- Adipat Larprattanakul, Taratip Suwannasart:
An Approach for Regression Test Case Selection Using Object Dependency Graph. INCoS 2013: 617-621 - Thanh Van Le, Trong Nghia Truong, Hong Nam Nguyen, Tran Vu Pham:
An Efficient Pretopological Approach for Document Clustering. INCoS 2013: 114-120 - Xiangyang Li:
Design of Array Signal Processing System Based on TMS320C6678. INCoS 2013: 611-616 - Xiaoyu Li, Nan Chen, Changhua Zhu, Changxing Pei:
Improved Efficient Priority-and-Activity-Based QoS MAC Protocol. INCoS 2013: 315-318 - Xiaoqing Li, Jicheng Liu, Xuejun Li, Weiying Sun:
RGTE: A Reputation-Based Global Trust Establishment in VANETs. INCoS 2013: 210-214 - Caixia Li, Chanjuan Liu, Yilei Wang:
Texture Image Denoising Algorithm Based on Structure Tensor and Total Variation. INCoS 2013: 685-690 - Qi Li, Jianfeng Ma, Jinbo Xiong, Tao Zhang, Ximeng Liu:
Fully Secure Decentralized Key-Policy Attribute-Based Encryption. INCoS 2013: 220-225 - Xiaoqing Li, Weiying Sun, Xuejun Li, Jicheng Liu:
GRTR: A Geocasting Routing Based Target Region for VANET. INCoS 2013: 215-219 - Jin Li, Xiao Tan, Xiaofeng Chen, Duncan S. Wong:
An Efficient Proof of Retrievability with Public Auditing in Cloud Computing. INCoS 2013: 93-98 - Cailin Li, Dongmei Wang:
The Permanent Magnet Synchronous Linear Motor Position Control Based on Fuzzy Neural Network. INCoS 2013: 602-606 - Yannan Li, Qi Xia, Jianbing Ni, Yong Yu:
A New Construction of Proxy Signature Using Chameleon Hash Function. INCoS 2013: 388-391 - Keying Li, Yinghui Zhang, Hua Ma:
Key Policy Attribute-Based Proxy Re-encryption with Matrix Access Structure. INCoS 2013: 46-50 - Yanling Lian, Li Xu, Xinyi Huang:
Attribute-Based Signatures with Efficient Revocation. INCoS 2013: 573-577 - Kaitai Liang, Liming Fang, Willy Susilo, Duncan S. Wong:
A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security. INCoS 2013: 552-559 - Jian Lin, Bo Peng, Tianrui Li, Qin Chen:
A Learning-Based Framework for Image Segmentation Evaluation. INCoS 2013: 691-696 - Heng Liu:
Fast 3D Ear Recognition Based on Local Surface Matching and ICP Registration. INCoS 2013: 731-735 - Jingmei Liu, Shaopeng Chen, Linsen Zhao:
Lagrange Interpolation Attack against 6 Rounds of Rijndael-128. INCoS 2013: 652-655 - Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Qi Li, Jun Ma:
Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control. INCoS 2013: 51-57 - Zhusong Liu, Sheng Sun, Yunfa Li:
An Auditing Mechanism for the Security of Service in Grid. INCoS 2013: 153-156 - Huiqin Liu, Shubin Wang, Fei Li, Shaowen Zhan:
Research on Optimization for Cooperative Spectrum Sensing Based on Double Threshold Energy Detection. INCoS 2013: 629-632 - Zhen Liu, Xiaoyuan Yang:
Public Verifiable Key Encapsulation Mechanism under Factoring. INCoS 2013: 586-590 - Jie Liu, Bo Yang, Zhiguo Du:
Outsourcing of Verifiable Composite Modular Exponentiations. INCoS 2013: 546-551 - Bao Liu, Lei Zhang:
An Improved Identity-Based Batch Verification Scheme for VANETs. INCoS 2013: 809-814 - Ximeng Liu, Tao Zhang, Jianfeng Ma, Hui Zhu, Feng Cai:
Efficient Data Integrity Verification Using Attribute Based Multi-signature Scheme in Wireless Network. INCoS 2013: 173-180 - Zhenhua Liu, Xiangsong Zhang, Tsuyoshi Takagi:
Post-quantum Strongly Unforgeable Identity-Based Signature Scheme from Lattices without Random Oracles. INCoS 2013: 578-585 - Di Lu, Jianfeng Ma, Yichuan Wang, Ning Xi:
Highly Flexible and Extensible Storage Scheme for Virtualization Platforms under Cloud Computing. INCoS 2013: 1-8 - Chengwu Lu, Daoqing Zhou:
Image Decomposition Using Bregman-GTV and Meyer's G-Norm. INCoS 2013: 736-740 - Peng Luo, Ping Wei, Yiqun Liu:
A Color Digital Watermarking in Nonsampled Contourlet Domain Using Generic Algorithm. INCoS 2013: 673-676 - Chuangui Ma, Fushan Wei, Fengxiu Gao:
Efficient Client-to-Client Password Authenticated Key Exchange Based on RSA. INCoS 2013: 233-238 - Jian Mao, Pei Li, Kun Li, Tao Wei, Zhenkai Liang:
BaitAlarm: Detecting Phishing Sites Using Similarity in Fundamental Visual Features. INCoS 2013: 790-795