


default search action
ICCSA 2005: Singapore
- Osvaldo Gervasi, Marina L. Gavrilova, Vipin Kumar, Antonio Laganà, Heow Pueh Lee, Youngsong Mun, David Taniar, Chih Jeng Kenneth Tan:

Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part II. Lecture Notes in Computer Science 3481, Springer 2005, ISBN 3-540-25861-2
Approaches or Methods of Security Engineering Workshop
- Hae Sool Yang, Jung-Hun Hong, Seok-Hyung Hwang, Haeng-Kon Kim:

Implementation of Short Message Service System to Be Based Mobile Wireless Internet. 1-9 - Ju-In Youn, He-Jue Eun, Yong-Sung Kim:

Fuzzy Clustering for Documents Based on Optimization of Classifier Using the Genetic Algorithm. 10-20 - Hua Su, Kil To Chong, Alexander G. Parlos:

A Neural Network Method for Induction Machine Fault Detection with Vibration Signal. 1293-1302 - Sun-Myung Hwang:

P2P Protocol Analysis and Blocking Algorithm. 21-30 - Jin-Sung Kim, Chun-Sik Yoo, Mi-Kyung Lee, Yong-Sung Kim:

Object Modeling of RDF Schema for Converting UML Class Diagram. 31-41 - Gu-Beom Jeong, Guk-Boh Kim:

A Framework for Security Assurance in Component Based Development. 42-51 - Haeng-Kon Kim, Hae Sool Yang:

Security Framework to Verify the Low Level Implementation Codes. 52-61 - Haeng-Kon Kim:

A Study on Evaluation of Component Metric Suites. 62-70 - Bobby D. Gerardo, Jaewan Lee, Yeon-Sung Choi, Malrey Lee:

The K-Means Clustering Architecture in the Multi-stage Data Mining Process. 71-81 - Hyang-Chang Choi, YongHoon Yi, Jae-Hyun Seo, BongNam Noh, HyungHyo Lee:

A Privacy Protection Model in ID Management Using Access Control. 82-91 - InJung Kim, Yoon Jung Chung, YoungGyo Lee, Dongho Won:

A Time-Variant Risk Analysis and Damage Estimation for Large-Scale Network Systems. 92-101 - Injoo Jang, Hyeong Seon Yoo:

Efficient Multi-bit Shifting Algorithm in Multiplicative Inversion Problems. 102-110 - Joungho Lee, Injoo Jang, Hyeong Seon Yoo:

Modified Token-Update Scheme for Site Authentication. 111-116 - Dae-Hee Seo, Im-Yeong Lee, Hee-Un Park:

A Study on Secure SDP of RFID Using Bluetooth Communication. 117-126 - Jong Woo Kim, Ju-Yeon Kim, Hyun-Suk Hwang, Sung-Seok Park, Chang Soo Kim, Sung-gi Park:

The Semantic Web Approach in Location Based Services. 127-136 - Haeng-Kon Kim, Oh-Hyun Kwon:

SCTE: Software Component Testing Environments. 137-146 - Jongwoo Chae, Jungkyu Kwon, Mokdong Chung:

Computer Security Management Model Using MAUT and SNMP. 147-156 - Young-Tak Kim, Hae-Sun Kim, Hyun-Ho Shin:

Session and Connection Management for QoS-Guaranteed Multimedia Service Provisioning on IP/MPLS Networks. 157-168 - Ihn-Han Bae, Sun-Jin Oh:

A GQS-Based Adaptive Mobility Management Scheme Considering the Gravity of Locality in Ad-Hoc Networks. 169-176 - Seo-Il Kang, Im-Yeong Lee:

A Study on the E-Cash System with Anonymity and Divisibility. 177-186 - Yonghwan Lee, Eunmi Choi, Dugki Min:

An Authenticated Key Exchange Mechanism Using One-Time Shared Key. 187-194 - Oh-Hyung Kang, Seong-Yoon Shin:

Creation of Soccer Video Highlight Using the Caption Information. 195-204 - Jaeseon Ko, Bobby D. Gerardo, Jaewan Lee, Jae-Jeong Hwang:

The Information Search System Using Neural Network and Fuzzy Clustering Based on Mobile Agent. 205-214 - Sung-Ja Choi, Yeon-hee Kang, Gang-Soo Lee:

A Security Evaluation and Testing Methodology for Open Source Software Embedded Information Security System. 215-224 - Minsoo Kim, Jae-Hyun Seo, Seungyong Lee, BongNam Noh, Jung-Taek Seo, Eung Ki Park, Choonsik Park:

An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification. 225-234 - Mi-Og Park, Dea-Woo Park:

A New Stream Cipher Using Two Nonlinear Functions. 235-244 - Hwankoo Kim

, Bongjoo Park, JaeCheol Ha, Byoungcheon Lee, DongGook Park:
New Key Management Systems for Multilevel Security. 245-253 - ByungRae Cha, Kyung-Woo Park, JaeHyun Seo:

Neural Network Techniques for Host Anomaly Intrusion Detection Using Fixed Pattern Transformation. 254-263 - Kyeongmo Park:

The Role of Secret Sharing in the Distributed MARE Protocols. 264-273 - Yoon Jung Chung, InJung Kim, Namhoon Lee, Taek Lee, Hoh Peter In:

Security Risk Vector for Quantitative Asset Assessment. 274-283 - Seong-Yoon Shin, Oh-Hyung Kang:

A Remote Video Study Evaluation System Using a User Profile. 284-294 - Hae Geun Kim:

Performance Enhancement of Wireless LAN Based on Infrared Communications Using Multiple-Subcarrier Modulation. 295-303 - Ha Jin Hwang

:
Modeling Virtual Network Collaboration in Supply Chain Management. 304-313 - Mun-Kyu Lee:

SPA-Resistant Simultaneous Scalar Multiplication. 314-321 - Byung kwan Lee, Am Sok Oh, Eun-Hee Jeong:

HSEP Design Using F2m HECC and ThreeB Symmetric Key Under e-Commerce Environment. 322-331 - Chang Dae Yoon, Seung-Yeon Lee, Myong-Chul Shin, Ho-Sung Jung, Jae Sang Cha:

A Fault Distance Estimation Method Based on an Adaptive Data Window for Power Network Security. 332-340 - Sang-Yule Choi, Myong-Chul Shin, Nam-Young Hur, Jong-Boo Kim, Tai-Hoon Kim, Jae Sang Cha:

Distribution Data Security System Based on Web Based Active Database. 341-352 - JaeYong Jeong, Yongsu Park, Yookun Cho:

Efficient DoS Resistant Multicast Authentication Schemes. 353-362 - Eun-Ser Lee, Malrey Lee:

Development System Security Process of ISO/IEC TR 15504 and Security Considerations for Software Process Improvement. 363-372 - Jae Sang Cha, Kyungsup Kwak, Chang Dae Yoon, Chong Hyun Lee

:
Flexible ZCD-UWB with High QoS or High Capacity Using Variable ZCD Factor Code Sets. 373-380 - Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Jongin Lim, Kilsoo Chun:

Fine Grained Control of Security Capability and Forward Security in a Pairing Based Signature Scheme. 381-390 - Sung-Hyun Yun, Hyung-Woo Lee:

The Large Scale Electronic Voting Scheme Based on Undeniable Multi-signature Scheme. 391-400 - Hyung-Woo Lee, Sung-Hyun Yun, Jae-Sung Kim, Nam-Ho Oh, Do-Hyung Kim:

IPv6/IPsec Conformance Test Management System with Formal Description Technique. 401-410 - Chong Hyun Lee

, Jae Sang Cha:
Interference Cancellation Algorithm Development and Implementation for Digital Television. 411-419 - Malrey Lee, Dong-Ju Im, Young Keun Lee, Jae-deuk Lee, Suwon Lee, Keun Kwang Lee, HeeJo Kang:

Algorithm for ABR Traffic Control and Formation Feedback Information. 420-428 - Jae Sang Cha, Kyungsup Kwak, Sang-Yule Choi, Tai-Hoon Kim, Chang Dae Yoon, Chong Hyun Lee

:
Interference-Free ZCD-UWB for Wireless Home Network Applications. 429-441 - Hoon Ko, Bangyong Sohn, Hayoung Park, Yongtae Shin:

Safe Authentication Method for Security Communication in Ubiquitous. 442-448 - Chong Hyun Lee

, Jae Sang Cha:
Pre/Post Rake Receiver Design for Maximum SINR in MIMO Communication System. 449-457 - Sang-Soo Choi, Soo-young Chae, Gang-Soo Lee:

SRS-Tool: A Security Functional Requirement Specification Development Tool for Application Information System of Organization. 458-467 - Tai-Hoon Kim, Seung-youn Lee:

Design Procedure of IT Systems Security Countermeasures. 468-473 - Dong-Ju Im, Malrey Lee, Young Keun Lee, Tae-eun Kim, Suwon Lee, Jaewan Lee, Keun Kwang Lee, Kyung Dal Cho:

Similarity Retrieval Based on Self-organizing Maps. 474-482 - Malrey Lee, Eun-Ser Lee, HeeJo Kang, HeeSook Kim:

An Expert System Development for Operating Procedure Monitoring of PWR Plants. 483-490 - Tai-Hoon Kim, Seung-youn Lee:

Security Evaluation Targets for Enhancement of IT Systems Assurance. 491-498 - Seung-youn Lee, Myong-Chul Shin:

Protection Profile for Software Development Site. 499-507
Information Security and Hiding (ISH 2005) Workshop
- Xiangyang Luo, Bin Liu, Fenlin Liu:

Improved RS Method for Detection of LSB Steganography. 508-516 - Ryszard Grzaslewicz, Jaroslaw Kutylowski, Miroslaw Kutylowski, Wojciech Pietkiewicz:

Robust Undetectable Interference Watermarks. 517-526 - Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau:

Equidistant Binary Fingerprinting Codes Existence and Identification Algorithms. 527-536 - Kwangsoo Lee, Changho Jung, Sangjin Lee, Jongin Lim:

Color Cube Analysis for Detection of LSB Steganography in RGB Color Images. 537-546 - Sheng Tang, Jin-Tao Li, Yong-Dong Zhang:

Compact and Robust Image Hashing. 547-556 - Suk Hwan Lee

, Ki-Ryong Kwon:
Watermarking for 3D Mesh Model Using Patch CEGIs. 557-566 - Jaemin Choi, Jongsung Kim, Jaechul Sung

, Sangjin Lee, Jongin Lim:
Related-Key and Meet-in-the-Middle Attacks on Triple-DES and DES-EXE. 567-576 - Kai Wirt:

Fault Attack on the DVB Common Scrambling Algorithm. 577-584 - Byung kwan Lee, Am Sok Oh, Eun-Hee Jeong:

HSEP Design Using F2m HECC and ThreeB Symmetric Key Under e-Commerce Environment. 585-594 - Zhiping Wu, Jintai Ding

, Jason E. Gower, Dingfeng Ye:
Perturbed Hidden Matrix Cryptosystems. 595-602 - Kaoru Kurosawa, Swee-Huay Heng:

Identity-Based Identification Without Random Oracles. 603-613 - Joseph K. Liu, Duncan S. Wong:

Linkable Ring Signatures: Security Models and New Schemes. 614-623 - Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau:

Practical Scenarios for the Van Trung-Martirosyan Codes. 624-633 - Ammar Alkassar, Thomas Nicolay, Markus Rohe:

Obtaining True-Random Binary Numbers from a Weak Radioactive Source. 634-646 - Dong Jin Yang, Chang Han Kim, Young-Ho Park, Yongtae Kim, Jongin Lim:

Modified Sequential Normal Basis Multipliers for Type II Optimal Normal Bases. 647-656 - Shi Cui, Pu Duan, Choong Wah Chan:

A New Method of Building More Non-supersingular Elliptic Curves. 657-664 - Stefan Tillich, Johann Großschädl:

Accelerating AES Using Instruction Set Extensions for Elliptic Curve Cryptography. 665-675 - Hyuncheol Kim, Seong-Jin Ahn, Younghwan Lim, Youngsong Mun:

Access Control Capable Integrated Network Management System for TCP/IP Networks. 676-685
Modeling of Location Management in Mobile Information Systems Workshop
- Shen Zhang, Amitava Datta

:
A Directional-Antenna Based MAC Protocol for Wireless Sensor Networks. 686-695 - Jahwan Koo, Seong-Jin Ahn:

An Extended Framework for Proportional Differentiation: Performance Metrics and Evaluation Considerations. 696-703 - Zheng Wan, Xuezeng Pan, Lingdi Ping:

QoS Provisioning in an Enhanced FMIPv6 Architecture. 704-713 - Sun Hur, Jeong Kee Kim, Dong Chun Lee:

Delay of the Slotted ALOHA Protocol with Binary Exponential Backoff Algorithm. 714-722 - Kwang Ho Chun, Seung-hyun Min, Myoung-ho Seong, Myoung Seob Lim:

Design and Implementation of Frequency Offset Estimation, Symbol Timing and Sampling Clock Offset Control for an IEEE 802.11a Physical Layer. 723-731 - Yonghak Ahn, Oksam Chae:

Automatic Subtraction Radiography Algorithm for Detection of Periodontal Disease in Internet Environment. 732-740 - Dong Chun Lee, Hyo Young Shin, Joung Chul Ahn, Jae-Young Koh:

Improved Authentication Scheme in W-CDMA Networks. 741-748 - Gi Yean Hwang, Jia Hou, Kwang Ho Chun, Moon Ho Lee:

Memory Reused Multiplication Implementation for Cryptography System. 749-753 - Jin Soh, Sung Man Jang, Geuk Lee:

Scheme for the Information Sharing Between IDSs Using JXTA. 754-761 - Sang-Young Lee, Yung-Hyeon Lee, Jeom Goo Kim, Dong Chun Lee:

Workflow System Modeling in the Mobile Healthcare B2B Using Semantic Information. 762-770 - Hong-Gyoo Sohn, Yeong-Sun Song, Gi-Hong Kim:

Detecting Water Area During Flood Event from SAR Image. 771-780 - Jongchan Lee, Sok-Pal Cho, Hong-Jin Kim:

Position Based Handover Control Method. 781-788 - Hyung Jin Kim, Bongsoo Son, Soobeom Lee, Joowon Park:

Improving Yellow Time Method of Left-Turning Traffic Flow at Signalized Intersection Networks by ITS. 789-797
Intelligent Multimedia Services and Synchronization in Mobile Multimedia Networks Workshop
- Kwang-Hyoung Lee, HeeSook Kim, Keun-Wang Lee:

A Multimedia Database System Using Dependence Weight Values for a Mobile Environment. 798-805 - Wen Chen, Feiyu Lei, Weinong Wang:

A General Framework for Analyzing the Optimal Call Admission Control in DS-CDMA Cellular Network. 806-815 - Sangsoo Lee, Sei-Chang Oh, Bongsoo Son:

Heuristic Algorithm for Traffic Condition Classification with Loop Detector Data. 816-821 - Yingwei Luo, Guomin Xiong, Xiaolin Wang, Zhuoqun Xu:

Spatial Data Channel in a Mobile Navigation System. 822-831 - Hyeon-Seob Cho, Keun-Wang Lee:

A Video Retrieval System for Electrical Safety Education Based on a Mobile Agent. 832-838 - Gi-sung Lee:

Fuzzy Multi-criteria Decision Making-Based Mobile Tracking. 839-847 - Jahwan Koo, Seong-Jin Ahn, Younghwan Lim, Youngsong Mun:

Evaluation of Network Blocking Algorithm Based on ARP Spoofing and Its Application. 848-855 - Keun-Wang Lee, Jong-Hee Lee:

Design and Implementation of Mobile-Learning System for Environment Education. 856-862 - Bongsoo Son, Taewan Kim, Yongjae Lee:

A Simulation Model of Congested Traffic in the Waiting Line. 863-869 - Seung-Jae Yoo:

Core Technology Analysis and Development for the Virus and Hacking Prevention. 870-879 - Soobeom Lee, Tai Sik Lee, Hyung Jin Kim, YoungKyun Lee:

Development of Traffic Accidents Prediction Model with Intelligent System Theory. 880-888 - Jin Ah Yoo, In Seon Choi, Dong Chun Lee:

Prefetching Scheme Considering Mobile User's Preference in Mobile Networks. 889-895 - Byoung-Muk Min, Sok-Pal Cho, Hong-Jin Kim, Dong Chun Lee:

System Development of Security Vulnerability Diagnosis in Wireless Internet Networks. 896-903 - Jin-Mook Kim, In-Sung Han, Hwang-Bin Ryou:

An Active Node Management System for Secure Active Networks. 904-913
Ubiquitous Web Systems and Intelligence Workshop
- Vicky Nassis, Rajagopal Rajugan, Tharam S. Dillon, J. Wenny Rahayu:

A Systematic Design Approach for XML-View Driven Web Document Warehouses. 914-924 - Jeong Hee Hwang, Keun Ho Ryu:

Clustering and Retrieval of XML Documents by Structure. 925-935 - Juryon Paik, Hee Yong Youn, Ung-Mo Kim:

A New Method for Mining Association Rules from a Collection of XML Documents. 936-945 - Bing Xu, Mingmin Zhang, Zhigeng Pan, Hongwei Yang:

Content-Based Recommendation in E-Commerce. 946-955 - Rowena Chau, Chung-Hsing Yeh, Kate A. Smith:

A Personalized Multilingual Web Content Miner: PMWeb Miner. 956-965 - Jeong Hee Hwang, Mi Sug Gu, Keun Ho Ryu:

Context-Based Recommendation Service in Ubiquitous Commerce. 966-976 - Jeong Hee Chi, Sang Ho Kim, Keun Ho Ryu:

A New Continuous Nearest Neighbor Technique for Query Processing on Mobile Environments. 977-987 - Robert Baumgartner, Christian Enzi, Nicola Henze, Marc Herrlich, Marcus Herzog, Matthias Kriesell, Kai Tomaschewski:

Semantic Web Enabled Information Systems: Personalized Views on Web Data. 988-997 - Eung-Jae Lee, Keun Ho Ryu:

Design of Vehicle Information Management System for Effective Retrieving of Vehicle Location. 998-1007 - Joohyun Han, Yongyun Cho, Jaeyoung Choi:

Context-Aware Workflow Language Based on Web Services for Ubiquitous Computing. 1008-1017 - Tacha Serif, George Ghinea

, Andrew O. Frank:
A Ubiquitous Approach for Visualizing Back Pain Data. 1018-1027 - Sun Kook Yoo, Seok Myung Jung, B. S. Kim, H. Y. Yun, Sung Rim Kim, Dong Keun Kim:

Prototype Design of Mobile Emergency Telemedicine System. 1028-1034 - Daegeun Kim, MinHwan Ok, Myong-Soon Park:

An Intermediate Target for Quick-Relay of Remote Storage to Mobile Devices. 1035-1044 - Uzair Ahmad, S. Y. Lee, Mahrin Iqbal, Uzma Nasir, Arshad Ali

, Mudeem Iqbal:
Reflective Middleware for Location-Aware Application Adaptation. 1045-1054 - Yue-Shi Lee

, Min-Chi Hsieh, Show-Jane Yen:
Efficient Approach for Interactively Mining Web Traversal Patterns. 1055-1065 - Le Thi Thu Thuy, Doan Dai Duong:

Query Decomposition Using the XML Declarative Description Language. 1066-1075 - Sang Ho Lee, Sung Jin Kim, Seok-Hoo Hong:

On URL Normalization. 1076-1085 - Hui Song, Fanyuan Ma, Chen Wang:

Clustering-Based Schema Matching of Web Data for Constructing Digital Library. 1086-1095 - Maria Riaz, Saad Liaquat Kiani, Anjum Shehzad, Sungyoung Lee:

Bringing Handhelds to the Grid Resourcefully: A Surrogate Middleware Approach. 1096-1105 - Simon Fong, Edison Lai:

Mobile Mini-payment Scheme Using SMS-Credit. 1106-1114 - Faraz Rasheed, Young-Koo Lee, Sungyoung Lee:

Context Summarization and Garbage Collecting Context. 1115-1124 - Rajagopal Rajugan, William Gardner, Elizabeth Chang

, Tharam S. Dillon:
EXtensible Web (xWeb): An XML-View Based Web Engineering Methodology. 1125-1135 - Eunkyu Lee, Min-Soo Kim, Mijeong Kim, Inhak Joo:

A Web Services Framework for Integrated Geospatial Coverage Data. 1136-1145 - Namje Park, Howon Kim, Seungjoo Kim

, Dongho Won:
Open Location-Based Service Using Secure Middleware Infrastructure in Web Services. 1146-1155 - David de Frutos-Escrig

, Olga Marroquín Alonso, Fernando Rosa-Velardo:
Ubiquitous Systems and Petri Nets. 1156-1166 - Xiaoming Bao, See-Kiong Ng, Eng-Huat Chua, Wei-Khing For:

Virtual Lab Dashboard: Ubiquitous Monitoring and Control in a Smart Bio-laboratory. 1167-1176 - Ming Yin, Dion Hoe-Lian Goh, Ee-Peng Lim

:
On Discovering Concept Entities from Web Sites. 1177-1186 - Mingzhe Liu

, Ruili Wang, Ray H. Kemp:
Towards a Realistic Microscopic Traffic Simulation at an Unsignalised Intersection. 1187-1196 - Ras B. Pandey:

Complex Systems: Particles, Chains, and Sheets. 1197-1206 - Yuanliang Zhang, Hyung Jo Choi, Kil To Chong:

Discretization of Delayed Multi-input Nonlinear System via Taylor Series and Scaling and Squaring Technique. 1207-1216 - Xin Yao, Changshui Zhang, Jinwen Chen, Yanda Li:

On the Scale-Free Intersection Graphs. 1217-1224 - MoonBae Song, KwangJin Park, Ki-Sik Kong, SangKeun Lee:

A Stochastic Viewpoint on the Generation of Spatiotemporal Datasets. 1225-1234 - Jane Zhao:

A Formal Approach to the Design of Distributed Data Warehouses. 1235-1244 - Tianhai Tian

, Kevin Burrage:
A Mathematical Model for Genetic Regulation of the Lactose Operon. 1245-1253 - Heather J. Ruskin, John Burns:

Network Emergence in Immune System Shape Space. 1254-1263 - Flavio Corradini, Emanuela Merelli, Marco Vita:

A Multi-agent System for Modelling Carbohydrate Oxidation in Cell. 1264-1273 - Bingcheng Hu, Jiming Liu:

Characterizing Complex Behavior in (Self-organizing) Multi-agent Systems. 1274-1283 - Sung-Hee Park, Chan Yong Park, Dae-Hee Kim, Seon Hee Park, Jeong Seop Sim:

Protein Structure Abstractionand Automatic Clustering Using Secondary Structure Element Sequences. 1284-1292

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














