Search dblp for Publications

export results for "toc:db/conf/IEEEias/IEEEias2009.bht:"

 download as .bib file

@inproceedings{DBLP:conf/IEEEias/AbrahamGLC09,
  author       = {Ajith Abraham and
                  Crina Grosan and
                  Hongbo Liu and
                  Yuehui Chen},
  title        = {Hierarchical Takagi-Sugeno Models for Online Security Evaluation Systems},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {687--692},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.348},
  doi          = {10.1109/IAS.2009.348},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/AbrahamGLC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/AhmadSIBI09,
  author       = {Rabiah Ahmad and
                  Ganthan Narayana Samy and
                  Nuzulha Khilwani Ibrahim and
                  Peter A. Bath and
                  Zuraini Ismail},
  title        = {Threats Identification in Healthcare Information Systems Using Genetic
                  Algorithm and Cox Regression},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {757--760},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.313},
  doi          = {10.1109/IAS.2009.313},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/AhmadSIBI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/AlrouhG09,
  author       = {Bachar Alrouh and
                  Gheorghita Ghinea},
  title        = {A Performance Evaluation of Security Mechanisms for Web Services},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {715--718},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.252},
  doi          = {10.1109/IAS.2009.252},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/AlrouhG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/AlserhaniAAMCM09,
  author       = {Faeiz Alserhani and
                  Monis Akhlaq and
                  Irfan{-}Ullah Awan and
                  John Mellor and
                  Andrea J. Cullen and
                  Pravin Mirchandani},
  title        = {Evaluating Intrusion Detection Systems in High Speed Networks},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {454--459},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.276},
  doi          = {10.1109/IAS.2009.276},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/AlserhaniAAMCM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/BaiZB09,
  author       = {Yuan Bai and
                  Xing Zhang and
                  Bin Sun},
  title        = {Building Trust Territory in Ad Hoc Networks},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {567--570},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.235},
  doi          = {10.1109/IAS.2009.235},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/BaiZB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Bao09,
  author       = {Cui{-}Mei Bao},
  title        = {Intrusion Detection Based on One-class {SVM} and {SNMP} {MIB} Data},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {346--349},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.124},
  doi          = {10.1109/IAS.2009.124},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Bao09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/BaomaoH09,
  author       = {Pang Baomao and
                  Shi Haoshan},
  title        = {Research on Improved Algorithm for Chinese Word Segmentation Based
                  on Markov Chain},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {236--238},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.317},
  doi          = {10.1109/IAS.2009.317},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/BaomaoH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/CaimeiZ09,
  author       = {Caimei Wang and
                  Zhengmao Li},
  title        = {Self-selecting Sub-secret Keys Sharing Scheme Based on Polynomials
                  over Elliptic Curve},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {734--737},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.250},
  doi          = {10.1109/IAS.2009.250},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/CaimeiZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/CanL09,
  author       = {Xiang Can and
                  You Lin},
  title        = {A New Conic Curve Digital Signature Scheme},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {623--626},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.181},
  doi          = {10.1109/IAS.2009.181},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/CanL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChangCL09,
  author       = {Chin{-}Chen Chang and
                  Yen{-}Chang Chen and
                  Chia{-}Chen Lin},
  title        = {A Resistant Secret Sharing Scheme},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {61--64},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.324},
  doi          = {10.1109/IAS.2009.324},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChangCL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChangSC09,
  author       = {Ching{-}Lung Chang and
                  Jia{-}Yi Syu and
                  Yuan{-}Sun Chu},
  title        = {Zero Packet Loss Hand-off Mechanism in SIP-Based Wireless Networks},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {49--52},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.323},
  doi          = {10.1109/IAS.2009.323},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChangSC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChangYZ09,
  author       = {Kan Chang and
                  Bo Yang and
                  Wenhao Zhang},
  title        = {Novel Fast Mode Decision Algorithm for P-Slices in {H.264/AVC}},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {189--193},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.198},
  doi          = {10.1109/IAS.2009.198},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChangYZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChaoHJ09,
  author       = {Chao Lv and
                  Hui Li and
                  Jianfeng Ma},
  title        = {Analysis the Properties of {TLS} Based on Temporal Logic of Knowledge},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {19--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.49},
  doi          = {10.1109/IAS.2009.49},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChaoHJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/CheCWH09,
  author       = {Shengbing Che and
                  Zuguo Che and
                  Haiyang Wang and
                  Qiangbo Huang},
  title        = {Image Compression Algorithm Based on Decreasing Bits Coding},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {217--220},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.71},
  doi          = {10.1109/IAS.2009.71},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/CheCWH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChenFSCWH09,
  author       = {Xiaojiang Chen and
                  Dingyi Fang and
                  Jingbo Shen and
                  Feng Chen and
                  Wenbo Wang and
                  Lu He},
  title        = {A Dynamic Graph Watermark Scheme of Tamper Resistance},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {3--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.327},
  doi          = {10.1109/IAS.2009.327},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChenFSCWH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChenGS09,
  author       = {Long Chen and
                  Bao{-}Long Guo and
                  Wei Sun},
  title        = {A New Multiple-Objects Tracking Method with Particle Filter},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {281--284},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.336},
  doi          = {10.1109/IAS.2009.336},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChenGS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChenGX09,
  author       = {Liang Chen and
                  Chengmin Gao and
                  Yong Xu},
  title        = {Non-interactive Evaluation of Encrypted Elementary Functions},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {45--48},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.36},
  doi          = {10.1109/IAS.2009.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChenGX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChenH09,
  author       = {Yueh{-}Hong Chen and
                  Hsiang{-}Cheh Huang},
  title        = {Collusion-Resilient Fingerprinting Using Cropping and Subsampling},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {98--101},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.343},
  doi          = {10.1109/IAS.2009.343},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChenH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChenHH09,
  author       = {Yu{-}Chi Chen and
                  Gwoboa Horng and
                  Chang{-}Chin Huang},
  title        = {Privacy Protection in On-line Shopping for Electronic Documents},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {105--108},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.338},
  doi          = {10.1109/IAS.2009.338},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChenHH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChenHL09,
  author       = {Chien{-}Yuan Chen and
                  Chih{-}Cheng Hsueh and
                  Yu{-}Feng Lin},
  title        = {A Generalization of de Weger's Method},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {344--347},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.153},
  doi          = {10.1109/IAS.2009.153},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChenHL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChenHPNQ09,
  author       = {Chen Chen and
                  Li Hui and
                  Qingqi Pei and
                  Lv Ning and
                  Qingquan Peng},
  title        = {An Effective Scheme for Defending Denial-of-Sleep Attack in Wireless
                  Sensor Networks},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {446--449},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.33},
  doi          = {10.1109/IAS.2009.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChenHPNQ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChenLCJ09,
  author       = {Yu{-}Yi Chen and
                  Jun{-}Chao Lu and
                  Shin{-}I Chen and
                  Jinn{-}ke Jan},
  title        = {A Low-cost {RFID} Authentication Protocol with Location Privacy Protection},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {109--113},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.77},
  doi          = {10.1109/IAS.2009.77},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChenLCJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChenLHL09,
  author       = {Lin Chen and
                  Li Li and
                  Yong Hu and
                  Ke Lian},
  title        = {Information Security Solution Decision-Making Based on Entropy Weight
                  and Gray Situation Decision},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {7--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.9},
  doi          = {10.1109/IAS.2009.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChenLHL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChenLY09,
  author       = {Wenbing Chen and
                  Qizhou Li and
                  Jianwei Yang},
  title        = {Image Retrieval Based on Composite of Mean Shift and Assignment Model},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {568--571},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.84},
  doi          = {10.1109/IAS.2009.84},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChenLY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChenSLLG09,
  author       = {Ying Chen and
                  Jian Shu and
                  Hong Liu and
                  Linlan Liu and
                  Jiajie Gong},
  title        = {{MRDWA:} Multi-role Dynamic Weighting Aggregation Algorithm in Event
                  Driven Wireless Sensor Networks},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {311--314},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.302},
  doi          = {10.1109/IAS.2009.302},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChenSLLG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChenT09,
  author       = {Ding{-}Hrong Chen and
                  Shiang{-}En Tang},
  title        = {A Name Recommendation Photo Album Using Probability Neural Network},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {379--382},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.358},
  doi          = {10.1109/IAS.2009.358},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChenT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChenTJL09,
  author       = {Fu{-}Kun Chen and
                  Jui{-}Che Teng and
                  Yue{-}Dar Jou and
                  Wen{-}Yuan Liao},
  title        = {Dynamically Constrained One-Bit Transform for Motion Vector Estimation},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {375--378},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.347},
  doi          = {10.1109/IAS.2009.347},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChenTJL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChenX09,
  author       = {Yongyue Chen and
                  Huosong Xia},
  title        = {A Study on the Algorithm Based on Image Color Correlation Mining},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {377--380},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.143},
  doi          = {10.1109/IAS.2009.143},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChenX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChenYW09,
  author       = {Wenbing Chen and
                  Jianwei Yang and
                  Wangwei},
  title        = {Image Retrieve Based on Primary Clusters},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {357--360},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.83},
  doi          = {10.1109/IAS.2009.83},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChenYW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChenZQWZ09,
  author       = {Wuping Chen and
                  Lei Zhang and
                  Bo Qin and
                  Qianhong Wu and
                  Huanguo Zhang},
  title        = {Certificateless One-Way Authenticated Two-Party Key Agreement Protocol},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {483--486},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.183},
  doi          = {10.1109/IAS.2009.183},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChenZQWZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChenZY09,
  author       = {Wenbing Chen and
                  Xiaolei Zhang and
                  Jianwei Yang},
  title        = {Visibility Estimation Based on Mean Shift},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {245--248},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.81},
  doi          = {10.1109/IAS.2009.81},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChenZY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChengHM09,
  author       = {Qingfeng Cheng and
                  Guangguo Han and
                  Chuangui Ma},
  title        = {A New Efficient and Strongly Secure Authenticated Key Exchange Protocol},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {499--502},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.122},
  doi          = {10.1109/IAS.2009.122},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChengHM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChengQTD09,
  author       = {Yuzhu Cheng and
                  Chunrong Qiu and
                  Weiqi Tang and
                  Wenda Deng},
  title        = {Research on System of Chinese Document Copy Detection},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {185--188},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.210},
  doi          = {10.1109/IAS.2009.210},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChengQTD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChengWG09,
  author       = {Xiaorong Cheng and
                  Yan Wei and
                  Xin Geng},
  title        = {A Support Vector Machines Security Assessment Method Based on Group
                  Decision-Marking for Electric Power Information System},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {536--539},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.234},
  doi          = {10.1109/IAS.2009.234},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChengWG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChengXW09,
  author       = {Xiaorong Cheng and
                  Kun Xie and
                  Dong Wang},
  title        = {Network Traffic Anomaly Detection Based on Self-Similarity Using {HHT}
                  and Wavelet Transform},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {710--713},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.219},
  doi          = {10.1109/IAS.2009.219},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChengXW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChengY09,
  author       = {Guosheng Cheng and
                  Jianwei Yang},
  title        = {A Watermarking Scheme Based on Two-dimensional Wavelet Filter Parametrization},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {301--304},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.136},
  doi          = {10.1109/IAS.2009.136},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChengY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChiouCS09,
  author       = {Shin{-}Yan Chiou and
                  Shih{-}Ying Chang and
                  Hung{-}Min Sun},
  title        = {Common Friends Discovery with Privacy and Authenticity},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {337--340},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.208},
  doi          = {10.1109/IAS.2009.208},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChiouCS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChoiK09,
  author       = {Yongsoo Choi and
                  Hyoung Joong Kim},
  title        = {Improving the Modified Matrix Encoding on Steganography Method},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {205--208},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.340},
  doi          = {10.1109/IAS.2009.340},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChoiK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Cline09,
  author       = {Bryan Stewart Cline},
  title        = {Organizational Barriers to the Implementation of Security Engineering},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {527--531},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.61},
  doi          = {10.1109/IAS.2009.61},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Cline09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/CuiD09,
  author       = {Yalei Cui and
                  Zibin Dai},
  title        = {The Research of {NULL} Convention Logic Circuit Computing Model Targeted
                  at Block Cipher Processing},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {552--555},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.268},
  doi          = {10.1109/IAS.2009.268},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/CuiD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/CuiWJW09,
  author       = {Zhaopeng Cui and
                  Dujuan Wang and
                  Guang Jiang and
                  Chengke Wu},
  title        = {Octagonal Search Algorithm with Early Termination for Fast Motion
                  Estimation on {H.264}},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {123--126},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.245},
  doi          = {10.1109/IAS.2009.245},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/CuiWJW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Deng09,
  author       = {Lihua Deng},
  title        = {Study on Ultrasonic Ranging System Design},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {414--416},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.352},
  doi          = {10.1109/IAS.2009.352},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Deng09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/DengLJG09,
  author       = {Cheng Deng and
                  Jie Li and
                  Meng Jia and
                  Xinbo Gao},
  title        = {Sinusoidal Signals Pattern Based Robust Video Watermarking in the
                  3D-CWT Domain},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {96--99},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.218},
  doi          = {10.1109/IAS.2009.218},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/DengLJG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/DengZ09,
  author       = {Xiaolong Deng and
                  Pingfang Zhou},
  title        = {A New Interacting Multiple Model Algorithm Based on the Unscented
                  Particle Filter},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {419--422},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.214},
  doi          = {10.1109/IAS.2009.214},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/DengZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/DengZW09,
  author       = {Chengzhi Deng and
                  Huasheng Zhu and
                  Shengqian Wang},
  title        = {Curvelet Domain Watermark Detection Using Alpha-Stable Models},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {313--316},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.21},
  doi          = {10.1109/IAS.2009.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/DengZW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/DingHHR09,
  author       = {Wei Ding and
                  Matthew J. Hausknecht and
                  Shou{-}Hsuan Stephen Huang and
                  Zach Riggle},
  title        = {Detecting Stepping-Stone Intruders with Long Connection Chains},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {665--669},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.123},
  doi          = {10.1109/IAS.2009.123},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/DingHHR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/DuC09,
  author       = {Zhenjun Du and
                  Rong Chen},
  title        = {An Approach to Checking {SOC} Timing Safety},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {181--184},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.28},
  doi          = {10.1109/IAS.2009.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/DuC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/FalingWZJ09,
  author       = {Faling Yi and
                  Wei Xiong and
                  Zhanpeng Huang and
                  Jie Zhao},
  title        = {A Multi-view Nonlinear Active Shape Model Based on 3D Transformation
                  Shape Search},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {15--18},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.228},
  doi          = {10.1109/IAS.2009.228},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/FalingWZJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/FanLW09,
  author       = {Kai Fan and
                  Hui Li and
                  Yue Wang},
  title        = {Security Analysis of the Kerberos Protocol Using {BAN} Logic},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {467--470},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.320},
  doi          = {10.1109/IAS.2009.320},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/FanLW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/FanSZ09,
  author       = {Tongrang Fan and
                  Yan Sun and
                  Yongbin Zhao},
  title        = {An Eco-Defending Architecture for Network Security Based on Immuninty
                  and Mobile Agents},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {451--454},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.111},
  doi          = {10.1109/IAS.2009.111},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/FanSZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/FanWL09,
  author       = {Kai Fan and
                  Yue Wang and
                  Hui Li},
  title        = {A New Abuse-Free Fair Electronic Payment Protocol},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {633--636},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.319},
  doi          = {10.1109/IAS.2009.319},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/FanWL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/FanZM09,
  author       = {Kefeng Fan and
                  Subing Zhang and
                  Wei Mo},
  title        = {A Digital Certificate Application Scheme in Content Protection System
                  for High Definition Digital Interface},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {395--398},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.31},
  doi          = {10.1109/IAS.2009.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/FanZM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/FengWDX09,
  author       = {Feng Chen and
                  Weihua Li and
                  Dingyi Fang and
                  Xiaojiang Chen},
  title        = {Research on Integration of Safety Analysis in Model-Driven Software
                  Development},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {303--306},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.246},
  doi          = {10.1109/IAS.2009.246},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/FengWDX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Fu09,
  author       = {Baiwen Fu},
  title        = {A Rapid Algorithm and its Implementation for Modular Inversion},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {697--700},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.184},
  doi          = {10.1109/IAS.2009.184},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Fu09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/FuLG09,
  author       = {Xiao{-}ning Fu and
                  En{-}ke Li and
                  Wen{-}jing Gao},
  title        = {Texture Feature Analysis on Erosion and Wear in Artillery Chamber},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {365--368},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.164},
  doi          = {10.1109/IAS.2009.164},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/FuLG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/FuT09,
  author       = {Jielin Fu and
                  Yongjun Tang},
  title        = {A Parity Check Node Synchronization Based Method for Solving Phase
                  Ambiguity Problem in {DVB-S} Systems},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {463--466},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.211},
  doi          = {10.1109/IAS.2009.211},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/FuT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/FujiyoshiHK09,
  author       = {Masaaki Fujiyoshi and
                  Seungwu Han and
                  Hitoshi Kiya},
  title        = {Reversible Information Hiding Considering Hierarchical Access Control},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {209--212},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.116},
  doi          = {10.1109/IAS.2009.116},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/FujiyoshiHK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/GangJ09,
  author       = {Xiao Gang and
                  Jiancang Xie},
  title        = {Performance Analysis of Chinese Webpage Categorizing Algorithm Based
                  on Support Vector Machines {(SVM)}},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {231--235},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.316},
  doi          = {10.1109/IAS.2009.316},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/GangJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/GaoHHD09,
  author       = {Qiang Gao and
                  Miao Han and
                  Shu{-}liang Hu and
                  Hai{-}jie Dong},
  title        = {Design of Fault Diagnosis System of {FPSO} Production Process Based
                  on {MSPCA}},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {729--733},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.221},
  doi          = {10.1109/IAS.2009.221},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/GaoHHD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/GaoLLX09,
  author       = {Hai{-}ying Gao and
                  Guo{-}qiang Liu and
                  Xu Li and
                  Yin Xu},
  title        = {A Robust Watermark Algorithm for {JPEG2000} Images},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {230--233},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.135},
  doi          = {10.1109/IAS.2009.135},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/GaoLLX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/GengJ09,
  author       = {Li{-}zhong Geng and
                  Hui{-}bo Jia},
  title        = {An Intrusion Detection System for Network Storage Based on System
                  Calls},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {544--547},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.100},
  doi          = {10.1109/IAS.2009.100},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/GengJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/GongWLH09,
  author       = {Xiaoqing Gong and
                  Yi Wang and
                  Hui Li and
                  Jian He},
  title        = {An Authentication Protocol Applied to {RFID} Security Systems},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {307--310},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.248},
  doi          = {10.1109/IAS.2009.248},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/GongWLH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/GuoC09,
  author       = {Jing{-}Ming Guo and
                  Chia{-}Hao Chang},
  title        = {Prediction-Based Watermarking Schemes for DCT-Based Image Coding},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {619--622},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.14},
  doi          = {10.1109/IAS.2009.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/GuoC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/GuoL09,
  author       = {Jing{-}Ming Guo and
                  Yun{-}Fu Liu},
  title        = {Majority-Parity-Guided Watermarking for Block-Truncated Images},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {197--200},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.11},
  doi          = {10.1109/IAS.2009.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/GuoL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/GuoT09,
  author       = {Jing{-}Ming Guo and
                  Jia{-}Jin Tsai},
  title        = {Data Hiding in Halftone Images Using Adaptive Noise-Balanced Error
                  Diffusion and Quality-Noise Look Up Table},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {201--204},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.13},
  doi          = {10.1109/IAS.2009.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/GuoT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HanL09,
  author       = {Baojun Han and
                  Yan Liu},
  title        = {An Improved {SPECK} Image Coding Algorithm},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {227--229},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.201},
  doi          = {10.1109/IAS.2009.201},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HanL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HanMCQ09,
  author       = {Yu Han and
                  Aidong Men and
                  Kan Chang and
                  Ziyi Quan},
  title        = {GOP-Level Transmission Distortion Modeling for Video Streaming over
                  Mobile Networks},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {91--95},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.107},
  doi          = {10.1109/IAS.2009.107},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HanMCQ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HanWWZ09,
  author       = {Ruo{-}Fei Han and
                  Hou{-}Xiang Wang and
                  Yu{-}Hua Wang and
                  Kai{-}Ling Zuo},
  title        = {Membership-Based Access Control for Trust Negotiation in Open Systems},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {189--192},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.73},
  doi          = {10.1109/IAS.2009.73},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HanWWZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HanYCQ09,
  author       = {Yu Han and
                  Bo Yang and
                  Kan Chang and
                  Ziyi Quan},
  title        = {Optimal Combination of {H.264/AVC} Coding Tools for Mobile Multimedia
                  Broadcasting Application},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {289--293},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.128},
  doi          = {10.1109/IAS.2009.128},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HanYCQ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HeL09,
  author       = {Xiang He and
                  Jianjun Liu},
  title        = {A Digital Watermarking Algorithm for {DEM} Image Based on Stationary
                  Wavelet Transform},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {221--224},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.330},
  doi          = {10.1109/IAS.2009.330},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HeL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HeSLZ09,
  author       = {Jin He and
                  Yinpei Sun and
                  Ying Luo and
                  Qun Zhang},
  title        = {A Joint Multiscale Algorithm with Auto-adapted Threshold for Image
                  Denoising},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {505--508},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.157},
  doi          = {10.1109/IAS.2009.157},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HeSLZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HeYZZZ09,
  author       = {Xian{-}Bo He and
                  Li Yang and
                  Xian{-}hua Zeng and
                  Gang{-}yuan Zhang and
                  Xing{-}qiang Zhao},
  title        = {An Adaptive Fuzzy Scheduling and Fuzzy-PID Perfomance Control Model
                  Being Suitable to Soft Real-Time Systems},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {149--153},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.269},
  doi          = {10.1109/IAS.2009.269},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HeYZZZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HongL09,
  author       = {Che Hong and
                  Sun Longhe},
  title        = {A Novel Method for Plane Array Infrared Image to Detect Point Target},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {234--240},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.119},
  doi          = {10.1109/IAS.2009.119},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HongL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HouGP09,
  author       = {Ye Hou and
                  Bao{-}Long Guo and
                  Jeng{-}Shyang Pan},
  title        = {The Application and Study of Graph Cut in Motion Segmentation},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {265--268},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.326},
  doi          = {10.1109/IAS.2009.326},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HouGP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HouSL09,
  author       = {Yuanbin Hou and
                  Chunfeng Song and
                  Ning Li},
  title        = {The Sync Tracing Based on Improved Genetic Algorithm Neural Network},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {396--399},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.226},
  doi          = {10.1109/IAS.2009.226},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HouSL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HouX09,
  author       = {Mengbo Hou and
                  Qiuliang Xu},
  title        = {A Secure ID-Based Explicit Authenticated Key Agreement Protocol without
                  Key Escrow},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {487--490},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.40},
  doi          = {10.1109/IAS.2009.40},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HouX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HouX09a,
  author       = {Limin Hou and
                  Juanmin Xie},
  title        = {Compensating Function of Formant Instantaneous Characteristics in
                  Speaker Identification},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {744--747},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.254},
  doi          = {10.1109/IAS.2009.254},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HouX09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HouXLH09,
  author       = {Fangyong Hou and
                  Nong Xiao and
                  Fang Liu and
                  Hongjun He},
  title        = {Secure Disk with Authenticated Encryption and {IV} Verification},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {41--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.48},
  doi          = {10.1109/IAS.2009.48},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HouXLH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HsiaHCW09,
  author       = {Chih{-}Hsien Hsia and
                  Ding{-}Wei Huang and
                  Jen{-}Shiun Chiang and
                  Zong{-}Jheng Wu},
  title        = {Moving Object Tracking Using Symmetric Mask-Based Scheme},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {173--176},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.150},
  doi          = {10.1109/IAS.2009.150},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HsiaHCW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Hua09,
  author       = {Liu Hua},
  title        = {Words Clustering Based on Keywords Indexing from Large-scale Categorization
                  Corpora},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {407--410},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.271},
  doi          = {10.1109/IAS.2009.271},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Hua09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Huang09,
  author       = {Yu{-}Chih Huang},
  title        = {Secure Access Control Scheme of {RFID} System Application},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {525--528},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.223},
  doi          = {10.1109/IAS.2009.223},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Huang09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HuangCL09,
  author       = {Hsiang{-}Cheh Huang and
                  Yueh{-}Hong Chen and
                  Guan{-}Yu Lin},
  title        = {DCT-Based Robust Watermarking with Swarm Intelligence Concepts},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {464--467},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.85},
  doi          = {10.1109/IAS.2009.85},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HuangCL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HuangZT09,
  author       = {Huajun Huang and
                  Shaohong Zhong and
                  Junshan Tan},
  title        = {Browser-Side Countermeasures for Deceptive Phishing Attack},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {352--355},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.12},
  doi          = {10.1109/IAS.2009.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HuangZT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HwangC09,
  author       = {Shin{-}Jia Hwang and
                  Ming{-}Jhang Chai},
  title        = {A New Authenticated Key Agreement Protocol for Wireless Mobile Networks},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {53--56},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.58},
  doi          = {10.1109/IAS.2009.58},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HwangC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HwangL09,
  author       = {Yin{-}Tsung Hwang and
                  Hua{-}Hsin Luo},
  title        = {Automatic {IP} Interface Synthesis Supporting Multi-layer Communication
                  Protocols in SoC Designs},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {169--172},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.270},
  doi          = {10.1109/IAS.2009.270},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HwangL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ItoAIM09,
  author       = {Akinori Ito and
                  Akihito Aiba and
                  Masashi Ito and
                  Shozo Makino},
  title        = {Detection of Abnormal Sound Using Multi-stage {GMM} for Surveillance
                  Microphone},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {733--736},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.160},
  doi          = {10.1109/IAS.2009.160},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ItoAIM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/JiHO09,
  author       = {Wen Ji and
                  Lei Hu and
                  Haiwen Ou},
  title        = {Algebraic Attack to {SMS4} and the Comparison with {AES}},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {662--665},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.171},
  doi          = {10.1109/IAS.2009.171},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/JiHO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Jian09,
  author       = {Yang Jian},
  title        = {An Improved Scheme of Single Sign-on Protocol},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {495--498},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.202},
  doi          = {10.1109/IAS.2009.202},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Jian09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/JiangCL09,
  author       = {Chuanxian Jiang and
                  Xiaowei Chen and
                  Zhi Li},
  title        = {Watermarking Relational Databases for Ownership Protection Based on
                  {DWT}},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {305--308},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.220},
  doi          = {10.1109/IAS.2009.220},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/JiangCL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/JiangGZC09,
  author       = {Yaping Jiang and
                  Yong Gan and
                  Jianhua Zhou and
                  Zengyu Cai},
  title        = {A Model of Intrusion Prevention Base on Immune},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {441--444},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.104},
  doi          = {10.1109/IAS.2009.104},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/JiangGZC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/JiangML09,
  author       = {Jie Jiang and
                  Wei Mo and
                  Jianmin Lv},
  title        = {An Enhanced Block Mode Selection Method for Surveillance Video Communication},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {79--82},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.7},
  doi          = {10.1109/IAS.2009.7},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/JiangML09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/JiangYX09,
  author       = {Dianbo Jiang and
                  Yahui Yang and
                  Min Xia},
  title        = {Research on Intrusion Detection Based on an Improved {SOM} Neural
                  Network},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {400--403},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.247},
  doi          = {10.1109/IAS.2009.247},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/JiangYX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/JiangZMIF09,
  author       = {Li Chang Jiang and
                  Zhong Zhang and
                  Tetsuo Miyake and
                  Takashi Imamura and
                  Hisanaga Fujiwa},
  title        = {Reducing Specular Reflection Components of Chrome-Plated Surface with
                  Varying Light Direction},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {725--728},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.265},
  doi          = {10.1109/IAS.2009.265},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/JiangZMIF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/JieZZ09,
  author       = {Jie Nie and
                  Zhiqiang Wei and
                  Zhen Li},
  title        = {A New {JPEG} Resistant Color Image Watermarking Algorithm Based on
                  Quantization Index Modulation},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {669--672},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.59},
  doi          = {10.1109/IAS.2009.59},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/JieZZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/JinLG09,
  author       = {Ji{-}fang Jin and
                  Er{-}hong Lu and
                  Xian{-}wei Gao},
  title        = {Resistance {DPA} of {RSA} on Smartcard},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {406--409},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.301},
  doi          = {10.1109/IAS.2009.301},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/JinLG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/JingyiMW09,
  author       = {Du Jingyi and
                  Wang Mei and
                  Cai Wenhao},
  title        = {Support Vector Machine Based on Possibility Degrees and Fault Diagnosis},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {285--288},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.187},
  doi          = {10.1109/IAS.2009.187},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/JingyiMW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/JizhenKTG09,
  author       = {Jizhen Liu and
                  Kehe Wu and
                  Tong Zhang and
                  Gang Ma},
  title        = {The Design and Implementation of Security Defense Technology Based
                  on Mandatory Running Control},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {770--773},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.236},
  doi          = {10.1109/IAS.2009.236},
  timestamp    = {Thu, 04 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/JizhenKTG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/JunhuaS09,
  author       = {Junhua Chen and
                  Shengjun Wei},
  title        = {Modeling and Analyzing the Spread of Worms with Bilinear Incidence
                  Rate},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {167--170},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.180},
  doi          = {10.1109/IAS.2009.180},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/JunhuaS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/KadirM09,
  author       = {Rashidah Kadir and
                  Mohd Aizaini Maarof},
  title        = {A Comparative Statistical Analysis of Pseudorandom Bit Sequences},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {91--94},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.242},
  doi          = {10.1109/IAS.2009.242},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/KadirM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/KammasKS09,
  author       = {Pantelis Kammas and
                  Thodoros Komninos and
                  Yannis C. Stamatiou},
  title        = {Modeling the Co-evololution {DNS} Worms and Anti-worms in IPv6 Networks},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {171--174},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.334},
  doi          = {10.1109/IAS.2009.334},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/KammasKS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/KawamotoAKH09,
  author       = {Mitsuru Kawamoto and
                  Futoshi Asano and
                  Koichi Kurumatani and
                  Yingbo Hua},
  title        = {A System for Detecting Unusual Sounds from Sound Environment Observed
                  by Microphone Arrays},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {729--732},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.200},
  doi          = {10.1109/IAS.2009.200},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/KawamotoAKH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/KholidyA09,
  author       = {Hisham A. Kholidy and
                  Khaled Alghathbar},
  title        = {A New Accelerated {RC4} Scheme Using "Ultra Gridsec" and "HIMAN" and
                  use this Scheme to Secure "HIMAN" Data},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {617--622},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.140},
  doi          = {10.1109/IAS.2009.140},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/KholidyA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/KongY09,
  author       = {Fanyu Kong and
                  Jia Yu},
  title        = {Number-Theoretic Attack on Lyuu-Wu's Multi-proxy Multi-signature Scheme},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {666--668},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.130},
  doi          = {10.1109/IAS.2009.130},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/KongY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/KongZTL09,
  author       = {Hongshan Kong and
                  Mingqing Zhang and
                  Jun Tang and
                  Changyuan Luo},
  title        = {The Research of Simulation for Network Security Based on System Dynamics},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {145--148},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.251},
  doi          = {10.1109/IAS.2009.251},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/KongZTL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/KonoNIB09,
  author       = {Kazuhiro Kono and
                  Shinnosuke Nakano and
                  Yoshimichi Ito and
                  Noboru Babaguchi},
  title        = {Performance Analysis of Anonymous Communication System 3-Mode Net},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {593--596},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.328},
  doi          = {10.1109/IAS.2009.328},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/KonoNIB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LeeCCT09,
  author       = {Chin{-}Feng Lee and
                  Kuo{-}Nan Chen and
                  Chin{-}Chen Chang and
                  Meng{-}Cheng Tsai},
  title        = {A Block Feature Correlation Based Image Watermarking for Tamper Detection
                  Using Linear Equation},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {615--618},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.147},
  doi          = {10.1109/IAS.2009.147},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LeeCCT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LeeCW09,
  author       = {Mn{-}Ta Lee and
                  Hsuan T. Chang and
                  Mu{-}Liang Wang},
  title        = {Image Watermarking Using Phase-Shifting Digital Holography Embedded
                  in the Wavelet Domain},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {37--40},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.131},
  doi          = {10.1109/IAS.2009.131},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LeeCW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LeeKHC09,
  author       = {Yung{-}Cheng Lee and
                  Wen{-}Chung Kuo and
                  Yi{-}Chih Hsieh and
                  Ta{-}Cheng Chen},
  title        = {Security Enhancement of the Authentication Protocol for {RFID} Systems},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {521--524},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.351},
  doi          = {10.1109/IAS.2009.351},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LeeKHC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LeeWY09,
  author       = {Jiann{-}Shu Lee and
                  Hsing{-}Hsien Wu and
                  Ming{-}Zheng Yuan},
  title        = {Lung Segmentation for Chest Radiograph by Using Adaptive Active Shape
                  Models},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {383--386},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.353},
  doi          = {10.1109/IAS.2009.353},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LeeWY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LeuL09,
  author       = {Fang{-}Yie Leu and
                  Zhi{-}Yang Li},
  title        = {Detecting DoS and DDoS Attacks by Using an Intrusion Detection and
                  Remote Prevention System},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {251--254},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.294},
  doi          = {10.1109/IAS.2009.294},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LeuL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LeuP09,
  author       = {Fang{-}Yie Leu and
                  Chia{-}Chi Pai},
  title        = {Detecting DoS and DDoS Attacks Using Chi-Square},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {255--258},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.292},
  doi          = {10.1109/IAS.2009.292},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LeuP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Li09,
  author       = {Chun{-}Ta Li},
  title        = {An Enhanced Remote User Authentication Scheme Providing Mutual Authentication
                  and Key Agreement with Smart Cards},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {517--520},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.17},
  doi          = {10.1109/IAS.2009.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Li09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Li09a,
  author       = {Gaoping Li},
  title        = {Fast Fractal Image Coding Using Ambient-Cross Sum of Normalized Block},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {219--222},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.154},
  doi          = {10.1109/IAS.2009.154},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Li09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Li09b,
  author       = {Yanzhao Li},
  title        = {National Information Infrastructure Security and Cyber Terrorism in
                  the Process of Industrializations},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {532--535},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.132},
  doi          = {10.1109/IAS.2009.132},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Li09b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiDSZ09,
  author       = {Jun Li and
                  Youdong Ding and
                  Yunyu Shi and
                  Qingyue Zeng},
  title        = {DWT-Based Shot Boundary Detection Using Support Vector Machine},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {435--438},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.16},
  doi          = {10.1109/IAS.2009.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiDSZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiFY09,
  author       = {Juan Li and
                  Yong Feng and
                  Xuqiang Yang},
  title        = {An Improved Image Encryption Scheme Based on Line Maps},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {605--608},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.67},
  doi          = {10.1109/IAS.2009.67},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiFY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiGCC09,
  author       = {Hui Li and
                  Zhijin Guan and
                  Shanli Chen and
                  Yuxin Chen},
  title        = {The Reversible Network Cascade Based on Reversible Logic Gate Coding
                  Method},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {213--216},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.82},
  doi          = {10.1109/IAS.2009.82},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiGCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiGLS09,
  author       = {Xin{-}Wei Li and
                  Bao{-}Long Guo and
                  Lei{-}Da Li and
                  Hong{-}Xin Shen},
  title        = {A New Histogram Based Image Watermarking Scheme Resisting Geometric
                  Attacks},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {239--242},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.335},
  doi          = {10.1109/IAS.2009.335},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiGLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiL09,
  author       = {Yue{-}nan Li and
                  Zhe{-}ming Lu},
  title        = {Video Identification Using Spatio-temporal Salient Points},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {79--82},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.291},
  doi          = {10.1109/IAS.2009.291},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiLMZ09,
  author       = {Xiaoqing Li and
                  Hui Li and
                  Jianfeng Ma and
                  Weidong Zhang},
  title        = {An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {287--290},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.267},
  doi          = {10.1109/IAS.2009.267},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiLMZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiLYF09,
  author       = {Enke Li and
                  Shangqian Liu and
                  Shimin Yin and
                  Xiaoning Fu},
  title        = {Nonuniformity Correction Algorithms of {IRFPA} Based on Radiation
                  Source Scaling},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {317--321},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.110},
  doi          = {10.1109/IAS.2009.110},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiLYF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiP09,
  author       = {Yanping Li and
                  Liaojun Pang},
  title        = {Multi-party Non-repudiation Protocol with Different Message Exchanged},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {491--494},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.329},
  doi          = {10.1109/IAS.2009.329},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiP09a,
  author       = {Huixian Li and
                  Liaojun Pang},
  title        = {A Novel Biometric-Based Authentication Scheme with Privacy Protection},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {295--298},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.304},
  doi          = {10.1109/IAS.2009.304},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiP09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiPW09,
  author       = {Yanping Li and
                  Liaojun Pang and
                  Yuming Wang},
  title        = {Attacks on a Universal Designated Verifier Signature Scheme},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {27--30},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.148},
  doi          = {10.1109/IAS.2009.148},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiPW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiQZS09,
  author       = {Yanzhao Li and
                  Shengli Qu and
                  Jiahui Zhu and
                  Jianqin Sun},
  title        = {Study on the Control of a Two-wheeled Unstable Vehicle Based on Sensitivity
                  Analysis},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {762--765},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.273},
  doi          = {10.1109/IAS.2009.273},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiQZS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiW09,
  author       = {Min Li and
                  Bo Wang},
  title        = {Hybrid Video Transcoder for Bitrate Reduction of {H.264} Bit Streams},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {107--110},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.169},
  doi          = {10.1109/IAS.2009.169},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiW09a,
  author       = {Min Li and
                  Bo Wang},
  title        = {Whole Frame Loss Recovery Algorithm for {H.264} Decoders},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {111--114},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.170},
  doi          = {10.1109/IAS.2009.170},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiW09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiW09b,
  author       = {Zhanli Li and
                  Yuan Wang},
  title        = {Research on 3D Reconstruction Procedure of Marked Points for Large
                  Workpiece Measurement},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {273--276},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.55},
  doi          = {10.1109/IAS.2009.55},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiW09b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiW09c,
  author       = {Ming Li and
                  Kunpeng Wang},
  title        = {New Greedy Algorithm for Computing Double-Base Chains},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {445--450},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.207},
  doi          = {10.1109/IAS.2009.207},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiW09c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiW09d,
  author       = {Guo{-}jing Li and
                  Tao Wen},
  title        = {Augmented Addition Operation of Conic Curves over Ring Zn},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {745--748},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.240},
  doi          = {10.1109/IAS.2009.240},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiW09d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiWD09,
  author       = {Yan Li and
                  Shengqian Wang and
                  Chengzhi Deng},
  title        = {Redundant Ridgelet Transform and its Application to Image Processing},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {225--228},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.52},
  doi          = {10.1109/IAS.2009.52},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiWD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiWMS09,
  author       = {Fenghua Li and
                  Wei Wang and
                  Jianfeng Ma and
                  Haoxin Su},
  title        = {Action-Based Access Control for Web Services},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {637--642},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.114},
  doi          = {10.1109/IAS.2009.114},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiWMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiWPZ09,
  author       = {Huixian Li and
                  Man Wang and
                  Liaojun Pang and
                  Weidong Zhang},
  title        = {Key Binding Based on Biometric Shielding Functions},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {19--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.305},
  doi          = {10.1109/IAS.2009.305},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiWPZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiYG09,
  author       = {Ximing Li and
                  Bo Yang and
                  Yubin Guo},
  title        = {Fuzzy Identity Based Encryption Scheme with Some Assigned Attributes},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {133--136},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.145},
  doi          = {10.1109/IAS.2009.145},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiYG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiangZ09,
  author       = {Ning{-}ning Liang and
                  Xuan{-}yong Zhu},
  title        = {Research on Equiponderant Forwarding within Multi-nexthop Interfaces},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {399--401},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.70},
  doi          = {10.1109/IAS.2009.70},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiangZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LinH09,
  author       = {Iuon{-}Chang Lin and
                  Shu{-}Yan Huang},
  title        = {A Polynomial Based Key Establishment Scheme for Heterogeneous Sensor
                  Networks},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {41--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.264},
  doi          = {10.1109/IAS.2009.264},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LinH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LinH09a,
  author       = {Rey{-}Sern Lin and
                  Shang{-}Wen Hu},
  title        = {A Modified Run-length Image Data Hiding for High Embedding Capacity},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {673--676},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.35},
  doi          = {10.1109/IAS.2009.35},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LinH09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LinHY09,
  author       = {Changlu Lin and
                  Lein Harn and
                  Dingfeng Ye},
  title        = {Ideal Perfect Multilevel Threshold Secret Sharing Scheme},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {118--121},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.279},
  doi          = {10.1109/IAS.2009.279},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LinHY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LinJ09,
  author       = {Lin Ding and
                  Guan Jie},
  title        = {Guess and Determine Attack on {SOSEMANUK}},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {658--661},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.165},
  doi          = {10.1109/IAS.2009.165},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LinJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LinLC09,
  author       = {Chu{-}Hsing Lin and
                  Jung{-}Chun Liu and
                  Ching{-}Ru Chen},
  title        = {Access Log Generator for Analyzing Malicious Website Browsing Behaviors},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {126--129},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.310},
  doi          = {10.1109/IAS.2009.310},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LinLC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LinLHLWL09,
  author       = {Jzau{-}Sheng Lin and
                  Shao{-}Han Liu and
                  Wu{-}Chih Hsieh and
                  Yu{-}Yi Liao and
                  HongChao Wang and
                  QingHua Lan},
  title        = {Facial Expression Recognition Based on Field Programmable Gate Array},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {547--550},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.266},
  doi          = {10.1109/IAS.2009.266},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LinLHLWL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LinWCCLCYH09,
  author       = {Jing{-}Wun Lin and
                  Chen{-}Chieh Wang and
                  Chin{-}Yao Chang and
                  Chung{-}Ho Chen and
                  Kuen{-}Jong Lee and
                  Yuan{-}Hua Chu and
                  Jen{-}Chieh Yeh and
                  Ying{-}Chuan Hsiao},
  title        = {Full System Simulation and Verification Framework},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {165--168},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.253},
  doi          = {10.1109/IAS.2009.253},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LinWCCLCYH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Liu09,
  author       = {Guanghui Liu},
  title        = {ECC-Cache: {A} Novel Low Power Scheme to Protect Large-Capacity {L2}
                  Caches from Transiant Faults},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {193--199},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.354},
  doi          = {10.1109/IAS.2009.354},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Liu09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Liu09a,
  author       = {Kuo{-}Cheng Liu},
  title        = {Human Visual System Based Watermarking for Color Images},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {623--626},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.349},
  doi          = {10.1109/IAS.2009.349},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Liu09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiuH09,
  author       = {Qiong Liu and
                  Yupu Hu},
  title        = {A Fast Correlation Attack via Parallel Computing},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {651--654},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.108},
  doi          = {10.1109/IAS.2009.108},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiuH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiuL09,
  author       = {Jian Liu and
                  Fangmin Li},
  title        = {An Improvement of {AODV} Protocol Based on Reliable Delivery in Mobile
                  Ad Hoc Networks},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {507--510},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.78},
  doi          = {10.1109/IAS.2009.78},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiuL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiuL09a,
  author       = {Benyong Liu and
                  Xiang Liao},
  title        = {Image Denoising and Magnification via Kernel Fitting and Modified
                  {SVD}},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {521--524},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.29},
  doi          = {10.1109/IAS.2009.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiuL09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiuLL09,
  author       = {Ji{-}Xin Liu and
                  Zhe{-}Ming Lu and
                  Hao Luo},
  title        = {A CELP-Speech Information Hiding Algorithm Based on Vector Quantization},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {75--78},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.60},
  doi          = {10.1109/IAS.2009.60},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiuLL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiuLL09a,
  author       = {Zhenyu Liu and
                  Weijun Li and
                  Yue Lai},
  title        = {Application of Bloom Filter for {GTP} Stateful Inspection in Network
                  Processor},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {589--592},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.112},
  doi          = {10.1109/IAS.2009.112},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiuLL09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiuLNW09,
  author       = {Liqiang Liu and
                  Xianjue Luo and
                  Tao Niu and
                  Kai Wang},
  title        = {Grounding Grid Corrosion Diagnosis Based on Large Change Sensitivity},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {71--74},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.241},
  doi          = {10.1109/IAS.2009.241},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiuLNW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiuLZ09,
  author       = {Jie Liu and
                  Xiaoji Liu and
                  Lin Zheng},
  title        = {Cramer-Rao Lower Bound for Non-coherent {TOA} Estimation with Impulse
                  Signal},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {754--757},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.205},
  doi          = {10.1109/IAS.2009.205},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiuLZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiuMYZ09,
  author       = {Shaohui Liu and
                  Lin Ma and
                  Hongxun Yao and
                  Debin Zhao},
  title        = {Universal Steganalysis Based on Statistical Models Using Reorganization
                  of Block-based {DCT} Coefficients},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {778--781},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.185},
  doi          = {10.1109/IAS.2009.185},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiuMYZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiuPPMP09,
  author       = {Sibo Liu and
                  Liaojun Pang and
                  Qingqi Pei and
                  Hua Ma and
                  Qingquan Peng},
  title        = {Distributed Event-Triggered Trust Management for Wireless Sensor Networks},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {291--294},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.69},
  doi          = {10.1109/IAS.2009.69},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiuPPMP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiuSZJX09,
  author       = {Xiao{-}li Liu and
                  Shuifa Sun and
                  Jian{-}wei Zhu and
                  Ming Jiang and
                  Dan{-}gui Xie},
  title        = {An Audio Watermarking Method of Resistance Statistics Attack Based
                  on Psychoacoustic Model},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {737--739},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.125},
  doi          = {10.1109/IAS.2009.125},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiuSZJX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiwuRLG09,
  author       = {Liwu Deng and
                  Ruzhi Xu and
                  Lizheng Jiang and
                  Guangjuan Lv},
  title        = {A Database Protection System Aiming at {SQL} Attack},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {655--657},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.322},
  doi          = {10.1109/IAS.2009.322},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiwuRLG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LoLS09,
  author       = {Chia{-}Cheng Lo and
                  Jung{-}Guan Luo and
                  Ming{-}Der Shieh},
  title        = {Hardware/Software Codesign of Resource Constrained Real-Time Systems},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {177--180},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.19},
  doi          = {10.1109/IAS.2009.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LoLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LuH09,
  author       = {Qiuqin Lu and
                  Guangqiu Huang},
  title        = {An Attack Model Based on Both-Branch Fuzzy Logic and Fuzzy Petri Net},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {141--144},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.47},
  doi          = {10.1109/IAS.2009.47},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LuH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LuH09a,
  author       = {Tzu{-}Chuen Lu and
                  Ying{-}Hsuan Huang},
  title        = {An Effective Lossless Hiding Technique Based on Reversible Contrast
                  Mapping and Histogram Embedding Methods},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {599--602},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.113},
  doi          = {10.1109/IAS.2009.113},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LuH09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LuJTD09,
  author       = {Lu He and
                  Jianbin Lin and
                  Tianzhi Li and
                  Dingyi Fang},
  title        = {An Anti-attack Watermarking Based on Synonym Substitution for Chinese
                  Text},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {356--359},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.66},
  doi          = {10.1109/IAS.2009.66},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LuJTD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LuL09,
  author       = {Yang Lu and
                  Jiguo Li},
  title        = {Forward-Secure Certificate-Based Encryption},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {57--60},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.189},
  doi          = {10.1109/IAS.2009.189},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LuL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LuXW09,
  author       = {Ji Lu and
                  Song Xiao and
                  Chengke Wu},
  title        = {Efficient Protection Scheme for {SVC} Content Based on Network Coding},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {585--588},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.37},
  doi          = {10.1109/IAS.2009.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LuXW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LuY09,
  author       = {Lijian Lu and
                  Xiaojun Ye},
  title        = {An Improved Weighted-Feature Clustering Algorithm for K-anonymity},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {415--418},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.311},
  doi          = {10.1109/IAS.2009.311},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LuY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LuZ09,
  author       = {Yahui Lu and
                  Li Zhang},
  title        = {Domain Administration of Task-role Based Access Control for Process
                  Collaboration Environments},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {643--647},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.88},
  doi          = {10.1109/IAS.2009.88},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LuZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LuZZ09,
  author       = {Ningning Lu and
                  Huachun Zhou and
                  Hongke Zhang},
  title        = {A New Source Address Validation Scheme Based on {IBS}},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {334--337},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.109},
  doi          = {10.1109/IAS.2009.109},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LuZZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LvXZD09,
  author       = {Guangjuan Lv and
                  Ruzhi Xu and
                  Xiangrong Zu and
                  Liwu Deng},
  title        = {Information Security Monitoring System Based on Data Mining},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {472--475},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.325},
  doi          = {10.1109/IAS.2009.325},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LvXZD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MaDZ09,
  author       = {Jun Ma and
                  Guanzhong Dai and
                  Jing Zhou},
  title        = {Anomalous Payload Detection System Using Analysis of Frequent Sequential
                  Pattern},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {75--78},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.34},
  doi          = {10.1109/IAS.2009.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MaDZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MaGSH09,
  author       = {Jibin Ma and
                  Huiling Gu and
                  Yonghao Sun and
                  Xujie Hu},
  title        = {Risk Assessment Model on the Internal Corporate Governance Based on
                  the {SPA}},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {272--276},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.90},
  doi          = {10.1109/IAS.2009.90},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MaGSH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MaL09,
  author       = {Xian{-}Min Ma and
                  Che Liang},
  title        = {Application of Rough Set Theory in Coal Gangue Image Process},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {87--90},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.102},
  doi          = {10.1109/IAS.2009.102},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MaL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MaWGY09,
  author       = {Xiao{-}Long Ma and
                  Zhiwei Wang and
                  Lize Gu and
                  Yixian Yang},
  title        = {Remark on Yu et al.'s Online/Offline Signature Scheme in {CT-RSA}
                  2008},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {719--720},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.318},
  doi          = {10.1109/IAS.2009.318},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MaWGY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MaXL09,
  author       = {Yuxin Ma and
                  Jiancang Xie and
                  Jungang Luo},
  title        = {Image Enhancement Based on Nonsubsampled Contourlet Transform},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {31--34},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.44},
  doi          = {10.1109/IAS.2009.44},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MaXL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MaZLW09,
  author       = {Hongxia Ma and
                  Yao Zhao and
                  Chunyu Lin and
                  Anhong Wang},
  title        = {Distributed Video Coding Based on Multiple Description},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {294--297},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.196},
  doi          = {10.1109/IAS.2009.196},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MaZLW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MaoMD09,
  author       = {Liqiang Mao and
                  Jianfeng Ma and
                  Xuewen Dong},
  title        = {Towards Provably Secure On-demand Source Routing in {MANET}},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {299--302},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.177},
  doi          = {10.1109/IAS.2009.177},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MaoMD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MeiHY09,
  author       = {Mei Wang and
                  Huifeng Zhang and
                  Yong Yan},
  title        = {The Detection of Bi-frequency Weak Signal Based on Chaos and Correlation},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {83--86},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.332},
  doi          = {10.1109/IAS.2009.332},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MeiHY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MeiXH09,
  author       = {Wang Mei and
                  Xiaochuan Sun and
                  Zheng Hao},
  title        = {Range-Free Fast and Rough Nodes Localization Algorithm in Wireless
                  Sensor Networks},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {437--440},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.331},
  doi          = {10.1109/IAS.2009.331},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MeiXH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MengGG09,
  author       = {Fan{-}jie Meng and
                  Bao{-}Long Guo and
                  Lei Guo},
  title        = {Image Retrieval Based on 2D Histogram of Interest Points},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {250--253},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.212},
  doi          = {10.1109/IAS.2009.212},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MengGG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MingW09,
  author       = {Yang Ming and
                  Yumin Wang},
  title        = {Efficient Certificate-Based Signature Scheme},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {87--90},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.62},
  doi          = {10.1109/IAS.2009.62},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MingW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MingmingBWL09,
  author       = {Li Mingming and
                  Li Baiping and
                  Li Wei and
                  Chen Lei},
  title        = {Information Security Wireless Sensor Grid},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {441--445},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.288},
  doi          = {10.1109/IAS.2009.288},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MingmingBWL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/NanjoNK09,
  author       = {Hiroaki Nanjo and
                  Takanobu Nishiura and
                  Hiroshi Kawano},
  title        = {Acoustic-Based Security System: Towards Robust Understanding of Emergency
                  Shout},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {725--728},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.121},
  doi          = {10.1109/IAS.2009.121},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/NanjoNK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/NiSM09,
  author       = {Qinqin Ni and
                  Weizhen Sun and
                  Sen Ma},
  title        = {Deadlock Detection Based on Resource Allocation Graph},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {135--138},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.64},
  doi          = {10.1109/IAS.2009.64},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/NiSM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/NieDWZ09,
  author       = {Rongxian Nie and
                  Guiguang Ding and
                  Jianmin Wang and
                  Li Zhang},
  title        = {A New Fingerprint Sequences Matching Algorithm for Content-Based Copy
                  Detection},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {427--430},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.284},
  doi          = {10.1109/IAS.2009.284},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/NieDWZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/NiuZZLL09,
  author       = {Tao Niu and
                  Yingjiao Zhang and
                  Debo Zhang and
                  Liqiang Liu and
                  Xianjue Luo},
  title        = {Testability Analysis of Grounding Grids Using Network Transformation},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {589--592},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.238},
  doi          = {10.1109/IAS.2009.238},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/NiuZZLL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/PeiWYPT09,
  author       = {Qingqi Pei and
                  Lei Wang and
                  Hao Yin and
                  Liaojun Pang and
                  Hong Tang},
  title        = {Layer Key Management Scheme on Wireless Sensor Networks},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {427--431},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.309},
  doi          = {10.1109/IAS.2009.309},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/PeiWYPT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/PengWC09,
  author       = {Wu Peng and
                  Zhigang Wang and
                  Junhua Chen},
  title        = {Research on Attack Intention Recognition Based on Graphical Model},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {360--363},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.158},
  doi          = {10.1109/IAS.2009.158},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/PengWC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/PengYLD09,
  author       = {Wenbiao Peng and
                  Chaojun Yan and
                  Xinqiong Liu and
                  Lihua Deng},
  title        = {Emergency Command System for Geologic Disasters Prevention},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {410--413},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.51},
  doi          = {10.1109/IAS.2009.51},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/PengYLD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/PlatosSKA09,
  author       = {Jan Platos and
                  V{\'{a}}clav Sn{\'{a}}sel and
                  Pavel Kr{\"{o}}mer and
                  Ajith Abraham},
  title        = {Detecting Insider Attacks Using Non-negative Matrix Factorization},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {693--696},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.262},
  doi          = {10.1109/IAS.2009.262},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/PlatosSKA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/QiWQ09,
  author       = {Jun{-}qiao Qi and
                  Chang{-}long Wang and
                  Yan{-}ming Qi},
  title        = {The Application on the Evaluation of Quality of Universities Undergraduate
                  Theory Teaching Work Based on Artificial Neural Network},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {387--390},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.139},
  doi          = {10.1109/IAS.2009.139},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/QiWQ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/QiuTQ09,
  author       = {Yang Qiu and
                  Jin Tian and
                  Liuyu Qian},
  title        = {Research on Video Information Camouflage Processing Algorithm Based
                  on Pulse Amplitude Modulation},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {277--280},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.308},
  doi          = {10.1109/IAS.2009.308},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/QiuTQ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/QuanSC09,
  author       = {Quan Feng and
                  Fei Su and
                  Anni Cai},
  title        = {Encrypted Fuzzy Vault Based on Fingerprint},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {137--140},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.213},
  doi          = {10.1109/IAS.2009.213},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/QuanSC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/RahamanPRS09,
  author       = {Mohammad Ashiqur Rahaman and
                  Henrik Plate and
                  Yves Roudier and
                  Andreas Schaad},
  title        = {Towards Secure Content Based Dissemination of {XML} Documents},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {721--724},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.138},
  doi          = {10.1109/IAS.2009.138},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/RahamanPRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/RahmaniSK09,
  author       = {Hamza Rahmani and
                  Nabil Sahli and
                  Farouk Kamoun},
  title        = {Joint Entropy Analysis Model for DDoS Attack Detection},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {267--271},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.298},
  doi          = {10.1109/IAS.2009.298},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/RahmaniSK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/RajanYNFZ09,
  author       = {Deepa Susan Rajan and
                  Chetan Yeole and
                  Harsha Nakade and
                  Huirong Fu and
                  Ye Zhu},
  title        = {Position Verification in Multi-hop Vehicular Networks},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {580--584},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.345},
  doi          = {10.1109/IAS.2009.345},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/RajanYNFZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/RajaveerappaA09,
  author       = {D. Rajaveerappa and
                  Abdelsalam Almarimi},
  title        = {RSA/Shift Secured {IFFT/FFT} Based {OFDM} Wireless System},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {208--211},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.356},
  doi          = {10.1109/IAS.2009.356},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/RajaveerappaA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/RenRZ09,
  author       = {Wei Ren and
                  Yi Ren and
                  Hui Zhang},
  title        = {{H2S:} {A} Secure and Efficient Data Aggregative Retrieval Scheme
                  in Unattended Wireless Sensor Networks},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {450--453},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.25},
  doi          = {10.1109/IAS.2009.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/RenRZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/RoschkeCM09,
  author       = {Sebastian Roschke and
                  Feng Cheng and
                  Christoph Meinel},
  title        = {An Extensible and Virtualization-Compatible {IDS} Management Architecture},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {130--134},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.151},
  doi          = {10.1109/IAS.2009.151},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/RoschkeCM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/SamyAI09,
  author       = {Ganthan Narayana Samy and
                  Rabiah Ahmad and
                  Zuraini Ismail},
  title        = {Threats to Health Information Security},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {540--543},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.312},
  doi          = {10.1109/IAS.2009.312},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/SamyAI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/SekehM09,
  author       = {Mohammad Akbarpour Sekeh and
                  Mohd. Aizani Bin Maarof},
  title        = {Fuzzy Intrusion Detection System via Data Mining Technique with Sequences
                  of System Calls},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {154--157},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.32},
  doi          = {10.1109/IAS.2009.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/SekehM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ShanJ09,
  author       = {Shan Zhao and
                  Jing Liu},
  title        = {Image Retrieval Based on Character-Matching Technology},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {369--372},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.203},
  doi          = {10.1109/IAS.2009.203},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ShanJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ShenDCW09,
  author       = {Xiaodong Shen and
                  Guiguang Ding and
                  Yizheng Chen and
                  Jianmin Wang},
  title        = {Adaptive-Push Peer-to-Peer Video Streaming System Based on Dynamic
                  Unstructured Topology},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {697--700},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.54},
  doi          = {10.1109/IAS.2009.54},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ShenDCW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ShenLMBLZ09,
  author       = {Huan Shen and
                  Shun Ming Li and
                  Jian Guo Mao and
                  Fang Chao Bo and
                  Fang Pei Li and
                  Hua Peng Zhou},
  title        = {A Robust Vehicle Tracking Approach Using Mean Shift Procedure},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {741--744},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.127},
  doi          = {10.1109/IAS.2009.127},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ShenLMBLZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ShenXWYM09,
  author       = {Yulong Shen and
                  Qijian Xu and
                  Zuoshun Wu and
                  Hao Yin and
                  Jianfeng Ma},
  title        = {A New Hybrid Routing Protocol in Heterogeneous Wireless Networks},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {423--426},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.45},
  doi          = {10.1109/IAS.2009.45},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ShenXWYM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Shi09,
  author       = {Wei{-}Min Shi},
  title        = {ID-Based Non-interactive Deniable Authentication Protocol},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {479--482},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.46},
  doi          = {10.1109/IAS.2009.46},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Shi09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ShiLG09,
  author       = {Ling{-}feng Shi and
                  Xin{-}Quan Lai and
                  Bao{-}Long Guo},
  title        = {Paper Study of Embedded System Design Based on {RFID} Securities},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {529--531},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.199},
  doi          = {10.1109/IAS.2009.199},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ShiLG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ShihH09,
  author       = {Hao{-}Chung Shih and
                  Chian C. Ho},
  title        = {Soft {DSP} Design Methodology of Face Recognition System on Nios {II}
                  Embedded Platform},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {753--756},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.296},
  doi          = {10.1109/IAS.2009.296},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ShihH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ShulinY09,
  author       = {Shulin Liu and
                  Li Yan},
  title        = {Research on Intrinsic Safety Behavior of Inductor-Disconnected-Discharge
                  of Boost {DC-DC} Converters},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {758--761},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.94},
  doi          = {10.1109/IAS.2009.94},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ShulinY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/SirajMH09,
  author       = {Maheyzah Md Siraj and
                  Mohd Aizaini Maarof and
                  Siti Zaiton Mohd Hashim},
  title        = {Intelligent Clustering with {PCA} and Unsupervised Learning Algorithm
                  in Intrusion Alert Correlation},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {679--682},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.261},
  doi          = {10.1109/IAS.2009.261},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/SirajMH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/SongL09,
  author       = {Qiang Song and
                  Gang Li},
  title        = {The Research on the Measurement of China Internet Illegal and Harmful
                  Content},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {705--709},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.230},
  doi          = {10.1109/IAS.2009.230},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/SongL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/SongL09a,
  author       = {Qiang Song and
                  Gang Li},
  title        = {Cost-Benefit Analysis of China's Internet Content Regulation},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {571--575},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.229},
  doi          = {10.1109/IAS.2009.229},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/SongL09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/SunL09,
  author       = {Hung{-}Min Sun and
                  Muh{-}Chyi Leu},
  title        = {A Real-Time Selective Video Encryption Using Context-Key Control},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {114--117},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.217},
  doi          = {10.1109/IAS.2009.217},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/SunL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/SunL09a,
  author       = {Peng Sun and
                  Hongtao Lu},
  title        = {Two Efficient Fragile Web Page Watermarking Schemes},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {326--329},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.27},
  doi          = {10.1109/IAS.2009.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/SunL09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/SunXLY09,
  author       = {Ying Sun and
                  Chunxiang Xu and
                  Fagen Li and
                  Yong Yu},
  title        = {Identity Based Multi-proxy Multi-signcryption Scheme for Electronic
                  Commerce},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {281--284},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.166},
  doi          = {10.1109/IAS.2009.166},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/SunXLY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/SunXXY09,
  author       = {Ying Sun and
                  Chunxiang Xu and
                  Qi Xia and
                  Yong Yu},
  title        = {Analysis and Improvement of a Proxy Blind Multi-signature Scheme without
                  a Secure Channel},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {661--664},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.167},
  doi          = {10.1109/IAS.2009.167},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/SunXXY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/TadokoroKKK09,
  author       = {Naoki Tadokoro and
                  Tetsuo Kosaka and
                  Masaharu Katoh and
                  Masaki Kohda},
  title        = {Improvement of Speaker Vector-Based Speaker Verification},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {721--724},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.162},
  doi          = {10.1109/IAS.2009.162},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/TadokoroKKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/TaiCLT09,
  author       = {Shen{-}Chuan Tai and
                  Yi{-}Ying Chang and
                  Kang{-}Ming Li and
                  Ting{-}Chou Tsai},
  title        = {Contrast Enhancement Method Based on Average Luminance with Weighted
                  Histogram Equalization},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {555--558},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.369},
  doi          = {10.1109/IAS.2009.369},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/TaiCLT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/TaiCTL09,
  author       = {Shen{-}Chuan Tai and
                  Yi{-}Ying Chang and
                  Ting{-}Chou Tsai and
                  Li{-}Man Liao},
  title        = {Analysis and Evaluation of Contrast Enhancement Methods in Digital
                  Images},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {551--554},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.342},
  doi          = {10.1109/IAS.2009.342},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/TaiCTL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/TangLY09,
  author       = {Lin{-}Lin Tang and
                  Zhe{-}Ming Lu and
                  Fa{-}Xin Yu},
  title        = {A Novel Multiple Description Coding Frame Based on Reordered {DCT}
                  Coefficients and {SPIHT} Algorithm},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {71--74},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.56},
  doi          = {10.1109/IAS.2009.56},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/TangLY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/TangQFL09,
  author       = {Zhanyong Tang and
                  Rui Qi and
                  Dingyi Fang and
                  Yangxia Luo},
  title        = {W-Aegis: {A} Propagation Behavior Based Worm Detection Model for Local
                  Networks},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {158--162},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.293},
  doi          = {10.1109/IAS.2009.293},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/TangQFL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/TianCQJ09,
  author       = {Donghai Tian and
                  Changzhen Hu and
                  Yang Qi and
                  Jianqiao Wang},
  title        = {Hierarchical Distributed Alert Correlation Model},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {765--768},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.26},
  doi          = {10.1109/IAS.2009.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/TianCQJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/TianHW09,
  author       = {Feng Tian and
                  Xiao{-}bing Han and
                  Ying Wei},
  title        = {Application and Research of Mobile E-commerce Security Based on {WPKI}},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {711--714},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.243},
  doi          = {10.1109/IAS.2009.243},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/TianHW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/TianQL09,
  author       = {Jin Tian and
                  Yang Qiu and
                  Ankun Lin},
  title        = {Generalized Analysis Model of Information Security of Computer System
                  Based on Electromagnetic Topology},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {766--769},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.306},
  doi          = {10.1109/IAS.2009.306},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/TianQL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/TianQQ09,
  author       = {Jin Tian and
                  Yang Qiu and
                  Liuyu Qian},
  title        = {Research on Algorithm of Digital Filtering Based on Video Information
                  Security},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {593--596},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.307},
  doi          = {10.1109/IAS.2009.307},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/TianQQ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/TianWZSC09,
  author       = {Zengming Tian and
                  Xiangming Wen and
                  Wei Zheng and
                  Yong Sun and
                  Yinbo Cheng},
  title        = {Evaluation and Simulation on the Performance of DHTs Required by {P2PSIP}},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {701--704},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.233},
  doi          = {10.1109/IAS.2009.233},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/TianWZSC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Tong-anJY09,
  author       = {Feng Tong{-}an and
                  He Jin and
                  Luo Ying},
  title        = {{ISAR} Imaging of High Speed Moving Targets Based-on Radon Transform},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {597--600},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.357},
  doi          = {10.1109/IAS.2009.357},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Tong-anJY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/TsaiLPC09,
  author       = {Tsung{-}Han Tsai and
                  Chung{-}Yuan Lin and
                  De{-}Zhang Peng and
                  Giua{-}Hua Chen},
  title        = {Design and Integration for Background Subtraction and Foreground Tracking
                  Algorithm},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {181--184},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.231},
  doi          = {10.1109/IAS.2009.231},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/TsaiLPC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/TsaiWCPC09,
  author       = {Meng{-}Hsiun Tsai and
                  Ming{-}Hung Wang and
                  Ting{-}Yuan Chang and
                  Pei{-}Yan Pai and
                  Yung{-}Kuan Chan},
  title        = {An Adaptable Threshold Decision Method},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {45--48},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.96},
  doi          = {10.1109/IAS.2009.96},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/TsaiWCPC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WamplerFZ09,
  author       = {David Wampler and
                  Huirong Fu and
                  Ye Zhu},
  title        = {Security Threats and Countermeasures for Intra-vehicle Networks},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {153--157},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.350},
  doi          = {10.1109/IAS.2009.350},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WamplerFZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Wang09,
  author       = {Lingling Wang},
  title        = {A New Multi-bank E-cash Protocol with Anonymity Control},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {536--539},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.23},
  doi          = {10.1109/IAS.2009.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Wang09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Wang09a,
  author       = {Jin{-}fu Wang},
  title        = {E-government Security Management: Key Factors and Countermeasure},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {483--486},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.146},
  doi          = {10.1109/IAS.2009.146},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Wang09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WangCC09,
  author       = {Chuin{-}Mu Wang and
                  Jau{-}An Chen and
                  Jui{-}Hsing Chu},
  title        = {Application of Averaged Learning Subspace Method in {MRI} Classification},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {559--562},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.275},
  doi          = {10.1109/IAS.2009.275},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WangCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WangHG09,
  author       = {Zhiyuan Wang and
                  Jianhua Huang and
                  Ziming Guan},
  title        = {The {SOBER} Family Ciphers Reconfigurable Processing Architecture
                  Design},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {322--326},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.159},
  doi          = {10.1109/IAS.2009.159},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WangHG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WangJJRWMFSYDG09,
  author       = {Xiao Dong Wang and
                  Mike Jones and
                  Jens Jensen and
                  Andrew Richards and
                  David Wallom and
                  Tiejun Ma and
                  Robert Frank and
                  David Spence and
                  Steven Young and
                  Claire Devereux and
                  Neil Geddes},
  title        = {Shibboleth Access for Resources on the National Grid Service (SARoNGS)},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {338--341},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.163},
  doi          = {10.1109/IAS.2009.163},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WangJJRWMFSYDG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WangJZZ09,
  author       = {Baoyi Wang and
                  Ranran Jin and
                  Shaomin Zhang and
                  Xiaomin Zhao},
  title        = {Research on Gravity-Based Anomaly Intrusion Detection Algorithm},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {350--353},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.283},
  doi          = {10.1109/IAS.2009.283},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WangJZZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WangKKJ09,
  author       = {Jin Wang and
                  Heechang Kim and
                  Jongho Kim and
                  Jechang Jeong},
  title        = {Adaptive Spatially Postprocessing Technique to Remove Blocking Artifacts
                  for {DCT} Coded Image},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {517--520},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.281},
  doi          = {10.1109/IAS.2009.281},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WangKKJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WangL09,
  author       = {Bo Wang and
                  Dichen Liu},
  title        = {A Frequent-Domain VideoTranscoder with Spatial Downscaling for {H.264/AVC}},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {115--118},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.172},
  doi          = {10.1109/IAS.2009.172},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WangL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WangL09a,
  author       = {Ya{-}min Wang and
                  Yan Liu},
  title        = {Design of {DBA} Algorithm in {EPON} Uplike},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {751--753},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.272},
  doi          = {10.1109/IAS.2009.272},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WangL09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WangL09b,
  author       = {Jing Wang and
                  Xiaola Lin},
  title        = {An Efficient Hierarchical Group Key Management Scheme Based on Orthogonal
                  Vectors},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {681--684},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.237},
  doi          = {10.1109/IAS.2009.237},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WangL09b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WangLB09,
  author       = {Feng Wang and
                  Xia Liu and
                  Marek E. Bialkowski},
  title        = {Space Time Block Coded {MIMO} System with Redundant Antennas},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {204--207},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.98},
  doi          = {10.1109/IAS.2009.98},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WangLB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WangLH09,
  author       = {Baocang Wang and
                  Hui Liu and
                  Yupu Hu},
  title        = {Cryptanalysis of a Knapsack Public Key Cryptosystem},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {49--52},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.299},
  doi          = {10.1109/IAS.2009.299},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WangLH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WangLNB09,
  author       = {Zhifang Wang and
                  Qiong Li and
                  Xiamu Niu and
                  Christoph Busch},
  title        = {Multimodal Biometric Recognition Based on Complex {KFDA}},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {177--180},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.68},
  doi          = {10.1109/IAS.2009.68},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WangLNB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WangLS09,
  author       = {Kai Wang and
                  Yan Liu and
                  Xiaowei Sun},
  title        = {Small Moving Infrared Target Detection Algorithm under Low {SNR} Background},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {95--97},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.239},
  doi          = {10.1109/IAS.2009.239},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WangLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WangLZG09,
  author       = {Baoyi Wang and
                  Jing Li and
                  Shaomin Zhang and
                  Xueying Guo},
  title        = {Scanning Task Scheduling Strategy in Distributed Vulnerability Detection
                  System},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {761--764},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.282},
  doi          = {10.1109/IAS.2009.282},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WangLZG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WangPHC09,
  author       = {Tien{-}Chin Wang and
                  Shu{-}Chen Peng and
                  Shu{-}Chen Hsu and
                  Jui{-}Fang Chang},
  title        = {An Approach to Group Decision Making Based on Incomplete Linguistic
                  Preference Relations},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {631--634},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.204},
  doi          = {10.1109/IAS.2009.204},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WangPHC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WangQ09,
  author       = {Lidong Wang and
                  Liping Qian},
  title        = {Exploiting {RFC2828} as a Domain Vocabulary for Identifying {IT} Security
                  Literature},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {141--144},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.75},
  doi          = {10.1109/IAS.2009.75},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WangQ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WangQ09a,
  author       = {Jingran Wang and
                  Haifeng Qian},
  title        = {An Optimal Blind Signature Padding with Message Recovery},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {673--676},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.10},
  doi          = {10.1109/IAS.2009.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WangQ09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WangSJXL09,
  author       = {Jing{-}pei Wang and
                  Shuifa Sun and
                  Ming Jiang and
                  Dan{-}gui Xie and
                  Bang Jun Lei},
  title        = {Anti-protocol Attacks Digital Watermarking Based on Media-Hash and
                  {SVD}},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {364--367},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.206},
  doi          = {10.1109/IAS.2009.206},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WangSJXL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WangTSC09,
  author       = {Shiuh{-}Jeng Wang and
                  Yuh{-}Ren Tsai and
                  Chien{-}Chih Shen and
                  Pin{-}You Chen},
  title        = {Hierarchical Key Agreement Protocols in Group-User Systems},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {259--262},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.152},
  doi          = {10.1109/IAS.2009.152},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WangTSC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WangW09,
  author       = {Mei Wang and
                  Li Wang},
  title        = {An Improved Fusion Algorithm of the Weighted Features and its Application
                  in Image Retrieval},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {254--257},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.95},
  doi          = {10.1109/IAS.2009.95},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WangW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WangW09a,
  author       = {Shudong Wang and
                  Xiaohua Wang},
  title        = {Research on New Classification Methods of Remote Sensing of Mass Ingredient
                  without Vegetation of Hei Shan Gorge in Yellow River Basin},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {693--696},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.186},
  doi          = {10.1109/IAS.2009.186},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WangW09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WangWLHZ09,
  author       = {Yin Wang and
                  Xiangming Wen and
                  Xinqi Lin and
                  Peizhou He and
                  Wei Zheng},
  title        = {A Novel Video Shot Segmentation Based on Textural Features},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {119--122},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.232},
  doi          = {10.1109/IAS.2009.232},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WangWLHZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WangXLS09,
  author       = {Hui Wang and
                  Heli Xu and
                  Bibo Lu and
                  Zihao Shen},
  title        = {Research on Security Architecture for Defending Insider Threat},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {30--33},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.53},
  doi          = {10.1109/IAS.2009.53},
  timestamp    = {Mon, 27 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WangXLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WangY09,
  author       = {Xu An Wang and
                  Xiaoyuan Yang},
  title        = {Proxy Re-encryption Scheme Based on {SK} Identity Based Encryption},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {657--660},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.191},
  doi          = {10.1109/IAS.2009.191},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WangY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WangYP09,
  author       = {Xu An Wang and
                  Xiaoyuan Yang and
                  Qingquan Peng},
  title        = {On Security Notions for Verifiably Encrypted Signature},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {37--40},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.190},
  doi          = {10.1109/IAS.2009.190},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WangYP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WangYWY09,
  author       = {Qingnian Wang and
                  Kun Yan and
                  Xiaofeng Wan and
                  Meiling Yuan},
  title        = {Application of Particle Swarm Optimization in Fussy Neural Networks},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {158--161},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.263},
  doi          = {10.1109/IAS.2009.263},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WangYWY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WangZL09,
  author       = {Anhong Wang and
                  Yao Zhao and
                  Zhihong Li},
  title        = {A Two-Description Distributed Video Coding},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {127--130},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.134},
  doi          = {10.1109/IAS.2009.134},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WangZL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WeiMM09,
  author       = {Li Wei and
                  Chen Ming and
                  Li Mingming},
  title        = {Information Security Routing Protocol in the {WSN}},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {651--656},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.260},
  doi          = {10.1109/IAS.2009.260},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WeiMM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WeiTC09,
  author       = {Yung{-}Chiang Wei and
                  Jui{-}Che Teng and
                  Chien{-}Wen Chung},
  title        = {Intra-mode Dependent Coding Method for Image Compression},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {371--374},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.346},
  doi          = {10.1109/IAS.2009.346},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WeiTC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WeiguangWJ09,
  author       = {Liu Weiguang and
                  Wang Wenqi and
                  Cui Jiangtao},
  title        = {A New Scheme for Multisensor Image Fusion System},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {509--512},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.278},
  doi          = {10.1109/IAS.2009.278},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WeiguangWJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Wu09,
  author       = {Jianzhen Wu},
  title        = {A {RST} Invariant Watermarking Scheme Utilizing Support Vector Machine
                  and Image Moments for Synchronization},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {572--574},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.176},
  doi          = {10.1109/IAS.2009.176},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Wu09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Wu09a,
  author       = {Jianzhen Wu},
  title        = {Image Moment Based Registration Scheme Utilizing Support Vector Machine},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {575--577},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.175},
  doi          = {10.1109/IAS.2009.175},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Wu09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WuCWC09,
  author       = {Hsien{-}Huang P. Wu and
                  Shih{-}Hsin Chang and
                  Ping{-}Kuo Weng and
                  Soon{-}Lin Chen},
  title        = {Economical Dental Stereoradiography in Digital Era},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {57--60},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.168},
  doi          = {10.1109/IAS.2009.168},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WuCWC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WuGHD09,
  author       = {Xuyan Wu and
                  Huiling Gu and
                  Xujie Hu and
                  Yuhong Dong},
  title        = {Application of the Fuzzy Entropy Weight in Risk Assessment of the
                  Engineering Project},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {145--148},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.92},
  doi          = {10.1109/IAS.2009.92},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WuGHD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WuGHD09a,
  author       = {Xuyan Wu and
                  Huiling Gu and
                  Xujie Hu and
                  Yuhong Dong},
  title        = {Appraisal Model of {MIS} in Enterprises Based on the Unascertained
                  Measurement},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {277--280},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.91},
  doi          = {10.1109/IAS.2009.91},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WuGHD09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WuGQW09,
  author       = {Xiaoyue Wu and
                  Baolong Guo and
                  Shengli Qu and
                  Zhuo Wang},
  title        = {A New Adaptive Image Denoising Method Combining the Nonsubsampled
                  Contourlet Transform and Total Variation},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {581--584},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.18},
  doi          = {10.1109/IAS.2009.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WuGQW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WuGW09,
  author       = {Xianxiang Wu and
                  Bao{-}Long Guo and
                  Juan Wang},
  title        = {Octa-Log-Polar Fourier Transform for Image Registration},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {601--604},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.285},
  doi          = {10.1109/IAS.2009.285},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WuGW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WuS09,
  author       = {Xiaosheng Wu and
                  Junding Sun},
  title        = {An Effective Texture Spectrum Descriptor},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {361--364},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.126},
  doi          = {10.1109/IAS.2009.126},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WuS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WuW09,
  author       = {Dong{-}Mei Wu and
                  Jiang{-}Nan Wang},
  title        = {An Improved Iris Recognition Method Based on Gray Surface Matching},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {247--249},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.57},
  doi          = {10.1109/IAS.2009.57},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WuW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WuWSH09,
  author       = {Ming{-}Kan Wu and
                  Jing{-}Siang Wei and
                  Hao{-}Chung Shih and
                  Chian C. Ho},
  title        = {2-Level-Wavelet-Based License Plate Edge Detection},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {385--388},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.295},
  doi          = {10.1109/IAS.2009.295},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WuWSH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WuY09,
  author       = {Yang Wu and
                  Li Yang},
  title        = {Practical Quantum No-key Protocol with Identification},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {540--543},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.106},
  doi          = {10.1109/IAS.2009.106},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WuY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WushengYZ09,
  author       = {Zhao Wusheng and
                  Fu Yongqing and
                  Han Zhixue},
  title        = {The Method of Equalization Based on Iterative Interference Cancellation
                  for {SCCPM} System},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {548--551},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.42},
  doi          = {10.1109/IAS.2009.42},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WushengYZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WuuCHK09,
  author       = {Lih{-}Chyau Wuu and
                  Yen{-}Ju Chen and
                  Chi{-}Hsiang Hung and
                  Wen{-}Chung Kuo},
  title        = {Zero-Collision {RFID} Tags Identification Based on {CDMA}},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {513--516},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.216},
  doi          = {10.1109/IAS.2009.216},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WuuCHK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/XiaoZWH09,
  author       = {Han Xiao and
                  Zu{-}xun Zhang and
                  Qiang Wang and
                  Hua{-}liang Hu},
  title        = {Development of a Java-Oriented Software General Component Library},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {321--325},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.15},
  doi          = {10.1109/IAS.2009.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/XiaoZWH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/XiaobinGYP09,
  author       = {Xiaobin Tan and
                  Guihong Qin and
                  Yong Zhang and
                  Ping Liang},
  title        = {Network Security Situation Awareness Using Exponential and Logarithmic
                  Analysis},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {149--152},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.38},
  doi          = {10.1109/IAS.2009.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/XiaobinGYP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/XieWLF09,
  author       = {Zhihua Xie and
                  Shiqian Wu and
                  Guodong Liu and
                  Zhijun Fang},
  title        = {Infrared Face Recognition Based on Radiant Energy and Curvelet Transformation},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {215--218},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.24},
  doi          = {10.1109/IAS.2009.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/XieWLF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/XieXY09,
  author       = {Jianquan Xie and
                  Qing Xie and
                  Chunhua Yang},
  title        = {An Accurate Image Juggling Authentication Algorithm},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {774--777},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.274},
  doi          = {10.1109/IAS.2009.274},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/XieXY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/XingYMY09,
  author       = {Xing Liu and
                  Yan Li and
                  Mian Cai and
                  Ying Guo},
  title        = {The Testing and Evaluating System for the Security Operating System
                  Based on the Mechanism of Keyword-Driven},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {471--474},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.80},
  doi          = {10.1109/IAS.2009.80},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/XingYMY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/XiongBZM09,
  author       = {Lei Xiong and
                  Duyan Bi and
                  Xu Zhou and
                  Shiping Ma},
  title        = {Boosting Graph Embedding with Application to Facial Expression Recognition},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {707--710},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.63},
  doi          = {10.1109/IAS.2009.63},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/XiongBZM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/XuMZ09,
  author       = {Rui Xu and
                  Wen{-}li Ma and
                  Wen{-}ling Zheng},
  title        = {Defending against {UDP} Flooding by Negative Selection Algorithm Based
                  on Eigenvalue Sets},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {342--345},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.280},
  doi          = {10.1109/IAS.2009.280},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/XuMZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YamamotoN09,
  author       = {Kazumasa Yamamoto and
                  Seiichi Nakagawa},
  title        = {Privacy Protection for Speech Information},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {717--720},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.321},
  doi          = {10.1109/IAS.2009.321},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YamamotoN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YanH09,
  author       = {Tongjiang Yan and
                  Li Hong},
  title        = {Constructions of Some Difference-Balanced d-form Functions},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {635--637},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.244},
  doi          = {10.1109/IAS.2009.244},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YanH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YanMC09,
  author       = {Fu Yan and
                  Wang Mei and
                  Zhang Chunqin},
  title        = {{SAR} Image Target Recognition Based on Hu Invariant Moments and {SVM}},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {585--588},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.289},
  doi          = {10.1109/IAS.2009.289},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YanMC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Yang09,
  author       = {Wu{-}Chuan Yang},
  title        = {New Strategy of Efficient SPA-resistant Exponentiations},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {348--351},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.161},
  doi          = {10.1109/IAS.2009.161},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Yang09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Yang09a,
  author       = {Mingkun Yang},
  title        = {Optimal Information Rates of Novel Graph Based Access Structures},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {701--704},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.297},
  doi          = {10.1109/IAS.2009.297},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Yang09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YangCXM09,
  author       = {Yahui Yang and
                  Yunfei Chen and
                  Min Xia and
                  Juan Ma},
  title        = {An Automated Mechanism of Security Test on Network Protocols},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {503--506},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.224},
  doi          = {10.1109/IAS.2009.224},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YangCXM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YangFL09,
  author       = {Zhen Yang and
                  Kefeng Fan and
                  Yingxu Lai},
  title        = {Trusted Computing Based Mobile {DRM} Authentication Scheme},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {7--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.303},
  doi          = {10.1109/IAS.2009.303},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YangFL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YangGFG09,
  author       = {Qunting Yang and
                  Tiegang Gao and
                  Li Fan and
                  Qiaolun Gu},
  title        = {Analysis of One-way Alterable Length Hash Function Based on Cell Neural
                  Network},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {391--395},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.87},
  doi          = {10.1109/IAS.2009.87},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YangGFG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YangGL09,
  author       = {Liu Yang and
                  Baolong Guo and
                  Jianmin Lv},
  title        = {A Modified Feature Based Image Watermarking Scheme in {NSCT} Domain},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {67--70},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.339},
  doi          = {10.1109/IAS.2009.339},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YangGL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YangGNW09,
  author       = {Xiaoyuan Yang and
                  Yao Guo and
                  Ke Niu and
                  Xiang Wu},
  title        = {An Authenticating Algorithm with Multi-compression Compatible in {DCT}
                  Domain},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {11--14},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.256},
  doi          = {10.1109/IAS.2009.256},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YangGNW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YangH09,
  author       = {Chyuan{-}Huei Thomas Yang and
                  Chun{-}Hao Hsu},
  title        = {A High Quality Reversible Data Hiding Method Using Interpolation Technique},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {603--606},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.79},
  doi          = {10.1109/IAS.2009.79},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YangH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YangHW09,
  author       = {Cheng{-}Hsing Yang and
                  Cheng{-}Ta Huang and
                  Shiuh{-}Jeng Wang},
  title        = {Reversible Steganography Based on Side Match and Hit Pattern for VQ-Compressed
                  Images},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {607--610},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.192},
  doi          = {10.1109/IAS.2009.192},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YangHW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YangJ09,
  author       = {Wu{-}Chuan Yang and
                  Jhih{-}Syue Jhou},
  title        = {Known Signature Attack of ID-Based Multisignature Schemes},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {341--343},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.149},
  doi          = {10.1109/IAS.2009.149},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YangJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YangLDL09,
  author       = {Fan Yang and
                  Xiaoping Li and
                  Qingkuan Dong and
                  Yanming Liu},
  title        = {A Dynamic Layering Scheme of Multicast Key Management},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {269--272},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.344},
  doi          = {10.1109/IAS.2009.344},
  timestamp    = {Thu, 28 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YangLDL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YangLWS09,
  author       = {Xiaoyuan Yang and
                  Zhongyin Liang and
                  Ping Wei and
                  Junwei Shen},
  title        = {A Provably Secure Certificateless Blind Signature Scheme},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {643--646},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.257},
  doi          = {10.1109/IAS.2009.257},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YangLWS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YangLZG09,
  author       = {Xiaoyuan Yang and
                  Zhen Liu and
                  Wei Zhang and
                  Dun{-}Tao Guo},
  title        = {A High-efficiency Data Distribution Algorithm in Distributed Storage},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {627--630},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.225},
  doi          = {10.1109/IAS.2009.225},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YangLZG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YangMLL09,
  author       = {Xin{-}yuan Yang and
                  Zhi Ma and
                  Xin Lu and
                  Hong{-}Xin Li},
  title        = {Quantum Secure Direct Communication Based on Partially Entangled States},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {11--14},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.76},
  doi          = {10.1109/IAS.2009.76},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YangMLL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YangSLHCT09,
  author       = {Shyue{-}Wen Yang and
                  Ming{-}Hwa Sheu and
                  Jun{-}Jie Lin and
                  Chuang{-}Chun Hu and
                  Tzu{-}Hsiung Chen and
                  Shau{-}Yin Tseng},
  title        = {Parallel 3-Pixel Labeling Method and its Hardware Architecture Design},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {185--188},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.74},
  doi          = {10.1109/IAS.2009.74},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YangSLHCT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YangTY09,
  author       = {Chung{-}Huang Yang and
                  Shih{-}Yi Tu and
                  Pei{-}Hua Yen},
  title        = {Implementation of an Electronic Voting System with Contactless {IC}
                  Cards for Small-Scale Voting},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {122--125},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.337},
  doi          = {10.1109/IAS.2009.337},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YangTY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YangWL09,
  author       = {Xiaoyuan Yang and
                  Shifeng Wang and
                  Jia Liu},
  title        = {Universal Steganalysis to Images with {WBMC} Model},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {627--630},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.259},
  doi          = {10.1109/IAS.2009.259},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YangWL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YangWZ09,
  author       = {Xiaoyuan Yang and
                  Xiang Wu and
                  Minqing Zhang},
  title        = {Audio Digital Signature Algorithm with Tamper Detection},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {15--18},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.258},
  doi          = {10.1109/IAS.2009.258},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YangWZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YeW09,
  author       = {Ping Ye and
                  Guirong Weng},
  title        = {Microarray Image Segmentation Using Region Growing Algorithm and Mathematical
                  Morphology},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {373--376},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.188},
  doi          = {10.1109/IAS.2009.188},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YeW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YehL09,
  author       = {Kuo{-}Hui Yeh and
                  Nai{-}Wei Lo},
  title        = {Improvement of an {EPC} Gen2 Compliant {RFID} Authentication Protocol},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {532--535},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.341},
  doi          = {10.1109/IAS.2009.341},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YehL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YinCZ09,
  author       = {Zhao{-}Xia Yin and
                  Chin{-}Chen Chang and
                  Yan{-}Ping Zhang},
  title        = {A High Embedding Efficiency Steganography Scheme for Wet Paper Codes},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {611--614},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.93},
  doi          = {10.1109/IAS.2009.93},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YinCZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YinG09,
  author       = {Lihua Yin and
                  Yunchuan Guo},
  title        = {Research on Quantitative Evaluation for Integrity},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {689--692},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.105},
  doi          = {10.1109/IAS.2009.105},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YinG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YingsongW09,
  author       = {Wang Yingsong and
                  Chen Wei},
  title        = {f8 Keystream Generator with {SMS4} as Core Algorithm},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {23--26},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.290},
  doi          = {10.1109/IAS.2009.290},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YingsongW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Yu09,
  author       = {Xuedou Yu},
  title        = {Research on Active Defence Technology with Host Intrusion Based on
                  K-Nearest Neighbor Algorithm of Kernel},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {411--414},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.255},
  doi          = {10.1109/IAS.2009.255},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Yu09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Yu09a,
  author       = {Yonghong Yu},
  title        = {Researches on Integrating Database Access Control and Privacy Protection},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {330--333},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.115},
  doi          = {10.1109/IAS.2009.115},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Yu09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Yu09b,
  author       = {Han Yu},
  title        = {Image De-noising Based on Nonlocal Diffusion Tensor},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {501--504},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.193},
  doi          = {10.1109/IAS.2009.193},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Yu09b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YuB09,
  author       = {Xin Yu and
                  Yu Bai},
  title        = {A Method for Accessing Trusted Services Based on Service-Oriented
                  Architecture},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {685--688},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.173},
  doi          = {10.1109/IAS.2009.173},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YuB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YuC09,
  author       = {Dingguo Yu and
                  Nan Chen},
  title        = {The Improving of {IKE} with {PSK} for Using in Mobile Computing Environments},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {331--334},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.117},
  doi          = {10.1109/IAS.2009.117},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YuC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YuW09,
  author       = {Xin Yu and
                  Yuping Wang},
  title        = {Secure Constructing Bluetooth Scatternet Based on {BTCP}},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {200--203},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.174},
  doi          = {10.1109/IAS.2009.174},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YuW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YuZZZ09,
  author       = {Yike Yu and
                  Xuefeng Zheng and
                  Mingde Zhang and
                  Qingguo Zhang},
  title        = {An Identity-Based Authentication Model for Mobile Agent},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {475--478},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.97},
  doi          = {10.1109/IAS.2009.97},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YuZZZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YuanZZ09,
  author       = {Xiao{-}Hong Yuan and
                  Zhaoda Zhu and
                  Gong Zhang},
  title        = {Low Bit Rate ROI-Based {SAR} Image Compression},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {563--567},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.179},
  doi          = {10.1109/IAS.2009.179},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YuanZZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YuanZZ09a,
  author       = {Xiao{-}Hong Yuan and
                  Zhaoda Zhu and
                  Gong Zhang},
  title        = {Multiresolution Target Detection in Wavelet Domain for {SAR} Imagery},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {609--613},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.178},
  doi          = {10.1109/IAS.2009.178},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YuanZZ09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YuhuiJ09,
  author       = {Wang Yuhui and
                  Dai Ju},
  title        = {Waveform Analysis Mathematic Based on Ultrasonic Displacement Measurement},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {27--29},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.50},
  doi          = {10.1109/IAS.2009.50},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YuhuiJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZainalSMS09,
  author       = {Anazida Zainal and
                  Den Fairol Samaon and
                  Mohd Aizaini Maarof and
                  Siti Mariyam Hj. Shamsuddin},
  title        = {Fuzzy c-Means Sub-Clustering with Re-sampling in Network Intrusion
                  Detection},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {683--686},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.333},
  doi          = {10.1109/IAS.2009.333},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZainalSMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZamaniMAZM09,
  author       = {Mazdak Zamani and
                  Azizah Bt Abdul Manaf and
                  Rabiah Bt Ahmad and
                  Akram M. Zeki and
                  Pritheega Magalingam},
  title        = {A Novel Approach for Audio Watermarking},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {83--86},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.22},
  doi          = {10.1109/IAS.2009.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZamaniMAZM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZangZJ09,
  author       = {Ming{-}Xiang Zang and
                  Na Zhang and
                  Jian{-}Guo Jiang},
  title        = {An Adaptive Digital Watermarking Algorithm Based on Balanced Multi-wavelet},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {243--246},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.287},
  doi          = {10.1109/IAS.2009.287},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZangZJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhanTPZWZ09,
  author       = {Yang Zhan and
                  Haibo Tian and
                  Qingqi Pei and
                  Yueyu Zhang and
                  Yumin Wang and
                  Weidong Zhang},
  title        = {A Deep Copy Protection Framework for Electronic Devices within Home},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {23--26},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.249},
  doi          = {10.1109/IAS.2009.249},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhanTPZWZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Zhang09,
  author       = {Gaoyu Zhang},
  title        = {Infrared Small Weak Target Detection via {HOSA}},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {431--434},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.182},
  doi          = {10.1109/IAS.2009.182},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Zhang09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhangC09,
  author       = {Damin Zhang and
                  Shaohong Cai},
  title        = {Dynamic Behavior of {SIS} Epidemic Model with Feedback on Regular
                  Lattic},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {556--559},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.65},
  doi          = {10.1109/IAS.2009.65},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhangC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhangC09a,
  author       = {Damin Zhang and
                  Shaohong Cai},
  title        = {Dynamic Behavior of {SIRS} Model with Feedback on Complex Networks},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {576--579},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.72},
  doi          = {10.1109/IAS.2009.72},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhangC09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhangFJ09,
  author       = {Zhenping Zhang and
                  Jitao Fang and
                  Runhuan Jing},
  title        = {Interactive Visualisation of 3D City Models Based on Adaptive Streaming
                  of 3D-GIS Data},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {417--420},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.129},
  doi          = {10.1109/IAS.2009.129},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhangFJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhangG09,
  author       = {Jianhong Zhang and
                  Qin Geng},
  title        = {Cryptoanalysis of Two Signcryption Schemes},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {65--68},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.101},
  doi          = {10.1109/IAS.2009.101},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhangG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhangLCM09,
  author       = {Fuqiang Zhang and
                  Junli Li and
                  Gang Chen and
                  Jiaju Man},
  title        = {Assessment of Color Video Quality with Singular Value Decomposition
                  of Complex Matrix},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {103--106},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.144},
  doi          = {10.1109/IAS.2009.144},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhangLCM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhangLL09,
  author       = {Zhenhua Zhang and
                  Wenhui Li and
                  Bo Li},
  title        = {An Improving Technique of Color Histogram in Segmentation-based Image
                  Retrieval},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {381--384},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.156},
  doi          = {10.1109/IAS.2009.156},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhangLL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhangLS09,
  author       = {Yue Zhang and
                  Jie Liu and
                  Bo Song},
  title        = {A New Algorithm for Outlier Detection Based on Offset},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {3--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.142},
  doi          = {10.1109/IAS.2009.142},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhangLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhangMWP09,
  author       = {Hongbin Zhang and
                  Jianfeng Ma and
                  Yinchuan Wang and
                  Qingqi Pei},
  title        = {An Active Defense Model and Framework of Insider Threats Detection
                  and Sense},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {258--261},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.315},
  doi          = {10.1109/IAS.2009.315},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhangMWP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhangPLPW09,
  author       = {Changle Zhang and
                  Hong Peng and
                  Xianzhong Long and
                  Zheng Pan and
                  Ying Wu},
  title        = {A Fragile Software Watermarking for Tamper-Proof},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {309--312},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.99},
  doi          = {10.1109/IAS.2009.99},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhangPLPW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhangS09,
  author       = {Xiaokang Zhang and
                  Jianmei Shuai},
  title        = {A New Feature Selection Method for Malcodes Detection},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {423--426},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.20},
  doi          = {10.1109/IAS.2009.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhangS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhangS09a,
  author       = {Dan Zhang and
                  Wentao Sui},
  title        = {Bearings Fault Diagnosis Based on the Optimal Impulse Response Wavelet},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {391--394},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.222},
  doi          = {10.1109/IAS.2009.222},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhangS09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhangWH09,
  author       = {Weidong Zhang and
                  Baocang Wang and
                  Yupu Hu},
  title        = {A New Knapsack Public-Key Cryptosystem},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {53--56},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.300},
  doi          = {10.1109/IAS.2009.300},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhangWH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhangWZ09,
  author       = {Lin Zhang and
                  Jianhua Wu and
                  Nanrun Zhou},
  title        = {Image Encryption with Discrete Fractional Cosine Transform and Chaos},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {61--64},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.89},
  doi          = {10.1109/IAS.2009.89},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhangWZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhangWZ09a,
  author       = {Ruichao Zhang and
                  Lianhai Wang and
                  Shuhui Zhang},
  title        = {Windows Memory Analysis Based on {KPCR}},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {677--680},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.103},
  doi          = {10.1109/IAS.2009.103},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhangWZ09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhangY09,
  author       = {Xiaoming Zhang and
                  Zhaoyang Yu},
  title        = {Cepstrum-Based Audio Watermarking Algorithm against the {A/D} and
                  {D/A} Attacks},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {740--743},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.118},
  doi          = {10.1109/IAS.2009.118},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhangY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhangZ09,
  author       = {Wenjuan Zhang and
                  Weibin Zhang},
  title        = {A New Image Restoration Algorithm Based on Variational Derivative},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {241--244},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.8},
  doi          = {10.1109/IAS.2009.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhangZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhangZ09a,
  author       = {Weibin Zhang and
                  Wenjuan Zhang},
  title        = {A Variational Model Combining Curvelet Shrinkage and Nonlinear Anisotropic
                  Diffusion for Image Denoising},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {497--500},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.155},
  doi          = {10.1109/IAS.2009.155},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhangZ09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhangZL09,
  author       = {Qing{-}hua Zhang and
                  Han Zhang and
                  Zhao{-}hui Li},
  title        = {One-way Hash Function Construction Based on Conservative Chaotic Systems},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {402--405},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.209},
  doi          = {10.1109/IAS.2009.209},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhangZL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhangZLP09,
  author       = {Yu Zhang and
                  Xingshe Zhou and
                  Yee Wei Law and
                  Marimuthu Palaniswami},
  title        = {Insider DoS Attacks on Epidemic Propagation Strategies of Network
                  Reprogramming in Wireless Sensor Networks},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {263--266},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.215},
  doi          = {10.1109/IAS.2009.215},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhangZLP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhangZW09,
  author       = {Shaomin Zhang and
                  Xiayan Zhang and
                  Baoyi Wang},
  title        = {History and Future Information Based Trust Model in {C2C} E-commerce},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {491--494},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.286},
  doi          = {10.1109/IAS.2009.286},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhangZW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhangZW09a,
  author       = {Shaomin Zhang and
                  Haiyan Zhang and
                  Baoyi Wang},
  title        = {Study on Centralized Authorization Model Supporting Multiple Access
                  Control Models},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {769--772},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.277},
  doi          = {10.1109/IAS.2009.277},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhangZW09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhangZYLZ09,
  author       = {Mingde Zhang and
                  Xuefeng Zheng and
                  Wensheng Yang and
                  Shuwang Lv and
                  Qingguo Zhang},
  title        = {Research on Model of Trust Degrees for {PKI}},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {647--650},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.197},
  doi          = {10.1109/IAS.2009.197},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhangZYLZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhangZZ09,
  author       = {Yang Zhang and
                  Jingjun Zhang and
                  Dongwen Zhang},
  title        = {Implementing and Testing Producer-Consumer Problem Using Aspect-Oriented
                  Programming},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {749--752},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.41},
  doi          = {10.1109/IAS.2009.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhangZZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhaoH09,
  author       = {Jianwen Zhao and
                  Yuanbin Hou},
  title        = {An Identification Method for Transient Capacitive Current of Distribution
                  Network by {ICMAC}},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {315--318},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.227},
  doi          = {10.1109/IAS.2009.227},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhaoH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhaoLH09,
  author       = {Xin Zhao and
                  Yuqin Lv and
                  Wenxin He},
  title        = {A Novel Micropayment Scheme with Complete Anonymity},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {638--642},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.314},
  doi          = {10.1109/IAS.2009.314},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhaoLH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhengGQ09,
  author       = {Lin Zheng and
                  Wei Ge and
                  Hongbing Qiu},
  title        = {Performance Analysis of Analog {LMS} Multiuser Receiver in Transmitted-Reference
                  {UWB} System},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {479--482},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.195},
  doi          = {10.1109/IAS.2009.195},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhengGQ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhengJL09,
  author       = {Shuliang Zheng and
                  Doingxing Jiang and
                  Qixin Liu},
  title        = {A Role and Activity Based Access Control Model for University Identity
                  and Access Management System},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {487--490},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.43},
  doi          = {10.1109/IAS.2009.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhengJL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhengZZ09,
  author       = {Jing Zheng and
                  QiGui Zhang and
                  Xuemei Zhang},
  title        = {Lossy Compression of {CFA} Image Based on Multiwavelet Packet},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {223--226},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.355},
  doi          = {10.1109/IAS.2009.355},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhengZZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhongLZL09,
  author       = {Shangping Zhong and
                  Xiangwen Liao and
                  Xue Zhang and
                  Jingqu Lin},
  title        = {A Novel Distributed Single Sign-On Scheme with Dynamically Changed
                  Threshold Value},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {563--566},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.194},
  doi          = {10.1109/IAS.2009.194},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhongLZL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhongyingJ09,
  author       = {Bai Zhongying and
                  Qin Jiancheng},
  title        = {Webpage Encryption Based on Polymorphic Javascript Algorithm},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {327--330},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.39},
  doi          = {10.1109/IAS.2009.39},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhongyingJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhouDHMC09,
  author       = {Jing Zhou and
                  Guanzhong Dai and
                  De{-}Quan He and
                  Jun Ma and
                  Xiao{-}Yan Cai},
  title        = {Swarm Intelligence: Ant-Based Robot Path Planning},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {459--463},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.120},
  doi          = {10.1109/IAS.2009.120},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhouDHMC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Zhu09,
  author       = {Jianming Zhu},
  title        = {A New Scheme to Privacy-Preserving Collaborative Data Mining},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {468--471},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.133},
  doi          = {10.1109/IAS.2009.133},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Zhu09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhuGL09,
  author       = {Youchan Zhu and
                  Xueying Guo and
                  Jing Li},
  title        = {An Improved Genetic Algorithm for Power Grid},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {455--458},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.86},
  doi          = {10.1109/IAS.2009.86},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhuGL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhuSF09,
  author       = {Lina Zhu and
                  Chao{-}yi Sun and
                  Li Feng},
  title        = {Research on Early Warning for Worm Propagation Based on Area-Alert-Level},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {163--166},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.137},
  doi          = {10.1109/IAS.2009.137},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhuSF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhuYW09,
  author       = {Xiaoyan Zhu and
                  Hao Yue and
                  Yumin Wang},
  title        = {C and {M:} {A} New Network Coding Scheme for Wireless Networks},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {432--436},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.30},
  doi          = {10.1109/IAS.2009.30},
  timestamp    = {Tue, 12 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhuYW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/liY09,
  author       = {Li Li and
                  Han Yu},
  title        = {Nonlocal Curvature-Driven Diffusion Model for Image Inpainting},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {513--516},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.141},
  doi          = {10.1109/IAS.2009.141},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/liY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEias/2009,
  title        = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5282963/proceeding},
  isbn         = {978-0-7695-3744-3},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics