wavelet Transform. 710-713
Multimedia Signal Processing for Public Safety and Privacy
- Kazumasa Yamamoto, Seiichi Nakagawa:
Privacy Protection for Speech Information. 717-720 - Naoki Tadokoro, Tetsuo Kosaka, Masaharu Katoh, Masaki Kohda:
Improvement of Speaker Vector-Based Speaker Verification. 721-724 - Hiroaki Nanjo, Takanobu Nishiura, Hiroshi Kawano:
Acoustic-Based Security System: Towards Robust Understanding of Emergency Shout. 725-728 - Mitsuru Kawamoto, Futoshi Asano, Koichi Kurumatani, Yingbo Hua:
A System for Detecting Unusual Sounds from Sound Environment Observed by Microphone Arrays. 729-732 - Akinori Ito, Akihito Aiba, Masashi Ito, Shozo Makino:
Detection of Abnormal Sound Using Multi-stage GMM for Surveillance Microphone. 733-736 - Xiao-li Liu, Shuifa Sun, Jian-wei Zhu, Ming Jiang, Dan-gui Xie:
An Audio Watermarking Method of Resistance Statistics Attack Based on Psychoacoustic Model. 737-739 - Xiaoming Zhang, Zhaoyang Yu:
Cepstrum-Based Audio Watermarking Algorithm against the A/D and D/A Attacks. 740-743 - Limin Hou, Juanmin Xie:
Compensating Function of Formant Instantaneous Characteristics in Speaker Identification. 744-747
Image Engineering and Network Security
- Ya-min Wang, Yan Liu:
Design of DBA Algorithm in EPON Uplike. 751-753 - Jie Liu, Xiaoji Liu, Lin Zheng:
Cramer-Rao Lower Bound for Non-coherent TOA Estimation with Impulse Signal. 754-757 - Shulin Liu, Li Yan:
Research on Intrinsic Safety Behavior of Inductor-Disconnected-Discharge of Boost DC-DC Converters. 758-761 - Yanzhao Li, Shengli Qu, Jiahui Zhu, Jianqin Sun:
Study on the Control of a Two-wheeled Unstable Vehicle Based on Sensitivity Analysis. 762-765 - Jin Tian, Yang Qiu, Ankun Lin:
Generalized Analysis Model of Information Security of Computer System Based on Electromagnetic Topology. 766-769 - Jizhen Liu, Kehe Wu, Tong Zhang, Gang Ma:
The Design and Implementation of Security Defense Technology Based on Mandatory Running Control. 770-773 - Jianquan Xie, Qing Xie, Chunhua Yang:
An Accurate Image Juggling Authentication Algorithm. 774-777 - Shaohui Liu, Lin Ma, Hongxun Yao, Debin Zhao:
Universal Steganalysis Based on Statistical Models Using Reorganization of Block-based DCT Coefficients. 778-781
Volume II
Security Coding Algorithms and Analysis
- Yue Zhang, Jie Liu, Bo Song:
A New Algorithm for Outlier Detection Based on Offset. 3-6 - Lin Chen, Li Li, Yong Hu, Ke Lian:
Information Security Solution Decision-Making Based on Entropy Weight and Gray Situation Decision. 7-10 - Xin-yuan Yang, Zhi Ma, Xin Lu, Hong-Xin Li:
Quantum Secure Direct Communication Based on Partially Entangled States. 11-14 - Faling Yi, Wei Xiong, Zhanpeng Huang, Jie Zhao:
A Multi-view Nonlinear Active Shape Model Based on 3D Transformation Shape Search. 15-18 - Chao Lv, Hui Li, Jianfeng Ma:
Analysis the Properties of TLS Based on Temporal Logic of Knowledge. 19-22 - Wang Yingsong, Chen Wei:
f8 Keystream Generator with SMS4 as Core Algorithm. 23-26 - Wang Yuhui, Dai Ju:
Waveform Analysis Mathematic Based on Ultrasonic Displacement Measurement. 27-29 - Hui Wang, Heli Xu, Bibo Lu, Zihao Shen:
Research on Security Architecture for Defending Insider Threat. 30-33
Cryptanalysis and its Application
- Xu An Wang, Xiaoyuan Yang, Qingquan Peng:
On Security Notions for Verifiably Encrypted Signature. 37-40 - Fangyong Hou, Nong Xiao, Fang Liu, Hongjun He:
Secure Disk with Authenticated Encryption and IV Verification. 41-44 - Liang Chen, Chengmin Gao, Yong Xu:
Non-interactive Evaluation of Encrypted Elementary Functions. 45-48 - Baocang Wang, Hui Liu, Yupu Hu:
Cryptanalysis of a Knapsack Public Key Cryptosystem. 49-52 - Weidong Zhang, Baocang Wang, Yupu Hu:
A New Knapsack Public-Key Cryptosystem. 53-56 - Yang Lu, Jiguo Li:
Forward-Secure Certificate-Based Encryption. 57-60 - Lin Zhang, Jianhua Wu, Nanrun Zhou:
Image Encryption with Discrete Fractional Cosine Transform and Chaos. 61-64 - Jianhong Zhang, Qin Geng:
Cryptoanalysis of Two Signcryption Schemes. 65-68
3D Model Retrieval and Data Hiding
- Lin-Lin Tang, Zhe-Ming Lu, Fa-Xin Yu:
A Novel Multiple Description Coding Frame Based on Reordered DCT Coefficients and SPIHT Algorithm. 71-74 - Ji-Xin Liu, Zhe-Ming Lu, Hao Luo:
A CELP-Speech Information Hiding Algorithm Based on Vector Quantization. 75-78 - Yue-nan Li, Zhe-ming Lu:
Video Identification Using Spatio-temporal Salient Points. 79-82 - Mazdak Zamani, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Akram M. Zeki, Pritheega Magalingam:
A Novel Approach for Audio Watermarking. 83-86 - Yang Ming, Yumin Wang:
Efficient Certificate-Based Signature Scheme. 87-90 - Rashidah Kadir, Mohd Aizaini Maarof:
A Comparative Statistical Analysis of Pseudorandom Bit Sequences. 91-94 - Kai Wang, Yan Liu, Xiaowei Sun:
Small Moving Infrared Target Detection Algorithm under Low SNR Background. 95-97 - Yueh-Hong Chen, Hsiang-Cheh Huang:
Collusion-Resilient Fingerprinting Using Cropping and Subsampling. 98-101
Internet Security and Electronic Commerce Security
- Yu-Chi Chen, Gwoboa Horng, Chang-Chin Huang:
Privacy Protection in On-line Shopping for Electronic Documents. 105-108 - Yu-Yi Chen, Jun-Chao Lu, Shin-I Chen, Jinn-ke Jan:
A Low-cost RFID Authentication Protocol with Location Privacy Protection. 109-113 - Hung-Min Sun, Muh-Chyi Leu:
A Real-Time Selective Video Encryption Using Context-Key Control. 114-117 - Changlu Lin, Lein Harn, Dingfeng Ye:
Ideal Perfect Multilevel Threshold Secret Sharing Scheme. 118-121 - Chung-Huang Yang, Shih-Yi Tu, Pei-Hua Yen:
Implementation of an Electronic Voting System with Contactless IC Cards for Small-Scale Voting. 122-125 - Chu-Hsing Lin, Jung-Chun Liu, Ching-Ru Chen:
Access Log Generator for Analyzing Malicious Website Browsing Behaviors. 126-129 - Sebastian Roschke, Feng Cheng, Christoph Meinel:
An Extensible and Virtualization-Compatible IDS Management Architecture. 130-134 - Qinqin Ni, Weizhen Sun, Sen Ma:
Deadlock Detection Based on Resource Allocation Graph. 135-138
Network Security
- Lidong Wang, Liping Qian:
Exploiting RFC2828 as a Domain Vocabulary for Identifying IT Security Literature. 141-144 - Hongshan Kong, Mingqing Zhang, Jun Tang, Changyuan Luo:
The Research of Simulation for Network Security Based on System Dynamics. 145-148 - Xiaobin Tan, Guihong Qin, Yong Zhang, Ping Liang:
Network Security Situation Awareness Using Exponential and Logarithmic Analysis. 149-152 - David Wampler, Huirong Fu, Ye Zhu:
Security Threats and Countermeasures for Intra-vehicle Networks. 153-157 - Zhanyong Tang, Rui Qi, Dingyi Fang, Yangxia Luo:
W-Aegis: A Propagation Behavior Based Worm Detection Model for Local Networks. 158-162 - Lina Zhu, Chao-yi Sun, Li Feng:
Research on Early Warning for Worm Propagation Based on Area-Alert-Level. 163-166 - Junhua Chen, Shengjun Wei:
Modeling and Analyzing the Spread of Worms with Bilinear Incidence Rate. 167-170 - Pantelis Kammas, Thodoros Komninos, Yannis C. Stamatiou:
Modeling the Co-evololution DNS Worms and Anti-worms in IPv6 Networks. 171-174
System Design and Implementation III
- Zhifang Wang, Qiong Li, Xiamu Niu, Christoph Busch:
Multimodal Biometric Recognition Based on Complex KFDA. 177-180 - Zhenjun Du, Rong Chen:
An Approach to Checking SOC Timing Safety. 181-184 - Yuzhu Cheng, Chunrong Qiu, Weiqi Tang, Wenda Deng:
Research on System of Chinese Document Copy Detection. 185-188 - Ruo-Fei Han, Hou-Xiang Wang, Yu-Hua Wang, Kai-Ling Zuo:
Membership-Based Access Control for Trust Negotiation in Open Systems. 189-192 - Guanghui Liu:
ECC-Cache: A Novel Low Power Scheme to Protect Large-Capacity L2 Caches from Transiant Faults. 193-199 - Xin Yu, Yuping Wang:
Secure Constructing Bluetooth Scatternet Based on BTCP. 200-203 - Feng Wang, Xia Liu, Marek E. Bialkowski:
Space Time Block Coded MIMO System with Redundant Antennas. 204-207 - D. Rajaveerappa, Abdelsalam Almarimi:
RSA/Shift Secured IFFT/FFT Based OFDM Wireless System. 208-211
Image Processing and its Applications
- Zhihua Xie, Shiqian Wu, Guodong Liu, Zhijun Fang:
Infrared Face Recognition Based on Radiant Energy and Curvelet Transformation. 215-218 - Gaoping Li:
Fast Fractal Image Coding Using Ambient-Cross Sum of Normalized Block. 219-222 - Jing Zheng, QiGui Zhang, Xuemei Zhang:
Lossy Compression of CFA Image Based on Multiwavelet Packet. 223-226 - Baojun Han, Yan Liu:
An Improved SPECK Image Coding Algorithm. 227-229 - Hai-ying Gao, Guo-qiang Liu, Xu Li, Yin Xu:
A Robust Watermark Algorithm for JPEG2000 Images. 230-233 - Che Hong, Sun Longhe:
A Novel Method for Plane Array Infrared Image to Detect Point Target. 234-240 - Wenjuan Zhang, Weibin Zhang:
A New Image Restoration Algorithm Based on Variational Derivative. 241-244 - Wenbing Chen, Xiaolei Zhang, Jianwei Yang:
Visibility Estimation Based on Mean Shift. 245-248
Internet Security and Electronic Commerce Security
- Fang-Yie Leu, Zhi-Yang Li:
Detecting DoS and DDoS Attacks by Using an Intrusion Detection and Remote Prevention System. 251-254 - Fang-Yie Leu, Chia-Chi Pai:
Detecting DoS and DDoS Attacks Using Chi-Square. 255-258 - Shiuh-Jeng Wang, Yuh-Ren Tsai, Chien-Chih Shen, Pin-You Chen:
Hierarchical Key Agreement Protocols in Group-User Systems. 259-262 - Yu Zhang, Xingshe Zhou, Yee Wei Law, Marimuthu Palaniswami:
Insider DoS Attacks on Epidemic Propagation Strategies of Network Reprogramming in Wireless Sensor Networks. 263-266 - Hamza Rahmani, Nabil Sahli, Farouk Kamoun:
Joint Entropy Analysis Model for DDoS Attack Detection. 267-271 - Jibin Ma, Huiling Gu, Yonghao Sun, Xujie Hu:
Risk Assessment Model on the Internal Corporate Governance Based on the SPA. 272-276 - Xuyan Wu, Huiling Gu, Xujie Hu, Yuhong Dong:
Appraisal Model of MIS in Enterprises Based on the Unascertained Measurement. 277-280 - Ying Sun, Chunxiang Xu, Fagen Li, Yong Yu:
Identity Based Multi-proxy Multi-signcryption Scheme for Electronic Commerce. 281-284
Security in Sensor Networks
- Xiaoqing Li, Hui Li, Jianfeng Ma, Weidong Zhang:
An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks. 287-290 - Sibo Liu, Liaojun Pang, Qingqi Pei, Hua Ma, Qingquan Peng:
Distributed Event-Triggered Trust Management for Wireless Sensor Networks. 291-294 - Huixian Li, Liaojun Pang:
A Novel Biometric-Based Authentication Scheme with Privacy Protection. 295-298 - Liqiang Mao, Jianfeng Ma, Xuewen Dong:
Towards Provably Secure On-demand Source Routing in MANET. 299-302 - Feng Chen, Weihua Li, Dingyi Fang, Xiaojiang Chen:
Research on Integration of Safety Analysis in Model-Driven Software Development. 303-306 - Xiaoqing Gong, Yi Wang, Hui Li, Jian He:
An Authentication Protocol Applied to RFID Security Systems. 307-310 - Ying Chen, Jian Shu, Hong Liu, Linlan Liu, Jiajie Gong:
MRDWA: Multi-role Dynamic Weighting Aggregation Algorithm in Event Driven Wireless Sensor Networks. 311-314 - Jianwen Zhao, Yuanbin Hou:
An Identification Method for Transient Capacitive Current of Distribution Network by ICMAC. 315-318
Identity Validation and Internet Protocol
- Han Xiao, Zu-xun Zhang, Qiang Wang, Hua-liang Hu:
Development of a Java-Oriented Software General Component Library. 321-325 - Peng Sun, Hongtao Lu:
Two Efficient Fragile Web Page Watermarking Schemes. 326-329 - Yonghong Yu:
Researches on Integrating Database Access Control and Privacy Protection. 330-333 - Ningning Lu, Huachun Zhou, Hongke Zhang:
A New Source Address Validation Scheme Based on IBS. 334-337 - Xiao Dong Wang, Mike Jones, Jens Jensen, Andrew Richards, David Wallom, Tiejun Ma, Robert Frank, David Spence, Steven Young, Claire Devereux, Neil Geddes:
Shibboleth Access for Resources on the National Grid Service (SARoNGS). 338-341 - Rui Xu, Wen-li Ma, Wen-ling Zheng:
Defending against UDP Flooding by Negative Selection Algorithm Based on Eigenvalue Sets. 342-345 - Cui-Mei Bao:
Intrusion Detection Based on One-class SVM and SNMP MIB Data. 346-349 - Baoyi Wang, Ranran Jin, Shaomin Zhang, Xiaomin Zhao:
Research on Gravity-Based Anomaly Intrusion Detection Algorithm. 350-353
Image Clustering and Feature Analysis
- Wenbing Chen, Jianwei Yang, Wangwei:
Image Retrieve Based on Primary Clusters. 357-360 - Xiaosheng Wu, Junding Sun:
An Effective Texture Spectrum Descriptor. 361-364 - Xiao-ning Fu, En-ke Li, Wen-jing Gao:
Texture Feature Analysis on Erosion and Wear in Artillery Chamber. 365-368 - Shan Zhao, Jing Liu:
Image Retrieval Based on Character-Matching Technology. 369-372 - Ping Ye, Guirong Weng:
Microarray Image Segmentation Using Region Growing Algorithm and Mathematical Morphology. 373-376 - Yongyue Chen, Huosong Xia:
A Study on the Algorithm Based on Image Color Correlation Mining. 377-380 - Zhenhua Zhang, Wenhui Li, Bo Li:
An Improving Technique of Color Histogram in Segmentation-based Image Retrieval. 381-384 - Ming-Kan Wu, Jing-Siang Wei, Hao-Chung Shih, Chian C. Ho:
2-Level-Wavelet-Based License Plate Edge Detection. 385-388
System Design and Implementation
- Dan Zhang, Wentao Sui:
Bearings Fault Diagnosis Based on the Optimal Impulse Response Wavelet. 391-394 - Kefeng Fan, Subing Zhang, Wei Mo:
A Digital Certificate Application Scheme in Content Protection System for High Definition Digital Interface. 395-398 - Ning-ning Liang, Xuan-yong Zhu:
Research on Equiponderant Forwarding within Multi-nexthop Interfaces. 399-401 - Qing-hua Zhang, Han Zhang, Zhao-hui Li:
One-way Hash Function Construction Based on Conservative Chaotic Systems. 402-405 - Ji-fang Jin, Er-hong Lu, Xian-wei Gao:
Resistance DPA of RSA on Smartcard. 406-409 - Wenbiao Peng, Chaojun Yan, Xinqiong Liu, Lihua Deng:
Emergency Command System for Geologic Disasters Prevention. 410-413 - Lihua Deng:
Study on Ultrasonic Ranging System Design. 414-416 - Zhenping Zhang, Jitao Fang, Runhuan Jing:
Interactive Visualisation of 3D City Models Based on Adaptive Streaming of 3D-GIS Data. 417-420
Security in Sensor Networks
- Yulong Shen, Qijian Xu, Zuoshun Wu, Hao Yin, Jianfeng Ma:
A New Hybrid Routing Protocol in Heterogeneous Wireless Networks. 423-426 - Qingqi Pei, Lei Wang, Hao Yin, Liaojun Pang, Hong Tang:
Layer Key Management Scheme on Wireless Sensor Networks. 427-431 - Xiaoyan Zhu, Hao Yue, Yumin Wang:
C and M: A New Network Coding Scheme for Wireless Networks. 432-436 - Wang Mei, Xiaochuan Sun, Zheng Hao:
Range-Free Fast and Rough Nodes Localization Algorithm in Wireless Sensor Networks. 437-440 - Li Mingming, Li Baiping, Li Wei, Chen Lei:
Information Security Wireless Sensor Grid. 441-445 - Chen Chen, Li Hui, Qingqi Pei, Lv Ning, Qingquan Peng:
An Effective Scheme for Defending Denial-of-Sleep Attack in Wireless Sensor Networks. 446-449 - Wei Ren, Yi Ren, Hui Zhang:
H2S: A Secure and Efficient Data Aggregative Retrieval Scheme in Unattended Wireless Sensor Networks. 450-453 - Faeiz Alserhani, Monis Akhlaq, Irfan-Ullah Awan, John Mellor, Andrea J. Cullen, Pravin Mirchandani:
Evaluating Intrusion Detection Systems in High Speed Networks. 454-459
E-commerce and E-payment Security
- Jielin Fu, Yongjun Tang:
A Parity Check Node Synchronization Based Method for Solving Phase Ambiguity Problem in DVB-S Systems. 463-466 - Kai Fan, Hui Li, Yue Wang:
Security Analysis of the Kerberos Protocol Using BAN Logic. 467-470 - Xing Liu, Yan Li, Mian Cai, Ying Guo:
The Testing and Evaluating System for the Security Operating System Based on the Mechanism of Keyword-Driven. 471-474 - Yike Yu, Xuefeng Zheng, Mingde Zhang, Qingguo Zhang:
An Identity-Based Authentication Model for Mobile Agent. 475-478 - Lin Zheng, Wei Ge, Hongbing Qiu:
Performance Analysis of Analog LMS Multiuser Receiver in Transmitted-Reference UWB System. 479-482 - Jin-fu Wang:
E-government Security Management: Key Factors and Countermeasure. 483-486 - Shuliang Zheng, Doingxing Jiang, Qixin Liu:
A Role and Activity Based Access Control Model for University Identity and Access Management System. 487-490 - Shaomin Zhang, Xiayan Zhang, Baoyi Wang:
History and Future Information Based Trust Model in C2C E-commerce. 491-494
Image Filtering and its Application
- Weibin Zhang, Wenjuan Zhang:
A Variational Model Combining Curvelet Shrinkage and Nonlinear Anisotropic Diffusion for Image Denoising. 497-500 - Han Yu:
Image De-noising Based on Nonlocal Diffusion Tensor. 501-504 - Jin He, Yinpei Sun, Ying Luo, Qun Zhang:
A Joint Multiscale Algorithm with Auto-adapted Threshold for Image Denoising. 505-508 - Liu Weiguang, Wang Wenqi, Cui Jiangtao:
A New Scheme for Multisensor Image Fusion System. 509-512 - Li Li, Han Yu:
Nonlocal Curvature-Driven Diffusion Model for Image Inpainting. 513-516 - Jin Wang, Heechang Kim, Jongho Kim, Jechang Jeong:
Adaptive Spatially Postprocessing Technique to Remove Blocking Artifacts for DCT Coded Image. 517-520 - Benyong Liu, Xiang Liao:
Image Denoising and Magnification via Kernel Fitting and Modified SVD. 521-524
System Design and Implementation (II)
- Bryan Stewart Cline:
Organizational Barriers to the Implementation of Security Engineering. 527-531 - Yanzhao Li:
National Information Infrastructure Security and Cyber Terrorism in the Process of Industrializations. 532-535 - Xiaorong Cheng, Yan Wei, Xin Geng:
A Support Vector Machines Security Assessment Method Based on Group Decision-Marking for Electric Power Information System. 536-539 - Ganthan Narayana Samy, Rabiah Ahmad, Zuraini Ismail:
Threats to Health Information Security. 540-543 - Li-zhong Geng, Hui-bo Jia:
An Intrusion Detection System for Network Storage Based on System Calls. 544-547 - Zhao Wusheng, Fu Yongqing, Han Zhixue:
The Method of Equalization Based on Iterative Interference Cancellation for SCCPM System. 548-551 - Yalei Cui, Zibin Dai:
The Research of NULL Convention Logic Circuit Computing Model Targeted at Block Cipher Processing. 552-555 - Damin Zhang, Shaohong Cai:
Dynamic Behavior of SIS Epidemic Model with Feedback on Regular Lattic. 556-559
Network Security
- Shangping Zhong, Xiangwen Liao, Xue Zhang, Jingqu Lin:
A Novel Distributed Single Sign-On Scheme with Dynamically Changed Threshold Value. 563-566 - Yuan Bai, Xing Zhang, Bin Sun:
Building Trust Territory in Ad Hoc Networks. 567-570 - Qiang Song, Gang Li:
Cost-Benefit Analysis of China's Internet Content Regulation. 571-575 - Damin Zhang, Shaohong Cai:
Dynamic Behavior of SIRS Model with Feedback on Complex Networks. 576-579 - Deepa Susan Rajan, Chetan Yeole, Harsha Nakade, Huirong Fu, Ye Zhu:
Position Verification in Multi-hop Vehicular Networks. 580-584 - Ji Lu, Song Xiao, Chengke Wu:
Efficient Protection Scheme for SVC Content Based on Network Coding. 585-588 - Zhenyu Liu, Weijun Li, Yue Lai:
Application of Bloom Filter for GTP Stateful Inspection in Network Processor. 589-592 - Kazuhiro Kono, Shinnosuke Nakano, Yoshimichi Ito, Noboru Babaguchi:
Performance Analysis of Anonymous Communication System 3-Mode Net. 593-596
Watermarking Techniques, Steganography, and Visual Cryptography
- Tzu-Chuen Lu, Ying-Hsuan Huang:
An Effective Lossless Hiding Technique Based on Reversible Contrast Mapping and Histogram Embedding Methods. 599-602 - Chyuan-Huei Thomas Yang, Chun-Hao Hsu:
A High Quality Reversible Data Hiding Method Using Interpolation Technique. 603-606 - Cheng-Hsing Yang, Cheng-Ta Huang, Shiuh-Jeng Wang:
Reversible Steganography Based on Side Match and Hit Pattern for VQ-Compressed Images. 607-610 - Zhao-Xia Yin, Chin-Chen Chang, Yan-Ping Zhang:
A High Embedding Efficiency Steganography Scheme for Wet Paper Codes. 611-614 - Chin-Feng Lee, Kuo-Nan Chen, Chin-Chen Chang, Meng-Cheng Tsai:
A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation. 615-618 - Jing-Ming Guo, Chia-Hao Chang:
Prediction-Based Watermarking Schemes for DCT-Based Image Coding. 619-622 - Kuo-Cheng Liu:
Human Visual System Based Watermarking for Color Images. 623-626 - Xiaoyuan Yang, Shifeng Wang, Jia Liu:
Universal Steganalysis to Images with WBMC Model. 627-630
E-commerce and E-payment Security
- Kai Fan, Yue Wang, Hui Li:
A New Abuse-Free Fair Electronic Payment Protocol. 633-636 - Fenghua Li, Wei Wang, Jianfeng Ma, Haoxin Su:
Action-Based Access Control for Web Services. 637-642 - Xiaoyuan Yang, Zhongyin Liang, Ping Wei, Junwei Shen:
A Provably Secure Certificateless Blind Signature Scheme. 643-646 - Mingde Zhang, Xuefeng Zheng, Wensheng Yang, Shuwang Lv, Qingguo Zhang:
Research on Model of Trust Degrees for PKI. 647-650 - Li Wei, Chen Ming, Li Mingming:
Information Security Routing Protocol in the WSN. 651-656 - Xu An Wang, Xiaoyuan Yang:
Proxy Re-encryption Scheme Based on SK Identity Based Encryption. 657-660 - Ying Sun, Chunxiang Xu, Qi Xia, Yong Yu:
Analysis and Improvement of a Proxy Blind Multi-signature Scheme without a Secure Channel. 661-664 - Wei Ding, Matthew J. Hausknecht, Shou-Hsuan Stephen Huang, Zach Riggle:
Detecting Stepping-Stone Intruders with Long Connection Chains. 665-669
Hybrid Techniques
- Jingran Wang, Haifeng Qian:
An Optimal Blind Signature Padding with Message Recovery. 673-676 - Ruichao Zhang, Lianhai Wang, Shuhui Zhang:
Windows Memory Analysis Based on KPCR. 677-680 - Jing Wang, Xiaola Lin:
An Efficient Hierarchical Group Key Management Scheme Based on Orthogonal Vectors. 681-684 - Xin Yu, Yu Bai:
A Method for Accessing Trusted Services Based on Service-Oriented Architecture. 685-688 - Lihua Yin, Yunchuan Guo:
Research on Quantitative Evaluation for Integrity. 689-692 - Shudong Wang, Xiaohua Wang:
Research on New Classification Methods of Remote Sensing of Mass Ingredient without Vegetation of Hei Shan Gorge in Yellow River Basin. 693-696 - Baiwen Fu:
A Rapid Algorithm and its Implementation for Modular Inversion. 697-700 - Mingkun Yang:
Optimal Information Rates of Novel Graph Based Access Structures. 701-704
Security Applications
- Lei Xiong, Duyan Bi, Xu Zhou, Shiping Ma:
Boosting Graph Embedding with Application to Facial Expression Recognition. 707-710 - Feng Tian, Xiao-bing Han, Ying Wei:
Application and Research of Mobile E-commerce Security Based on WPKI. 711-714 - Bachar Alrouh, Gheorghita Ghinea:
A Performance Evaluation of Security Mechanisms for Web Services. 715-718 - Xiao-Long Ma, Zhiwei Wang, Lize Gu, Yixian Yang:
Remark on Yu et al.'s Online/Offline Signature Scheme in CT-RSA 2008. 719-720 - Mohammad Ashiqur Rahaman, Henrik Plate, Yves Roudier, Andreas Schaad:
Towards Secure Content Based Dissemination of XML Documents. 721-724 - Li Chang Jiang, Zhong Zhang, Tetsuo Miyake, Takashi Imamura, Hisanaga Fujiwa:
Reducing Specular Reflection Components of Chrome-Plated Surface with Varying Light Direction. 725-728 - Qiang Gao, Miao Han, Shu-liang Hu, Hai-jie Dong:
Design of Fault Diagnosis System of FPSO Production Process Based on MSPCA. 729-733 - Caimei Wang, Zhengmao Li:
Self-selecting Sub-secret Keys Sharing Scheme Based on Polynomials over Elliptic Curve. 734-737
System Design and Implementation
- Huan Shen, Shun Ming Li, Jian Guo Mao, Fang Chao Bo, Fang Pei Li, Hua Peng Zhou:
A Robust Vehicle Tracking Approach Using Mean Shift Procedure. 741-744 - Guo-jing Li, Tao Wen:
Augmented Addition Operation of Conic Curves over Ring Zn. 745-748 - Yang Zhang, Jingjun Zhang, Dongwen Zhang:
Implementing and Testing Producer-Consumer Problem Using Aspect-Oriented Programming. 749-752 - Hao-Chung Shih, Chian C. Ho:
Soft DSP Design Methodology of Face Recognition System on Nios II Embedded Platform. 753-756 - Rabiah Ahmad, Ganthan Narayana Samy, Nuzulha Khilwani Ibrahim, Peter A. Bath, Zuraini Ismail:
Threats Identification in Healthcare Information Systems Using Genetic Algorithm and Cox Regression. 757-760 - Baoyi Wang, Jing Li, Shaomin Zhang, Xueying Guo:
Scanning Task Scheduling Strategy in Distributed Vulnerability Detection System. 761-764 - Donghai Tian, Changzhen Hu, Yang Qi, Jianqiao Wang:
Hierarchical Distributed Alert Correlation Model. 765-768 - Shaomin Zhang, Haiyan Zhang, Baoyi Wang:
Study on Centralized Authorization Model Supporting Multiple Access Control Models. 769-772
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.