Applications of Reversible Data Hiding Techniques with the Quick Response Codes / Hsiang-Cheh Huang ; Feng-Cheng Chang ; Wai-Chi Fang |
A New Approach in T-FA Authentication with OTP Using Mobile Phone / Abdulaziz S. Almazyad ; Yasir Ahmad |
Correlating Alerts into Compressed Graphs Using an Attribute-Based Method and Time Windows / Seyed Hossein Ahmadinejad ; Saeed Jalili |
A Study on Secure Contents Using in Urban Computing / Hoon Ko ; Jongmyung Choi ; Carlos Ramos |
Shadow Generation Protocol in Linguistic Threshold Schemes / Marek R. Ogiela ; Urszula Ogiela |
Analysis of Handwritten Signature Image / Debnath Bhattacharyya ; Poulami Das ; Samir Kumar Bandyopadhyay ; Tai-hoon Kim |
The Design of Signature Selection for Protecting Illegal Outflow of Sensitive Information in Mobile Device / Bo-heung Chung ; Min-ho Han ; Ki-young Kim |
Hardware Based Data Inspection for USB Data Leakage Prevention / DongHo Kang ; BoHeung Jung ; KiYoung Kim |
Grayscale Image Classification Using Supervised Chromosome Clustering |
Towards the Integration of Security Aspects into System Development Using Collaboration-Oriented Models / Linda Ariani Gunawan ; Peter Herrmann ; Frank Alexander Kraemer |
Impact of Malicious Node on Broadcast Schemes / Aneel Rahim ; Fahad bin Muyaha |
Hierarchical Identity-Based Identification Schemes / Ji-Jian Chin ; Swee-Huay Heng ; Bok-Min Goi |
The Trend of the Security Research for the Insider Cyber Threat / Jaeseung Hong ; Jongwung Kim ; Jeonghun Cho |
MIMO Wiretap Channel: A Scalar Approach / Mohammad Rakibul Islam ; Jinsang Kim |
Security Testing for Operating System and Its System Calls / Gaoshou Zhai ; Hanhui Niu ; Na Yang ; Minli Tian ; Chengyu Liu ; Hengsheng Yang |
Efficient Group Signature with Forward Secure Revocation / Haimin Jin ; Duncan S. Wong ; Yinlong Xu |
Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion / Jieren Cheng ; Jianping Yin ; Yun Liu ; Zhiping Cai ; Chengkun Wu |
Researching on Cryptographic Algorithm Recognition Based on Static Characteristic-Code / Tie-Ming Liu ; Lie-hui Jiang ; Hong-qi He ; Ji-zhong Li ; Xian Yu |
Verification of Security-Relevant Behavior Model and Security Policy for Model-Carrying Code / Yonglong Wei ; Xiaojuan Zheng ; Jinglei Ren ; Xudong Zheng ; Chen Sun ; Zhenhao Li |
Feature Level Fusion of Biometrics Cues: Human Identification with Doddington's Caricature / Dakshina Ranjan Kisku ; Phalguni Gupta ; Jamuna Kanta Sing |
A Study on the Interworking for SIP-Based Secure VoIP Communication with Security Protocols in the Heterogeneous Network / Seokung Yoon ; Hyuncheol Jung ; Kyung-Seok Lee |
DDoS Attack Detection Using Three-State Partition Baaed on Flow Interaction / Boyun Zhang |
A Development of Finite State Machine Create Tool for Cryptography Module Validation / Jae-goo Jeong ; Seung-yong Hur ; Gang-Soo Lee |
A Privacy-Aware System Using Threat-Based Evaluation and Feedback Method in Untrusted Ubiquitous Environments / Yuan Tian ; Biao Song ; Eui-Nam Huh |
Fusion of Multiple Matchers Using SVM for Offline Signature Identification / Phalgum Gupta |
A Two-Factor Mutual Authentication Scheme Using Biometrics and Smart Card / Sheikh Ziauddin |
Secure Collection Tree Protocol for Tamper-Resistant Wireless Sensors / Peter Pecho ; Jan Nagy ; Petr Hanáček ; Martin Drahanský |
Accelerometer Based Digital Video Stabilization for Security Surveillance Systems / Filip Orság ; Pair Hanáček |
Escrowed Deniable Identification Schemes / Pairat Thorncharoensri ; Qiong Huang ; Willy Susilo ; Man Ho Au ; Yi Mu ; Duncan Wong |
Insights into Malware Detection and Prevention on Mobile Phones / Qiang Yan ; Yingjiu Li ; Tieyan Li ; Robert Deng |
Automation of Post-exploitation: Focused on MS-Windows Targets / Mohammad Tabatabai Irani ; Edgar R. Weippl |
Speaker Dependent Frequency Cepstrum Coefficients |
Towards the Detection of Encrypted BitTorrent Traffic through Deep Packet Inspection / David A. Carvalho ; Manuela Pereira ; Mário M. Freire |
A Simple Encryption Scheme for Binary Elliptic Curves / Brian King |
Analysis of Text Complexity in a Crypto System - A Case Study on Telugu / M.S.V.S. Bhadri Raju ; B. Vishnu Vardhan ; G.A. Naidu ; L. Pratap Reddy ; A. Vinaya Babu |
Symmetric-Key Encryption for Wireless Internet SCADA / Rosslin John Robles ; Min-Kyu Choi |
An Efficient Pre-filtering Mechanism for Parallel Intrusion Detection Based on Many-Core GPU / En Zhu |
Author Index |
Applications of Reversible Data Hiding Techniques with the Quick Response Codes / Hsiang-Cheh Huang ; Feng-Cheng Chang ; Wai-Chi Fang |
A New Approach in T-FA Authentication with OTP Using Mobile Phone / Abdulaziz S. Almazyad ; Yasir Ahmad |
Correlating Alerts into Compressed Graphs Using an Attribute-Based Method and Time Windows / Seyed Hossein Ahmadinejad ; Saeed Jalili |