Algebraic Construction for Zero-Knowledge Sets Rui XueNing-Hui LiJiang-Tao Li Regular Paper 05 April 2008 Pages: 166 - 175
WWW Business Applications Based on the Cellular Model Toshio KodamaTosiyasu L. KuniiYoichi Seki Regular Paper 05 April 2008 Pages: 176 - 187
An Efficient Clustering Algorithm for k-Anonymisation Grigorios LoukidesJian-Hua Shao Regular Paper 05 April 2008 Pages: 188 - 202
Competitive Analysis of Two Special Online Device Replacement Problems Chun-Lin XinWei-Min MaLei Yang Regular Paper 05 April 2008 Pages: 203 - 213
Cryptanalysis of a Type of CRT-Based RSA Algorithms Bao-Dong QinMing LiFan-Yu Kong Regular Paper 05 April 2008 Pages: 214 - 221
WNN-Based Network Security Situation Quantitative Prediction Method and Its Optimization Ji-Bao LaiHui-Qiang WangGuo-Sheng Zhao Regular Paper 05 April 2008 Pages: 222 - 230
Constructing Maximum Entropy Language Models for Movie Review Subjectivity Analysis Bo ChenHui HeJun Guo Regular Paper 05 April 2008 Pages: 231 - 239
Generic Transformation from Weakly to Strongly Unforgeable Signatures Qiong HuangDuncan S. WongYi-Ming Zhao Regular Paper 05 April 2008 Pages: 240 - 252
New Sealed-Bid Electronic Auction with Fairness, Security and Efficiency Chia-Chi WuChin-Chen ChangIuon-Chang Lin Regular Paper 05 April 2008 Pages: 253 - 264
Forgeability of Wang-Tang-Li’s ID-Based Restrictive Partially Blind Signature Scheme Sheng-Li LiuXiao-Feng ChenFang-Guo Zhang Short Paper 05 April 2008 Pages: 265 - 269
A Robust and Fast Non-Local Means Algorithm for Image Denoising Yan-Li LiuJin WangQun-Sheng Peng Regular Paper 05 April 2008 Pages: 270 - 279
Proper Reparametrization of Rational Ruled Surface Jia LiLi-Yong ShenXiao-Shan Gao Short Paper 05 April 2008 Pages: 290 - 297
Chip Multithreaded Consistency Model Zu-Song LiDan-Dan HuanZhi-Min Tang Short Paper 05 April 2008 Pages: 298 - 305