Computational Intelligence and Security

International Conference, CIS 2005, Xi’an, China, December 15-19, 2005, Proceedings, Part II

  • Yue Hao
  • Jiming Liu
  • Yu-Ping Wang
  • Yiu-ming Cheung
  • Hujun Yin
  • Licheng Jiao
  • Jianfeng Ma
  • Yong-Chang Jiao

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3802)

Also part of the Lecture Notes in Artificial Intelligence book sub series (LNAI, volume 3802)

Table of contents

  1. Front Matter
  2. Cryptography and Coding

    1. Sosun Kim, Nam Su Chang, Chang Han Kim, Young-Ho Park, Jongin Lim
      Pages 1-8
    2. Chunxiang Gu, Yuefei Zhu, Yajuan Zhang
      Pages 9-16
    3. Toshihiro Ohigashi, Yoshiaki Shiraishi, Masakatu Morii
      Pages 17-26
    4. Ping Dong, Xiangdong Shi, Jiehui Yang
      Pages 27-32
    5. Yoon Cheol Lee, Hiroshi Doi
      Pages 33-42
    6. Jingmei Liu, Xiangguo Cheng, Xinmei Wang
      Pages 49-54
    7. Geoff Skinner, Song Han, Elizabeth Chang
      Pages 55-61
    8. Fengtong Wen, Wenling Wu, Qiaoyan Wen
      Pages 62-67
    9. Yajing Li, Weihong Chen
      Pages 74-79
    10. Xuebing Zhou, Martin Schmucker, Christopher L. Brown
      Pages 80-85
  3. Cryptographic Protocols

    1. Seung Wook Jung, Christoph Ruland
      Pages 86-95
    2. Licheng Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian
      Pages 104-109
    3. M. Choudary Gorantla, Ashutosh Saxena
      Pages 110-116
    4. Xiaofeng Chen, Fangguo Zhang, Shengli Liu
      Pages 117-124
    5. Seungwon Lee, Seongje Cho, Jongmoo Choi, Yookun Cho
      Pages 125-130
    6. Sujing Zhou, Dongdai Lin
      Pages 131-136

Other volumes

  1. International Conference, CIS 2005, Xi’an, China, December 15-19, 2005, Proceedings Part I
  2. Computational Intelligence and Security
    International Conference, CIS 2005, Xi’an, China, December 15-19, 2005, Proceedings, Part II

About these proceedings

Keywords

Bayesian networks Fuzzy architecture cognition computational intelligence cryptographic protocols data mining decision making fuzzy systems information hiding information retrieval intelligence intelligent age learning security

Editors and affiliations

  • Yue Hao
    • 1
  • Jiming Liu
    • 2
  • Yu-Ping Wang
    • 3
  • Yiu-ming Cheung
    • 4
  • Hujun Yin
    • 5
  • Licheng Jiao
    • 6
  • Jianfeng Ma
    • 7
  • Yong-Chang Jiao
    • 8
  1. 1.Microelectronic InstiuteXidian UniversityXi’anChina
  2. 2.Department of Computer ScienceHong Kong Baptist University, Kowloon TongHong Kong
  3. 3.School of Computer Science and TechnologyXidian UniversityXi’anChina
  4. 4.Department of Computer ScienceHong Kong Baptist UniversityHong Kong 
  5. 5.School of Electrical and Electronic EngineeringUniversity of ManchesterUK
  6. 6.Life Science Research Center, School of Electronic EngineeringXidian UniversityXi’anChina
  7. 7.Key Laboratory of Computer Networks and Information Security(Ministry of Education)Xidian UniversityXi’anChina
  8. 8.National Laboratory of Antennas and Microwave TechnologyXidian UniversityXi’anP.R. China

Bibliographic information

  • DOI https://doi.org/10.1007/11596981
  • Copyright Information Springer-Verlag Berlin Heidelberg 2005
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-30819-5
  • Online ISBN 978-3-540-31598-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book