Signcryption-based key management for MANETs applications in mobile commerce Li JingfengZhu YuefeiPan Heng Cryptography Pages: 1621 - 1624
Practical encrypted key agreement using passwords Wu ShuhuaZhu Yuefei Cryptography Pages: 1625 - 1628
Further analysis of block ciphers against timing attacks Li WeiGu Dawu Cryptography Pages: 1629 - 1632
An identity-based strong designated verifier proxy signature scheme Wang QinCao Zhenfu Cryptography Pages: 1633 - 1635
A TTP-independent watermarking protocol based on commutative cryptosystem for copyright protection in e-commerce Luo TingYuan JunHong Fan Cryptography Pages: 1636 - 1640
The mechanism about key and credential on trusted computing platform and the application study Zhen ZhidongZhang HuanguoZhang Liqiang Cryptography Pages: 1641 - 1644
A new fast modular arithmetic method in public key cryptography Wang BangjuZhang Huanguo Cryptography Pages: 1645 - 1648
An efficient and secure multi-secret sharing scheme with general access structures Pang LiaojunLi HuixianWang Yumin Cryptography Pages: 1649 - 1652
Improvement of identity-based threshold proxy signature scheme with known signers Li FagenHu YupuChen Jie Cryptography Pages: 1653 - 1656
Adaptive image digital watermarking with DCT and FCM Su LiyunMa HongTang Shifu Information Hiding Pages: 1657 - 1660
A new fragile watermarking scheme for text documents authentication Xiang HuazhengSun XingmingTang Chengliang Information Hiding Pages: 1661 - 1666
Digital watermarking algorithm based on wavelet transform and neural network Wang ZhenfeiZhai GuangqunWang Nengchao Information Hiding Pages: 1667 - 1670
A new watermarking protocol against conspiracy Zhang JunKou WeidongCao Xuefei Information Hiding Pages: 1671 - 1674
Chaos-based multipurpose image watermarking algorithm Zhu CongxuLiao XuefengLi Zhihua Information Hiding Pages: 1675 - 1678
Using combinational logic function to watermark IP based on FPGA Mao ShengDai GuanzhongLi Meifeng Information Hiding Pages: 1679 - 1682
An effective digital watermarking algorithm for binary text image Hu ZhihuaQin Zhongping Information Hiding Pages: 1683 - 1687
Centralized role-based access control for federated multi-domain environments Yu GuangcanLi ZhengdingMudar Sarem Security of Network and Communication Pages: 1688 - 1692
A new dynamic group signature scheme He Yefeng Security of Network and Communication Pages: 1693 - 1696
A new definition of virus He HongjunCao SihuaZou Zhiji Security of Network and Communication Pages: 1697 - 1700
Password-based group key agreement protocol for client-server application Lu RongxingCao ZhenfuSun Congkai Security of Network and Communication Pages: 1701 - 1703
A new digital multilevel proxy signature scheme based on elliptic curve cryptography Qin YanlinWu Xiaoping Security of Network and Communication Pages: 1704 - 1706
An efficient ECDSA-based signature scheme for wireless networks Xu ZhongDai GuanzhongYang Deming Security of Network and Communication Pages: 1707 - 1710
A potential approach of internet worm propagation based on P2P Yao YuLuo XingruiYu Ge Security of Network and Communication Pages: 1711 - 1714
Security analysis of discrete logarithm based cryptosystems Wang YuzhuLiao Xiaofeng Security of Network and Communication Pages: 1715 - 1717
Assessing the risk situation of network security for active defense Zhang XiangYao ShupingTang Chenghua Security of Network and Communication Pages: 1718 - 1722
A scalable intrusion detection system for IPv6 Liu BinLi ZhitangLi Zhanchun Security of Network and Communication Pages: 1723 - 1726
A forward integrity and itinerary secrecy protocol for mobile agents Guan HuanmeiMeng XuejunZhang Huanguo Security of Network and Communication Pages: 1727 - 1730
Idetity based group key agreement from bilinear pairing Wang LimingWu Chuankun Security of Network and Communication Pages: 1731 - 1735
Context-aware usage-based grid authorization framework Cui YongquanHong FanFu Cai Security of Network and Communication Pages: 1736 - 1740
A threshold scheme under peer-to-peer network Xie YuminShi FengXu Jianqiang Security of Network and Communication Pages: 1741 - 1744
Electronic payment scheme to prevent the treachery Fan KaiZhang JunXiao Guozhen Security of Network and Communication Pages: 1745 - 1748
A secure MAKAP for wireless communication Liu ZhimengZhao YanliFan Hui Security of Network and Communication Pages: 1749 - 1752
A method of eliminating information disclosure in view publishing Liu GuohuaGao Shihong Security of Network and Communication Pages: 1753 - 1756
Probabilistic analysis on connectivity for sensor grids with unreliable nodes Wang GaocaiLin ChuangChen Jianer Security of Network and Communication Pages: 1757 - 1760
An identity-based scheme of fair exchange of digital signatures Yu YongYang BoYang Guoqing Security of Network and Communication Pages: 1761 - 1764
A new detection approach based on the maximum entropy model Dong XiaomeiXiang GuangLi Xiaohua Security of Network and Communication Pages: 1765 - 1768
Anomaly detection system based on principal component analysis and support vector machine Li ZhanchunLi ZhitangLiu Bin Security of Network and Communication Pages: 1769 - 1772
Fault attack on the balanced shrinking generator Gao JuntaoLi XuelianHu Yupu Security of Network and Communication Pages: 1773 - 1776
A secure anonymous internet electronic voting scheme based on the polynomial Cao FengCao Zhenfu Security of Network and Communication Pages: 1777 - 1780
A partially non-cryptographic security routing protocol in mobile ad hoc networks Chen JingCui Guohua Security of Network and Communication Pages: 1781 - 1784
A novel situation assessment method for network survivability Wang JianWang HuiqiangZhao Guosheng Security of Network and Communication Pages: 1785 - 1788
A novel multi-level trust algorithm for mobile ad hoc networks Yu GenjianZheng Baoyu Security of Network and Communication Pages: 1789 - 1792
Redundant multithreading architecture overview Yang HuaCui GangYang Xiaozong Security of Network and Communication Pages: 1793 - 1796
A framework for an adaptive anomaly detection system with fuzzy data mining Gao XiangWang MinZhao Rongchun Security of Network and Communication Pages: 1797 - 1800
An useful communication mechanism for distributed agents-based intrusion detection system Du Ye Security of Network and Communication Pages: 1801 - 1804
An improved grid security infrastructure by trusted computing Yan FeiZhang HuanguoQiang Weizhong Security of Network and Communication Pages: 1805 - 1808
A dynamic active multicast group access control framework based on trust management system Yang ChangChen XiaolinZhang Huanguo Security of Network and Communication Pages: 1809 - 1813
Using an improved clustering method to detect anomaly activities Li HanZhang NanBao Lihui Security of Network and Communication Pages: 1814 - 1818
A behavior-based remote trust attestation model Zhang HuanguoWang Fan Security of Network and Communication Pages: 1819 - 1822
DDoS defense algorithm based on multi-segment timeout technology Du RuizhongYang XiaohuiHe Xinfeng Security of Network and Communication Pages: 1823 - 1826