


Остановите войну!
for scientists:


default search action
1st CIS 2005: Xi'an, China
- Yue Hao, Jiming Liu, Yu-Ping Wang, Yiu-ming Cheung, Hujun Yin, Licheng Jiao, Jianfeng Ma, Yong-Chang Jiao:
Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II. Lecture Notes in Computer Science 3802, Springer 2005, ISBN 3-540-30819-9
Cryptography and Coding
- Sosun Kim, Nam Su Chang, Chang Han Kim, Young-Ho Park, Jongin Lim:
A Fast Inversion Algorithm and Low-Complexity Architecture over GF(2m). 1-8 - Chunxiang Gu, Yuefei Zhu, YaJuan Zhang:
An ID-Based Optimistic Fair Signature Exchange Protocol from Pairings. 9-16 - Toshihiro Ohigashi
, Yoshiaki Shiraishi, Masakatu Morii:
FMS Attack-Resistant WEP Implementation Is Still Broken. 17-26 - Ping Dong, Xiangdong Shi, Jiehui Yang:
Design of a New Kind of Encryption Kernel Based on RSA Algorithm. 27-32 - Yoon Cheol Lee, Hiroshi Doi:
On the Security of Condorcet Electronic Voting Scheme. 33-42 - Qian Yin, Yunlun Luo, Ping Guo:
Special Distribution of the Shortest Linear Recurring Sequences in Z /(p) Field. 43-48 - Jingmei Liu, Xiangguo Cheng, Xinmei Wang:
Cryptanalysis of a Cellular Automata Cryptosystem. 49-54 - Geoff Skinner
, Song Han, Elizabeth Chang
:
A New Conceptual Framework Within Information Privacy: Meta Privacy. 55-61 - Fengtong Wen
, Wenling Wu, Qiaoyan Wen:
Error Oracle Attacks on Several Modes of Operation. 62-67 - Lihua Dong, Yong Zeng, Yupu Hu:
Stability of the Linear Complexity of the Generalized Self-shrinking Sequences. 68-73 - Yajing Li, Weihong Chen:
On the Construction of Some Optimal Polynomial Codes. 74-79 - Xuebing Zhou, Martin Schmucker, Christopher L. Brown:
Perceptual Hashing of Video Content Based on Differential Block Similarity. 80-85
Cryptographic Protocols
- Seung Wook Jung, Christoph Ruland:
Secure Software Smartcard Resilient to Capture. 86-95 - Kewei Lv:
Revised Fischlin's (Blind) Signature Schemes. 96-103 - Lichen Wang, Zhenfu Cao
, Xiangxue Li, Haifeng Qian:
Certificateless Threshold Signature Schemes. 104-109 - M. Choudary Gorantla, Ashutosh Saxena:
An Efficient Certificateless Signature Scheme. 110-116 - Xiaofeng Chen, Fangguo Zhang, Shengli Liu:
ID-Based Restrictive Partially Blind Signatures. 117-124 - Seungwon Lee, Seongje Cho, Jongmoo Choi, Yookun Cho:
Batch Verification with DSA-Type Digital Signatures for Ubiquitous Computing. 125-130 - Sujing Zhou, Dongdai Lin:
On Anonymity of Group Signatures. 131-136 - Yuqing Zhang, Zhiling Wang, Bo Yang:
The Running-Mode Analysis of Two-Party Optimistic Fair Exchange Protocols. 137-142 - Jin Wook Byun, Dong Hoon Lee, Jongin Lim:
Password-Based Group Key Exchange Secure Against Insider Guessing Attacks. 143-148 - Qiang Tang, Chris J. Mitchell
:
On the Security of Some Password-Based Key Agreement Schemes. 149-154 - Yong Xu, Yuxiang Sun:
A New Group Rekeying Method in Secure Multicast. 155-160 - Jian Liao, Yinghao Qi, Peiwei Huang, Mentian Rong:
Pairing-Based Provable Blind Signature Scheme Without Random Oracles. 161-166 - Qin Wang, Zhenfu Cao
:
Efficient ID-Based Proxy Signature and Proxy Signcryption Form Bilinear Pairings. 167-172 - Changgen Peng, Xiang Li:
An Identity-Based Threshold Signcryption Scheme with Semantic Security. 173-179 - Hui Li, Ting Shen:
A Token-Based Single Sign-On Protocol. 180-185 - Shaohua Tang:
Simple Threshold RSA Signature Scheme Based on Simple Secret Sharing. 186-191 - Qiang Tang, Chris J. Mitchell
:
Efficient Compilers for Authenticated Group Key Exchange. 192-197 - Lihua Wang, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto:
Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys. 198-203
Intrusion Detection
- Ki-Won Yeom, Ji-Hyung Park:
An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks. 204-211 - Ping Wang, Binxing Fang, Xiao-chun Yun:
A New User-Habit Based Approach for Early Warning of Worms. 212-219 - Il-Seop Song, Youngseok Lee, Taeck-Geun Kwon:
A Multi-gigabit Virus Detection Algorithm Using Ternary CAM. 220-227 - Yong Zeng, Jianfeng Ma:
Sampling Distance Analysis of Gigantic Data Mining for Intrusion Detection Systems. 228-235 - Saraswathi Sachidananda, Srividya Gopalan, Sridhar Varadarajan:
Hardware-Software Hybrid Packet Processing for Intrusion Detection Systems. 236-243 - Junfeng Tian, Weidong Zhao, Ruizhong Du:
D-S Evidence Theory and Its Data Fusion Application in Intrusion Detection. 244-251 - Yuji Waizumi, Daisuke Kudo, Nei Kato, Yoshiaki Nemoto:
A New Network Anomaly Detection Technique Based on Per-Flow and Per-Service Statistics. 252-259 - Seongje Cho, Hyeyoung Chang, HongGeun Kim, WoongChul Choi:
SoIDPS: Sensor Objects-Based Intrusion Detection and Prevention System and Its Implementation. 260-266 - Ming Li, Wei Zhao
:
A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services. 267-272 - Vidyasagar M. Potdar
, Chen Wu, Elizabeth Chang
:
Tamper Detection for Ubiquitous RFID-Enabled Supply Chain. 273-278 - Wei Yan:
Measuring the Histogram Feature Vector for Anomaly Network Traffic. 279-284 - Kyunghwan Baek, Heejun Jang, Youngjun Han, Hernsoo Hahn:
Efficient Small Face Detection in Surveillance Images Using Major Color Component and LDA Scheme. 285-290 - Jin Zheng, Bo Li, Bing Zhou, Wei Li:
Fast Motion Detection Based on Accumulative Optical Flow and Double Background Model. 291-296 - Jangbok Kim, Jaehong Shim, Gihyun Jung, Kyunghee Choi:
Reducing Worm Detection Time and False Alarm in Virus Throttling. 297-302 - Jin Ho You, Seong Chae Seo, Young Dae Kim, Jun Yong Choi, Sang Jun Lee, Byung Ki Kim:
Protection Against Format String Attacks by Binary Rewriting. 303-308 - Zhanchun Li, Zhitang Li, Yao Li, Bin Liu:
Masquerade Detection System Based on Principal Component Analysis and Radial Basics Function. 309-314 - Cheng Zhang, Qinke Peng:
Anomaly Detection Method Based on HMMs Using System Call and Call Stack Information. 315-321 - Xiaojuan Sun, Xinliang Zhou, Ninghui Sun, Mingyu Chen:
Parallel Optimization Technology for Backbone Network Intrusion Detection System. 322-327 - Linru Ma, Lin Yang, Jianxin Wang:
Attack Scenario Construction Based on Rule and Fuzzy Clustering. 328-333 - Lingjuan Li, Wenyu Tang, Ruchuan Wang:
A CBR Engine Adapting to IDS. 334-339 - Hee Suk Seo, Tae Ho Cho:
Application of Fuzzy Logic for Distributed Intrusion Detection. 340-347
Security Models and Architecture
- Syed Naqvi, Michel Riguidel:
Dynamic Access Control for Pervasive Grid Applications. 348-355 - Xinghua Li, Jianfeng Ma, Sang-Jae Moon:
On the Security of the Canetti-Krawczyk Model. 356-363 - Yi Shi, Xinyu Yang:
A Novel Architecture for Detecting and Defending Against Flooding-Based DDoS Attacks. 364-374 - Dayin Wang, Dongdai Lin, Wenling Wu:
A Variant of Poly1305 MAC and Its Security Proof. 375-380 - Jianjun Shen, Sihan Qing, Qingni Shen, Liping Li:
Covert Channel Identification Founded on Information Flow Analysis. 381-387 - André Årnes, Karin Sallhammar, Kjetil Haslum, Tønnes Brekne, Marie Elisabeth Gaup Moe
, Svein J. Knapskog:
Real-Time Risk Assessment with Network Sensors and Intrusion Detection Systems. 388-397 - Xiaofeng Rong, Xiaojuan Gao, Ruidan Su, Lihua Zhou:
Design and Implementation of a Parallel Crypto Server. 398-406 - Xuegang Lin, Rongsheng Xu, Miaoliang Zhu:
Survivability Computation of Networked Information Systems. 407-414 - Yongzheng Zhang, Binxing Fang, Yue Chi, Xiao-chun Yun:
Assessment of Windows System Security Using Vulnerability Relationship Graph. 415-420 - Hui-Xian Li, Chun-Tian Cheng, Liao-Jun Pang:
A New (t, n)-Threshold Multi-secret Sharing Scheme. 421-426 - Sang-ho Park, Taekyoung Kwon:
An Efficient Message Broadcast Authentication Scheme for Sensor Networks. 427-432 - Fan Zhang, Xinhong Zhang, Zhiguo Chen:
Digital Image Authentication Based on Error-Correction Codes. 433-438 - Duhyun Bae, Gwanyeon Kim, Jiho Kim, Sehyun Park, Ohyoung Song:
Design and Implementation of Efficient Cipher Engine for IEEE 802.11i Compatible with IEEE 802.11n and IEEE 802.11e. 439-444 - Shanshan Duan, Zhenfu Cao
, Yuan Zhou:
Secure Delegation-by-Warrant ID-Based Proxy Signcryption Scheme. 445-450 - Seong Chae Seo, Jin Ho You, Young Dae Kim, Jun Yong Choi, Sang Jun Lee, Byung Ki Kim:
Building Security Requirements Using State Transition Diagram at Security Threat Location. 451-456 - Weiping Liu, Wandong Cai:
Study on Security iSCSI Based on SSH. 457-462 - Kenli Li, Yan He, Renfa Li, Tao Yang:
A Scheduling Algorithm Based on a Trust Mechanism in Grid. 463-468 - Byungil Lee, Howon Kim:
Enhanced Security and Privacy Mechanism of RFID Service for Pervasive Mobile Device. 469-475 - Yunkai Zhang, Fangwei Wang
, Changguang Wang, Jianfeng Ma:
Worm Propagation Modeling and Analysis on Network. 476-481 - Hong Zhang, Hai-Xin Duan, Wu Liu, Jianping Wu:
An Extensible AAA Infrastructure for IPv6. 482-487 - Fan Zhang, Jianfeng Ma, Sang-Jae Moon:
The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11i. 488-493 - Chang-Won Park, Sung Jin Choi, Hee Yong Youn:
A Noble Key Pre-distribution Scheme with LU Matrix for Secure Wireless Sensor Networks. 494-499
Security Management
- Haibo Tian, Xi Sun, Yumin Wang:
A Virtual Bridge Certificate Authority Model. 500-507 - Jorma Kajava, Reijo Savola, Rauno Varonen:
Weak Signals in Information Security Management. 508-517 - Wu Liu, Hai-Xin Duan, Jianping Wu, Xing Li:
PDTM: A Policy-Driven Trust Management Framework in Distributed Systems. 518-525 - Mengquan Lin, Qiangmin Wang, Jianhua Li:
Methodology of Quantitative Risk Assessment for Information System Security. 526-531 - Mei-juan Huang, Jianzhong Zhang, Shu-cui Xie:
A Secure and Efficient (t, n) Threshold Verifiable Multi-secret Sharing Scheme. 532-537 - Chin-Chen Chang, Jung-San Lee:
Improvement on an Optimized Protocol for Mobile Network Authentication and Security. 538-541 - Qian-Mu Li, Man-Wu Xu, Hong Zhang, Fengyu Liu:
Neural Network Based Flow Forecast and Diagnosis. 542-547 - Bat-Odon Purevjii, Masayoshi Aritsugi
, Sayaka Imai, Yoshinari Kanamori, Cherri M. Pancake:
Protecting Personal Data with Various Granularities: A Logic-Based Access Control Approach. 548-553 - Hui-Feng Huang, Chin-Chen Chang:
Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function. 554-559 - Hui He, Mingzeng Hu, Weizhe Zhang, Hongli Zhang, Zhi Yang:
Topology-Based Macroscopical Response and Control Technology for Network Security Event. 560-566
Watermarking and Information Hiding
- Chin-Chen Chang, Chia-Chen Lin
, Jun-Bin Yeh:
Adaptive Hiding Scheme Based on VQ-Indices Using Commutable Codewords. 567-572 - Xiaoping Liang, Xiaoyun Wu, Jiwu Huang:
Reversible Data Hiding for Image Based on Histogram Modification of Wavelet Coefficients. 573-580 - Young-Ran Park, Hyun-Ho Kang, Sang-Uk Shin, Ki-Ryong Kwon:
An Image Steganography Using Pixel Characteristics. 581-588 - Konstantinos Papapanagiotou, Emmanouel Kellinis, Giannis F. Marias, Panagiotis Georgiadis:
Alternatives for Multimedia Messaging System Steganography. 589-596 - Shuai Wan, Yilin Chang, Fuzheng Yang:
Error Concealment for Video Transmission Based on Watermarking. 597-604 - Minh-Triet Tran
, Anh Duc Duong:
Applying the AES and Its Extended Versions in a General Framework for Hiding Information in Digital Images. 605-610 - Bin Liu, Zhitang Li, Zhanchun Li:
An Image Hiding Algorithm Based on Bit Plane. 611-616 - Xiangyang Wang, Hong Zhao:
A Blind Audio Watermarking Algorithm Robust Against Synchronization Attack. 617-622 - Hyun-Mi Kim, Ik-Hwan Cho, A-Young Cho, Dong-Seok Jeong:
Semi-fragile Watermarking Algorithm for Detection and Localization of Temper Using Hybrid Watermarking Method in MPEG-2 Video. 623-628 - Zhiqiang Yao, Liping Chen, Rihong Pan, Boxian Zou, Licong Chen:
Public Watermarking Scheme Based on Multiresolution Representation and Double Hilbert Scanning. 629-634 - Daesung Moon, Taehae Kim, Seunghwan Jung, Yongwha Chung, Kiyoung Moon, Dosung Ahn, Sang-Kyoon Kim:
Performance Evaluation of Watermarking Techniques for Secure Multimodal Biometric Systems. 635-642 - Seong-Whan Kim, HyunSung Sung:
An Improvement of Auto-correlation Based Video Watermarking Scheme Using Independent Component Analysis. 643-648 - Chen Xu, Weiqiang Zhang, Francis R. Austin:
A Digital Watermarking Technique Based on Wavelet Packages. 649-654 - Long Ma, Changjun Li, Shuni Song:
A Spectral Images Digital Watermarking Algorithm. 655-660 - Niladri B. Puhan, Anthony T. S. Ho
:
Restoration in Secure Text Document Image Authentication Using Erasable Watermarks. 661-668
Web and Network Applications
- Won-Hyuck Choi, Doo-Hyun Kim, Kwang-Jae Lee, Jung-Sun Kim:
The Study of RED Algorithm Used Multicast Router Based Buffer Management. 669-678 - Lei Cao, Jian Cao, Minglu Li:
Genetic Algorithm Utilized in Cost-Reduction Driven Web Service Selection. 679-686 - Xiaohua Luo, Kougen Zheng, Zhaohui Wu, Yunhe Pan:
MacroOS: A Pervasive Computing Platform Supporting Context Awareness and Context Management. 687-694 - Qin Liu
, Chanle Wu:
A Frame for Selecting Replicated Multicast Servers Using Genetic Algorithm. 695-702 - Shaohe Lv, Jianping Yin, Zhiping Cai, Chi Liu:
On a Novel Methodology for Estimating Available Bandwidth Along Network Paths. 703-710 - Liyuan Zhao, Keqin Liu, Jun Zheng:
A New AQM Algorithm for Enhancing Internet Capability Against Unresponsive Flows. 711-718 - Terry C. House:
Client Server Access: Wired vs. Wireless LEO Satellite-ATM Connectivity; A (MS-Ro-BAC) Experiment. 719-724 - Jinhyung Kim, Dongwon Jeong, Doo-Kwon Baik:
An Algorithm for Automatic Inference of Referential Integrities During Translation from Relational Database to XML Schema. 725-730 - Shuning Cui, Boqin Feng:
A Fuzzy Integral Method to Merge Search Engine Results on Web. 731-736 - Sungjune Hong, Sunyoung Han:
The Next Generation PARLAY X with QoS/QoE. 737-742 - Seong-Woo Kim, Young-Chul Jung, Young-Tak Kim:
A Design of Platform for QoS-Guaranteed Multimedia Services Provisioning on IP-Based Convergence Network. 743-748 - Tai Sik Lee, Dong Wook Lee, Jeong Hyun Kim:
Introduction of Knowledge Management System for Technical Support in Construction Industries. 749-756 - Qiuhua Zheng, Yuntao Qian:
An Event Correlation Approach Based on the Combination of IHU and Codebook. 757-763
Image and Signal Processing
- Bicheng Li, Hujun Yin:
Face Recognition Based on Support Vector Machine Fusion and Wavelet Transform. 764-771 - Jun Zhou, Guangda Su, Yafeng Deng, Kai Meng, Congcong Li:
A Dynamic Face and Fingerprint Fusion System for Identity Authentication. 772-779 - Kyu B. Doh, Jungho Ohn, Ting-C. Poon:
Image Recognition for Security Verification Using Real-Time Joint Transform Correlation with Scanning Technique. 780-787 - Ying-Han Pang
, Andrew Teoh Beng Jin
, David Ngo Chek Ling:
Binarized Revocable Biometrics in Face Recognition. 788-795 - Junping Wang, Yue Hao:
Short Critical Area Computational Method Using Mathematical Morphology. 796-803 - Yong Zhou, Xiaofeng Hu, Qingtai Ye:
A Robust Lane Detection Approach Based on MAP Estimate and Particle Swarm Optimization. 804-811 - Fuhai Li, Jinwen Ma, Dezhi Huang:
MFCC and SVM Based Recognition of Chinese Vowels. 812-819 - Zhe-Ming Lu, Hui Pei, Hans Burkhardt:
A Spatial/Frequency Hybrid Vector Quantizer Based on a Classification in the DCT Domain. 820-825 - Ji Bai, Lizhuang Ma, Li Yao, Tingting Yao, Ying Zhang:
Removing of Metal Highlight Spots Based on Total Variation Inpainting with Multi-sources-flashing. 826-831 - Kyoung-Mi Lee:
Component-Based Online Learning for Face Detection and Verification. 832-837 - Wenbing Fan, Jing Chen, Jina Zhen:
SPIHT Algorithm Based on Fast Lifting Wavelet Transform in Image Compression. 838-844 - Han-Suh Koo, Chang-Sung Jeong:
Modified EZW Coding for Stereo Residual. 845-850