Advertisement

Computational Intelligence and Security

International Conference, CIS 2005, Xi’an, China, December 15-19, 2005, Proceedings, Part II

  • Yue Hao
  • Jiming Liu
  • Yu-Ping Wang
  • Yiu-ming Cheung
  • Hujun Yin
  • Licheng Jiao
  • Jianfeng Ma
  • Yong-Chang Jiao

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3802)

Also part of the Lecture Notes in Artificial Intelligence book sub series (LNAI, volume 3802)

Table of contents

  1. Front Matter
  2. Cryptography and Coding

    1. Sosun Kim, Nam Su Chang, Chang Han Kim, Young-Ho Park, Jongin Lim
      Pages 1-8
    2. Chunxiang Gu, Yuefei Zhu, Yajuan Zhang
      Pages 9-16
    3. Toshihiro Ohigashi, Yoshiaki Shiraishi, Masakatu Morii
      Pages 17-26
    4. Ping Dong, Xiangdong Shi, Jiehui Yang
      Pages 27-32
    5. Yoon Cheol Lee, Hiroshi Doi
      Pages 33-42
    6. Jingmei Liu, Xiangguo Cheng, Xinmei Wang
      Pages 49-54
    7. Geoff Skinner, Song Han, Elizabeth Chang
      Pages 55-61
    8. Fengtong Wen, Wenling Wu, Qiaoyan Wen
      Pages 62-67
    9. Yajing Li, Weihong Chen
      Pages 74-79
    10. Xuebing Zhou, Martin Schmucker, Christopher L. Brown
      Pages 80-85
  3. Cryptographic Protocols

    1. Seung Wook Jung, Christoph Ruland
      Pages 86-95
    2. Licheng Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian
      Pages 104-109
    3. M. Choudary Gorantla, Ashutosh Saxena
      Pages 110-116
    4. Xiaofeng Chen, Fangguo Zhang, Shengli Liu
      Pages 117-124
    5. Seungwon Lee, Seongje Cho, Jongmoo Choi, Yookun Cho
      Pages 125-130
    6. Sujing Zhou, Dongdai Lin
      Pages 131-136
    7. Yuqing Zhang, Zhiling Wang, Bo Yang
      Pages 137-142
    8. Jin Wook Byun, Dong Hoon Lee, Jongin Lim
      Pages 143-148
    9. Qiang Tang, Chris J. Mitchell
      Pages 149-154
    10. Yong Xu, Yuxiang Sun
      Pages 155-160
    11. Jian Liao, Yinghao Qi, Peiwei Huang, Mentian Rong
      Pages 161-166
    12. Li Hui, Shen Ting
      Pages 180-185
    13. Qiang Tang, Chris J. Mitchell
      Pages 192-197
    14. Lihua Wang, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto
      Pages 198-203
  4. Intrusion Detection

    1. Ping Wang, Binxing Fang, Xiaochun Yun
      Pages 212-219
    2. Il-Seop Song, Youngseok Lee, Taeck-Geun Kwon
      Pages 220-227
    3. Saraswathi Sachidananda, Srividya Gopalan, Sridhar Varadarajan
      Pages 236-243
    4. Junfeng Tian, Weidong Zhao, Ruizhong Du
      Pages 244-251
    5. Yuji Waizumi, Daisuke Kudo, Nei Kato, Yoshiaki Nemoto
      Pages 252-259
    6. SeongJe Cho, Hye-Young Chang, HongGeun Kim, WoongChul Choi
      Pages 260-266
    7. Vidyasagar Potdar, Chen Wu, Elizabeth Chang
      Pages 273-278
    8. Kyunghwan Baek, Heejun Jang, Youngjun Han, Hernsoo Hahn
      Pages 285-290
    9. Jangbok Kim, Jaehong Shim, Gihyun Jung, Kyunghee Choi
      Pages 297-302
    10. Jin Ho You, Seong Chae Seo, Young Dae Kim, Jun Yong Choi, Sang Jun Lee, Byung Ki Kim
      Pages 303-308
    11. Xiaojuan Sun, Xinliang Zhou, Ninghui Sun, Mingyu Chen
      Pages 322-327
    12. Linru Ma, Lin Yang, Jianxin Wang
      Pages 328-333

Other volumes

  1. International Conference, CIS 2005, Xi’an, China, December 15-19, 2005, Proceedings Part I
  2. Computational Intelligence and Security
    International Conference, CIS 2005, Xi’an, China, December 15-19, 2005, Proceedings, Part II

About these proceedings

Keywords

Bayesian networks Fuzzy architecture cognition computational intelligence cryptographic protocols data mining decision making fuzzy systems information hiding information retrieval intelligence intelligent age learning security

Editors and affiliations

  • Yue Hao
    • 1
  • Jiming Liu
    • 2
  • Yu-Ping Wang
    • 3
  • Yiu-ming Cheung
    • 4
  • Hujun Yin
    • 5
  • Licheng Jiao
    • 6
  • Jianfeng Ma
    • 7
  • Yong-Chang Jiao
    • 8
  1. 1.Microelectronic InstiuteXidian UniversityXi’anChina
  2. 2.Department of Computer ScienceHong Kong Baptist University, Kowloon TongHong Kong
  3. 3.School of Computer Science and TechnologyXidian UniversityXi’anChina
  4. 4.Department of Computer ScienceHong Kong Baptist UniversityHong Kong 
  5. 5.School of Electrical and Electronic EngineeringUniversity of ManchesterUK
  6. 6.Life Science Research Center, School of Electronic EngineeringXidian UniversityXi’anChina
  7. 7.Key Laboratory of Computer Networks and Information Security(Ministry of Education)Xidian UniversityXi’anChina
  8. 8.National Laboratory of Antennas and Microwave TechnologyXidian UniversityXi’anP.R. China

Bibliographic information

  • DOI https://doi.org/10.1007/11596981
  • Copyright Information Springer-Verlag Berlin Heidelberg 2005
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-30819-5
  • Online ISBN 978-3-540-31598-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site