Region of interest based selective encryption scheme for privacy protection in H.264 video Jie GuoJia-yun XuJia-li Bao OriginalPaper 05 August 2014 Pages: 385 - 391
Audio authenticity: Duplicated audio segment detection in waveform audio file Ji-nian XiaoYun-zhe JiaShao-pei Shi OriginalPaper 05 August 2014 Pages: 392 - 397
Efficient and provably-secure certificateless proxy re-encryption scheme for secure cloud data sharing Liang-liang WangKe-fei ChenYong-tao Wang OriginalPaper 05 August 2014 Pages: 398 - 405
Attribute-based signature on lattices Xian-ping MaoKe-fei ChenLiang-liang Wang OriginalPaper 05 August 2014 Pages: 406 - 411
One construction of chameleon all-but-one trapdoor functions Yi-dong XuSheng-li Liu OriginalPaper 05 August 2014 Pages: 412 - 417
Robust password and smart card based authentication scheme with smart card revocation Qi XieWen-hao LiuXiu-yuan Yu OriginalPaper 05 August 2014 Pages: 418 - 424
Research on classification of malware source code Chen Chia-meiLai Gu-hsin OriginalPaper 05 August 2014 Pages: 425 - 430
New constructions of dynamic threshold cryptosystem Yu LongKe-fei ChenXian-ping Mao OriginalPaper 05 August 2014 Pages: 431 - 435
Provably secure authenticated Diffie-Hellman key exchange for resource-limited smart card Hung-yu Chien OriginalPaper 05 August 2014 Pages: 436 - 439
Keyword search encryption scheme resistant against keyword-guessing attack by the untrusted server Chih-hung WangTai-yuan Tu OriginalPaper 05 August 2014 Pages: 440 - 442
Secure and efficient digital rights management mechanisms with privacy protection Jheng-jia HuangPei-chun LuChun-hung Lin OriginalPaper 05 August 2014 Pages: 443 - 447
Intrusion detection model with twin support vector machines Jun HeShi-hui Zheng OriginalPaper 05 August 2014 Pages: 448 - 454
Visual multi-secret sharing with friendliness Fuh-gwo JengKai-siang LinTzung-her Chen OriginalPaper 05 August 2014 Pages: 455 - 465
A secure and reliable routing protocol for wireless mesh networks Ren-junn HwangYu-kai Hsiao OriginalPaper 05 August 2014 Pages: 466 - 475
Comparison on hydraulic characteristics between orifice plate and plug Wan-zheng AiJian-hua Wu OriginalPaper 05 August 2014 Pages: 476 - 480
Particle swarm approach for structural optimization of battleship strength deck under air blast Hai-yang YuShi-lian ZhangShao-bo Wu OriginalPaper 05 August 2014 Pages: 481 - 487
Numerical study on vortex induced vibration of a flexible plate behind square cylinder with various flow velocities Shi-liang HuChuan-jing LuYou-sheng He OriginalPaper 05 August 2014 Pages: 488 - 494
Two-phase flow pressure drop of liquid nitrogen boiling in the straight section downstream of U-bend Dong DengSi-wei XieRong-shun Wang OriginalPaper 05 August 2014 Pages: 495 - 501
Engineering projects real-time supervision mechanism based on grid management Yun-na WuHe-yun DongJin-ying Zhang OriginalPaper 05 August 2014 Pages: 502 - 507
Serum renalase inversely related to heart rate variability in dialysis patients Bao-rui HuangFeng WangNian-song Wang OriginalPaper 05 August 2014 Pages: 508 - 512