did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540308195

Computational Intelligence and Security : International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II

by ; ; ; ; ;
  • ISBN13:

    9783540308195

  • ISBN10:

    3540308199

  • Format: Paperback
  • Copyright: 2006-02-15
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
List Price: $219.00
We're Sorry.
No Options Available at This Time.

Summary

The two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2005, held in Xi'an, China, in December 2005. The 338 revised papers presented - 254 regular and 84 extended papers - were carefully reviewed and selected from over 1800 submissions. The first volume is organized in topical sections on learning and fuzzy systems, evolutionary computation, intelligent agents and systems, intelligent information retrieval, support vector machines, swarm intelligence, data mining, pattern recognition, and applications. The second volume is subdivided in topical sections on cryptography and coding, cryptographic protocols, intrusion detection, security models and architecture, security management, watermarking and information hiding, web and network applications, image and signal processing, and applications.

Table of Contents

Cryptography and Coding
A Fast Inversion Algorithm and Low-Complexity Architecture over GF(2m)
1(8)
Sosun Kim
Nam Su Chang
Chang Han Kim
Young-Ho Park
Jongin Lim
An ID-Based Optimistic Fair Signature Exchange Protocol from Pairings
9(8)
Chunxiang Gu
Yuefei Zhu
Yajuan Zhang
FMS Attack-Resistant WEP Implementation Is Still Broken
17(10)
Toshihiro Ohigashi
Yoshiaki Shiraishi
Masakatu Morii
Design of a New Kind of Encryption Kernel Based on RSA Algorithm
27(6)
Ping Dong
Xiangdong Shi
Jiehui Yang
On the Security of Condorcet Electronic Voting Scheme
33(10)
Yoon Cheol Lee
Hiroshi Doi
Special Distribution of the Shortest Linear Recurring Sequences in Z/(p) Field
43(6)
Qian Yin
Yunlun Luo
Ping Guo
Cryptanalysis of a Cellular Automata Cryptosystem
49(6)
Jingmei Liu
Xiangguo Cheng
Xinmei Wang
A New Conceptual Framework Within Information Privacy: Meta Privacy
55(7)
Geoff Skinner
Song Han
Elizabeth Chang
Error Oracle Attacks on Several Modes of Operation
62(6)
Fengtong Wen
Wenling Wu
Qiaoyan Wen
Stability of the Linear Complexity of the Generalized Self-shrinking Sequences
68(6)
Lihua Dong
Yong Zeng
Yupu Hu
On the Construction of Some Optimal Polynomial Codes
74(6)
Yajing Li
Weihong Chen
Perceptual Hashing of Video Content Based on Differential Block Similarity
80(6)
Xuebing Zhou
Martin Schmucker
Christopher L. Brown
Cryptographic Protocols
Secure Software Smartcard Resilient to Capture
86(10)
Seung Wook Jung
Christoph Ruland
Revised Fischlin's (Blind) Signature Schemes
96(8)
Kewei Lv
Certificateless Threshold Signature Schemes
104(6)
Licheng Wang
Zhenfu Cao
Xiangxue Li
Haifeng Qian
An Efficient Certificateless Signature Scheme
110(7)
M. Choudary Gorantla
Ashutosh Saxena
ID-Based Restrictive Partially Blind Signatures
117(8)
Xiaofeng Chen
Fangguo Zhang
Shengli Liu
Batch Verification with DSA-Type Digital Signatures for Ubiquitous Computing
125(6)
Seungwon Lee
Seongje Cho
Jongmoo Choi
Yookun Cho
On Anonymity of Group Signatures
131(6)
Sujing Zhou
Dongdai Lin
The Running-Mode Analysis of Two-Party Optimistic Fair Exchange Protocols
137(6)
Yuqing Zhang
Zhiling Wang
Bo Yang
Password-Based Group Key Exchange Secure Against Insider Guessing Attacks
143(6)
Jin Wook Byun
Dong Hoon Lee
Jongin Lim
On the Security of Some Password-Based Key Agreement Schemes
149(6)
Qiang Tang
Chris J. Mitchell
A New Group Rekeying Method in Secure Multicast
155(6)
Yong Xu
Yuxiang Sun
Pairing-Based Provable Blind Signature Scheme Without Random Oracles
161(6)
Jian Liao
Yinghao Qi
Peiwei Huang
Mentian Rong
Efficient ID-Based Proxy Signature and Proxy Signcryption Form Bilinear Pairings
167(6)
Qin Wang
Zhenfu Cao
An Identity-Based Threshold Signcryption Scheme with Semantic Security
173(7)
Changgen Peng
Xiang Li
A Token-Based Single Sign-On Protocol
180(6)
Li Hui
Shen Ting
Simple Threshold RSA Signature Scheme Based on Simple Secret Sharing
186(6)
Shaohua Tang
Efficient Compilers for Authenticated Group Key Exchange
192(6)
Qiang Tang
Chris J. Mitchell
Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys
198(6)
Lihua Wang
Takeshi Okamoto
Tsuyoshi Takagi
Eiji Okamoto
Intrusion Detection
An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks
204(8)
Ki-Won Yeom
Ji-Hyung Park
A New User-Habit Based Approach for Early Warning of Worms
212(8)
Ping Wang
Binxing Fang
Xiaochun Yun
A Multi-gigabit Virus Detection Algorithm Using Ternary CAM
220(8)
Il-Seop Song
Youngseok Lee
Taeck-Geun Kwon
Sampling Distance Analysis of Gigantic Data Mining for Intrusion Detection Systems
228(8)
Yong Zeng
Jianfeng Ma
Hardware-Software Hybrid Packet Processing for Intrusion Detection Systems
236(8)
Saraswathi Sachidananda
Srividya Gopalan
Sridhar Varadarajan
D-S Evidence Theory and Its Data Fusion Application in Intrusion Detection
244(8)
Junfeng Tian
Weidong Zhao
Ruizhong Du
A New Network Anomaly Detection Technique Based on Per-Flow and Per-Service Statistics
252(8)
Yuji Waizumi
Daisuke Kudo
Nei Kato
Yoshiaki Nemoto
SoIDPS: Sensor Objects-Based Intrusion Detection and Prevention System and Its Implementation
260(7)
SeongJe Cho
Hye-Young Chang
HongGeun Kim
WoongChul Choi
A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services
267(6)
Ming Li
Wei Zhao
Tamper Detection for Ubiquitous RFID-Enabled Supply Chain
273(6)
Vidyasagar Potdar
Chen Wu
Elizabeth Chang
Measuring the Histogram Feature Vector for Anomaly Network Traffic
279(6)
Wei Yan
Efficient Small Face Detection in Surveillance Images Using Major Color Component and LDA Scheme
285(6)
Kyunghwan Baek
Heejun Jang
Youngjun Han
Hernsoo Hahn
Fast Motion Detection Based on Accumulative Optical Flow and Double Background Model
291(6)
Jin Zheng
Bo Li
Bing Zhou
Wei Li
Reducing Worm Detection Time and False Alarm in Virus Throttling
297(6)
Jangbok Kim
Jaehong Shim
Gihyun Jung
Kyunghee Choi
Protection Against Format String Attacks by Binary Rewriting
303(6)
Jin Ho You
Seong Chae Seo
Young Dae Kim
Jun Yong Choi
Sang Jun Lee
Byung Ki Kim
Masquerade Detection System Based on Principal Component Analysis and Radial Basics Function
309(6)
Zhanchun Li
Zhitang Li
Yao Li
Bin Liu
Anomaly Detection Method Based on HMMs Using System Call and Call Stack Information
315(7)
Cheng Zhang
Qinke Peng
Parallel Optimization Technology for Backbone Network Intrusion Detection System
322(6)
Xiaojuan Sun
Xinliang Zhou
Ninghui Sun
Mingyu Chen
Attack Scenario Construction Based on Rule and Fuzzy Clustering
328(6)
Linru Ma
Lin Yang
Jianxin Wang
A CBR Engine Adapting to IDS
334(6)
Lingjuan Li
Wenyu Tang
Ruchuan Wang
Application of Fuzzy Logic for Distributed Intrusion Detection
340(8)
Hee Suk Seo
Tae Ho Cho
Security Models and Architecture
Dynamic Access Control for Pervasive Grid Applications
348(8)
Syed Naqvi
Michel Riguidel
On the Security of the Canetti-Krawczyk Model
356(8)
Xinghua Li
Jianfeng Ma
SangJae Moon
A Novel Architecture for Detecting and Defending Against Flooding-Based DDoS Attacks
364(11)
Yi Shi
Xinyu Yang
A Variant of Poly1305 MAC and Its Security Proof
375(6)
Dayin Wang
Dongdai Lin
Wenling Wu
Covert Channel Identification Founded on Information Flow Analysis
381(7)
Jianjun Shen
Sihan Qing
Qingni Shen
Liping Li
Real-Time Risk Assessment with Network Sensors and Intrusion Detection Systems
388(10)
Andre Arnes
Karin Sallhammar
Kjetil Haslum
Tonnes Brekne
Marie Elisabeth Gaup Moe
Svein Johan Knapskog
Design and Implementation of a Parallel Crypto Server
398(9)
Xiaofeng Rong
Xiaojuan Gao
Ruidan Su
Lihua Zhou
Survivability Computation of Networked Information Systems
407(8)
Xuegang Lin
Rongsheng Xu
Miaoliang Zhu
Assessment of Windows System Security Using Vulnerability Relationship Graph
415(6)
Yongzheng Zhang
Binxing Fang
Yue Chi
Xiaochun Yun
A New (t, n)-Threshold Multi-secret Sharing Scheme
421(6)
HuiXian Li
ChunTian Cheng
LiaoJun Pang
An Efficient Message Broadcast Authentication Scheme for Sensor Networks
427(6)
Sang-ho Park
Taekyoung Kwon
Digital Image Authentication Based on Error-Correction Codes
433(6)
Fan Zhang
Xinhong Zhang
Zhiguo Chen
Design and Implementation of Efficient Cipher Engine for IEEE 802.11i Compatible with IEEE 802.11n and IEEE 802.11e
439(6)
Duhyun Bae
Gwanyeon Kim
Jiho Kim
Sehyun Park
Ohyoung Song
Secure Delegation-by-Warrant ID-Based Proxy Signcryption Scheme
445(6)
Shanshan Duan
Zhenfu Cao
Yuan Zhou
Building Security Requirements Using State Transition Diagram at Security Threat Location
451(6)
Seong Chae Seo
Jin Ho You
Young Dae Kim
Jun Yong Choi
Sang Jun Lee
Byung Ki Kim
Study on Security iSCSI Based on SSH
457(6)
Weiping Liu
Wandong Cai
A Scheduling Algorithm Based on a Trust Mechanism in Grid
463(6)
Kenli Li
Yan He
Renfa Li
Tao Yang
Enhanced Security and Privacy Mechanism of RFID Service for Pervasive Mobile Device
469(7)
Byungil Lee
Howon Kim
Worm Propagation Modeling and Analysis on Network
476(6)
Yunkai Zhang
Fangwei Wang
Changguang Wang
Jianfeng Ma
An Extensible AAA Infrastructure for IPv6
482(6)
Hong Zhang
Haixin Duan
Wu Liu
Jianping Wu
The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11i
488(6)
Fan Zhang
Jianfeng Ma
SangJae Moon
A Noble Key Pre-distribution Scheme with LU Matrix for Secure Wireless Sensor Networks
494(6)
Chang Won Park
Sung Jin Choi
Hee Yong Youn
Security Management
A Virtual Bridge Certificate Authority Model
500(8)
Haibo Tian
Xi Sun
Yumin Wang
Weak Signals in Information Security Management
508(10)
Jorma Kajava
Reijo Savola
Rauno Varonen
PDTM: A Policy-Driven Trust Management Framework in Distributed Systems
518(8)
Wu Liu
Haixin Duan
Jianping Wu
Xing Li
Methodology of Quantitative Risk Assessment for Information System Security
526(6)
Mengquan Lin
Qiangmin Wang
Jianhua Li
A Secure and Efficient (t, n) Threshold Verifiable Multi-secret Sharing Scheme
532(6)
Mei-juan Huang
Jian-zhong Zhang
Shu-cui Xie
Improvement on an Optimized Protocol for Mobile Network Authentication and Security
538(4)
ChinChen Chang
JungSan Lee
Neural Network Based Flow Forecast and Diagnosis
542(6)
Qianmu Li
Manwu Xu
Hong Zhang
Fengyu Liu
Protecting Personal Data with Various Granularities: A Logic-Based Access Control Approach
548(6)
Bat-Odon Purevjii
Masayoshi Aritsugi
Sayaka Imai
Yoshinari Kanamori
Cherri M. Pancake
Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function
554(6)
Huifeng Huang
Chinchen Chang
Topology-Based Macroscopical Response and Control Technology for Network Security Event
560(7)
Hui He
Mingzeng Hu
Weizhe Zhang
Hongli Zhang
Zhi Yang
Watermarking and Information Hiding
Adaptive Hiding Scheme Based on VQ-Indices Using Commutable Codewords
567(6)
Chinchen Chang
Chiachen Lin
Junbin Yeh
Reversible Data Hiding for Image Based on Histogram Modification of Wavelet Coefficients
573(8)
Xiaoping Liang
Xiaoyun Wu
Jiwu Huang
An Image Steganography Using Pixel Characteristics
581(8)
Young-Ran Park
Hyun-Ho Kang
Sang-Uk Shin
Ki-Ryong Kwon
Alternatives for Multimedia Messaging System Steganography
589(8)
Konstantinos Papapanagiotou
Emmanouel Kellinis
Giannis F. Marias
Panagiotis Georgiadis
Error Concealment for Video Transmission Based on Watermarking
597(8)
Shuai Wan
Yilin Chang
Fuzheng Yang
Applying the AES and Its Extended Versions in a General Framework for Hiding Information in Digital Images
605(6)
Tran Minh Triet
Duong Anh Duc
An Image Hiding Algorithm Based on Bit Plane
611(6)
Bin Liu
Zhitang Li
Zhanchun Li
A Blind Audio Watermarking Algorithm Robust Against Synchronization Attack
617(6)
Xiangyang Wang
Hong Zhao
Semi-fragile Watermarking Algorithm for Detection and Localization of Temper Using Hybrid Watermarking Method in MPEG-2 Video
623(6)
Hyun-Mi Kim
Ik-Hwan Cho
A-Young Cho
Dong-Seok Jeong
Public Watermarking Scheme Based on Multiresolution Representation and Double Hilbert Scanning
629(6)
Zhiqiang Yao
Liping Chen
Rihong Pan
Boxian Zou
Licong Chen
Performance Evaluation of Watermarking Techniques for Secure Multimodal Biometric Systems
635(8)
Daesung Moon
Taehae Kim
SeungHwan Jung
Yongwha Chung
Kiyoung Moon
Dosung Ahn
Sang-Kyoon Kim
An Improvement of Auto-correlation Based Video Watermarking Scheme Using Independent Component Analysis
643(6)
Seong-Whan Kim
Hyun-Sung Sung
A Digital Watermarking Technique Based on Wavelet Packages
649(6)
Chen Xu
Weiqiang Zhang
Francis R. Austin
A Spectral Images Digital Watermarking Algorithm
655(6)
Long Ma
Changjun Li
Shuni Song
Restoration in Secure Text Document Image Authentication Using Erasable Watermarks
661(8)
Niladri B. Puhan
Anthony T.S. Ho
Web and Network Applications
The Study of RED Algorithm Used Multicast Router Based Buffer Management
669(10)
Won-Hyuck Choi
Doo-Hyun Kim
Kwnag-Jae Lee
Jung-Sun Kim
Genetic Algorithm Utilized in Cost-Reduction Driven Web Service Selection
679(8)
Lei Cao
Jian Cao
Minglu Li
MacroOS: A Pervasive Computing Platform Supporting Context Awareness and Context Management
687(8)
Xiaohua Luo
Kougen Zheng
Zhaohui. Wu
Yunhe Pan
A Frame for Selecting Replicated Multicast Servers Using Genetic Algorithm
695(8)
Qin Liu
Chanle Wu
On a Novel Methodology for Estimating Available Bandwidth Along Network Paths
703(8)
Shaohe Lv
Jianping Yin
Zhiping Cai
Chi Liu
A New AQM Algorithm for Enhancing Internet Capability Against Unresponsive Flows
711(8)
Liyuan Zhao
Keqin Liu
Jun Zheng
Client Server Access: Wired vs. Wireless LEO Satellite-ATM Connectivity; A (MS-Ro-BAC) Experiment
719(6)
Terry C. House
An Algorithm for Automatic Inference of Referential Integrities During Translation from Relational Database to XML Schema
725(6)
Jinhyung Kim
Dongwon Jeong
Doo-Kwon Baik
A Fuzzy Integral Method to Merge Search Engine Results on Web
731(6)
Shuning Cui
Boqin Feng
The Next Generation PARLAY X with QoS/QoE
737(6)
Sungjune Hong
Sunyoung Han
A Design of Platform for QoS-Guaranteed Multimedia Services Provisioning on IP-Based Convergence Network
743(6)
Seong-Woo Kim
Young-Chul Jung
Young-Tak Kim
Introduction of Knowledge Management System for Technical Support in Construction Industries
749(8)
Tai Sik Lee
Dong Wook Lee
Jeong Hyun Kim
An Event Correlation Approach Based on the Combination of IHU and Codebook
757(7)
Qiuhua Zheng
Yuntao Qian
Image and Signal Processing
Face Recognition Based on Support Vector Machine Fusion and Wavelet Transform
764(8)
Bicheng Li
Hujun Yin
A Dynamic Face and Fingerprint Fusion System for Identity Authentication
772(8)
Jun Zhou
Guangda Su
Yafeng Deng
Kai Meng
Congcong Li
Image Recognition for Security Verification Using Real-Time Joint Transform Correlation with Scanning Technique
780(8)
Kyu B. Doh
Jungho Ohn
Ting-C Poon
Binarized Revocable Biometrics in Face Recognition
788(8)
Ying-Han Pang
Andrew Teoh Beng Jin
David Ngo Chek Ling
Short Critical Area Computational Method Using Mathematical Morphology
796(8)
Junping Wang
Yue Hao
A Robust Lane Detection Approach Based on MAP Estimate and Particle Swarm Optimization
804(8)
Yong Zhou
Xiaofeng Hu
Qingtai Ye
MFCC and SVM Based Recognition of Chinese Vowels
812(8)
Fuhai Li
Jinwen Ma
Dezhi Huang
A Spatial/Frequency Hybrid Vector Quantizer Based on a Classification in the DCT Domain
820(6)
Zhe-Ming Lu
Hui Pei
Hans Burkhardt
Removing of Metal Highlight Spots Based on Total Variation Inpainting with Multi-sources-flashing
826(6)
Ji Bai
Lizhuang Ma
Li Yao
Tingting Yao
Ying Zhang
Component-Based Online Learning for Face Detection and Verification
832(6)
Kyoung-Mi Lee
SPIHT Algorithm Based on Fast Lifting Wavelet Transform in Image Compression
838(7)
Wenbing Fan
Jing Chen
Jina Zhen
Modified EZW Coding for Stereo Residual
845(6)
Han-Suh Koo
Chang-Sung Jeong
Optimal Prototype Filters for Near-Perfect-Reconstruction Cosine-Modulated Filter Banks
851(6)
Xuemei Xie
Guangming Shi
Xuyang Chen
Fast Motion Estimation Scheme for Real Time Multimedia Streaming with H.264
857(6)
Chan Lim
Hyun-Soo Kang
Tae-Yong Kim
Motion-Compensated 3D Wavelet Video Coding Based on Adaptive Temporal Lifting Filter Implementation
863(6)
Guiguang Ding
Qionghai Dai
Wenli Xu
Accurate Contouring Technique for Object Boundary Extraction in Stereoscopic Imageries
869(6)
Shin Hyoung Kim
Jong Whan Jang
Seung Phil Lee
Jae Ho Choi
Robust Object Tracking Based on Uncertainty Factorization Subspace Constraints Optical Flow
875(6)
Yunshu Hou
Yanning Zhang
Rongchun Zhao
Bearings-Only Target Tracking Using Node Selection Based on an Accelerated Ant Colony Optimization
881(6)
Benlian Xu
Zhiquan Wang
Image Classification and Delineation of Fragments
887(6)
Weixing Wang
A Novel Wavelet Image Coding Based on Non-uniform Scalar Quantization
893(6)
Guoyuo Wang
Wentao Wang
A General Image Based Nematode Identification System Design
899(6)
Bai-Tao Zhou
Won Nah
Kang-Woong Lee
Joong-Hwan Baek
A Novel SVD-Based RLS Blind Adaptive Multiuser Detector for CDMA Systems
905(6)
Ling Zhang
Xian-Da Zhang
New Electronic Digital Image Stabilization Algorithm in Wavelet Transform Domain
911(6)
Jung-Youp Suk
Gun-Woo Lee
Kuhn-Il Lee
Line Segments and Dominate Points Detection Based on Hough Transform
917(6)
Z. W. Liao
S.X. Hu
T.Z. Huang
The Study of the Auto Color Image Segmentation
923(6)
Jian Zhuang
Haifeng Du
Jinhua Zhang
Sun'an Wang
Regularized Image Restoration by Means of Fusion for Digital Auto Focusing
929(6)
Vivek Maik
Jeongho Shin
Joonki Paik
Fast Ray-Space Interpolation Based on Occlusion Analysis and Feature Points Detection
935(6)
Gangyi Jiang
Liangzhong Fan
Mei Yu
Rangding Wang
Xien Ye
Yong-Deak Kim
Non-parametric ICA Algorithm for Hybrid Sources Based on GKNN Estimation
941(6)
Fasong Wang
Hongwei Li
Rui Li
Shaoquan Yu
SUSAN Window Based Cost Calculation for Fast Stereo Matching
947(6)
Kyu-Yeol Chae
Won-Pyo Dong
Chang-Sung Jeong
An Efficient Adaptive De-blocking Algorithm
953(6)
Zhiliang Xu
Shengli Xie
Youjun Xiang
Facial Features Location by Analytic Boosted Cascade Detector
959(6)
Lei Wang
Beiji Zou
Jiaguang Sun
New Approach for Segmentation and Pattern Recognition of Jacquard Images
965(6)
Zhilin Feng
Jianwei Yin
Zhaoyang He
Wuheng Zuo
Jinxiang Dong
Nonstationarity of Network Traffic Within Multi-scale Burstiness Constraint
971(6)
Jinwu Wei
Jiangxing Wu
Principle of Image Encrypting Algorithm Based on Magic Cube Transformation
977(6)
Li Zhang
Shiming Ji
Yi Xie
Qiaoling Yuan
Yuehua Wan
Guanjun Bao
A Study on Motion Prediction and Coding for In-Band Motion Compensated Temporal Filtering
983(6)
Dongdong Zhang
Wenjun Zhang
Li Song
Hongkai Xiong
Adaptive Sampling for Monte Carlo Global Illumination Using Tsallis Entropy
989(6)
Qing Xu
Shiqiang Bao
Rui Zhang
Ruijuan Hu
Mateu Sbert
Applications
Incremental Fuzzy Decision Tree-Based Network Forensic System
995(8)
Zaiqiang Liu
Dengguo Feng
Robust Reliable Control for a Class of Fuzzy Dynamic Systems with Time-Varying Delay
1003(8)
Youqing Wang
Donghua Zhou
Using Concept Taxonomies for Effective Tree Induction
1011(6)
Hong Yan Yi
B. de la Iglesia
V.J. Rayward-Smith
A Similarity-Based Recommendation Filtering Algorithm for Establishing Reputation-Based Trust in Peer-to-Peer Electronic Communities
1017(8)
Jingtao Li
Yinan Jing
Peng Fu
Gendu Zhang
Yongqiang Chen
Automatic Classification of Korean Traditional Music Using Robust Multi-feature Clustering
1025(5)
Kyu-Sik Park
Youn-Ho Cho
Sang-Hun Oh
A Private and Efficient Mobile Payment Protocol
1030(6)
Changjie Wang
Ho-fung Leung
Universal Designated-Verifier Proxy Blind Signatures for E-Commerce
1036(6)
Tianjie Cao
Dongdai Lin
Rui Xue
An Efficient Control Method for Elevator Group Control System
1042(6)
Ulvi Dagdelen
Aytekin Bagis
Dervis Karaboga
Next Generation Military Communication Systems Architecture
1048(6)
Qijian Xu
Naitong Zhang
Jie Zhang
Yu Sun
Early Warning for Network Worms
1054(6)
Antti Tikkanen
Teemupekka Virtanen
Skeleton Representation of Character Based on Multiscale Approach
1060(8)
Xinhua You
Bin Fang
Xinge You
Zhenyu He
Dan Zhang
Yuan Yan Tang
Channel Equalization Based on Two Weights Neural Network
1068(6)
Wenming Cao
Wanfang Chai
Shoujue Wang
Assessment of Uncertainty in Mineral Prospectivity Prediction Using Interval Neutrosophic Set
1074(6)
Pawalai Kraipeerapun
Chun Che Fung
Warick Brown
Ring-Based Anonymous Fingerprinting Scheme
1080(6)
Qiang Lei
Zhengtao Jiang
Yumin Wang
Scalable and Robust Fingerprinting Scheme Using Statistically Secure Extension of Anti-collusion Code
1086(6)
Jae-Min Seol
Seong-Whan Kim
Broadcast Encryption Using Identity-Based Public-Key Cryptosystem
1092(6)
Lv Xixiang
Bo Yang
Multimedia Digital Right Management Using Selective Scrambling for Mobile Handset
1098(6)
Goo-Rak Kwon
Tea-Young Lee
Kyoung-Ho Kim
Jae-Do Jin
Sung-Jea Ko
Design and Implementation of Crypto Co-processor and Its Application to Security Systems
1104(6)
HoWon Kim
Mun-Kyu Lee
Dong-Kyue Kim
Sang-Kyoon Chung
Kyoil Chung
Continuous Speech Research Based on HyperSausage Neuron
1110(6)
Wenming Cao
Jianqing Li
Shoujue Wang
Variable-Rate Channel Coding for Space-Time Coded MIMO System
1116(6)
Changcai Han
Dongfeng Yuan
A New Watermarking Method Based on DWT
1122(5)
Xiang-chu Feng
Yongdong Yang
Efficient Point Rendering Method Using Sequential Level-of-Detail
1127(7)
Daniel Kang
Byeong-Seok Shin
Construction of a Class of Compactly Supported Biorthogonal Multiple Vector-Valued Wavelets
1134(6)
Tongqi Zhang
Qingjiang Chen
Metabolic Visualization and Intelligent Shape Analysis of the Hippocampus
1140(9)
Yoo-Joo Choi
Jeong-Sik Kim
Min-Jeong Kim
Soo-Mi Choi
Myoung-Hee Kim
Characteristic Classification and Correlation Analysis of Source-Level Vulnerabilities in the Linux Kernel
1149(8)
Kwangsun Ko
Insook Jang
Yong-hyeog Kang
Jinseok Lee
Young Ik Eom
Author Index 1157

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program