default search action
Search dblp for Publications
export results for "toc:db/conf/cis/cis2005-2.bht:"
@inproceedings{DBLP:conf/cis/ArnesSHBMK05, author = {Andr{\'{e}} {\AA}rnes and Karin Sallhammar and Kjetil Haslum and T{\o}nnes Brekne and Marie Elisabeth Gaup Moe and Svein J. Knapskog}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Real-Time Risk Assessment with Network Sensors and Intrusion Detection Systems}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {388--397}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_57}, doi = {10.1007/11596981\_57}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ArnesSHBMK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/BaeKKPS05, author = {Duhyun Bae and Gwanyeon Kim and Jiho Kim and Sehyun Park and Ohyoung Song}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Design and Implementation of Efficient Cipher Engine for {IEEE} 802.11i Compatible with {IEEE} 802.11n and {IEEE} 802.11e}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {439--444}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_64}, doi = {10.1007/11596981\_64}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/BaeKKPS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/BaekJHH05, author = {Kyunghwan Baek and Heejun Jang and Youngjun Han and Hernsoo Hahn}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Efficient Small Face Detection in Surveillance Images Using Major Color Component and {LDA} Scheme}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {285--290}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_42}, doi = {10.1007/11596981\_42}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/BaekJHH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/BaiMYYZ05, author = {Ji Bai and Lizhuang Ma and Li Yao and Tingting Yao and Ying Zhang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Removing of Metal Highlight Spots Based on Total Variation Inpainting with Multi-sources-flashing}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {826--831}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_120}, doi = {10.1007/11596981\_120}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/BaiMYYZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ByunLL05, author = {Jin Wook Byun and Dong Hoon Lee and Jongin Lim}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Password-Based Group Key Exchange Secure Against Insider Guessing Attacks}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {143--148}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_21}, doi = {10.1007/11596981\_21}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ByunLL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/CaoCL05, author = {Lei Cao and Jian Cao and Minglu Li}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Genetic Algorithm Utilized in Cost-Reduction Driven Web Service Selection}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {679--686}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_100}, doi = {10.1007/11596981\_100}, timestamp = {Sun, 28 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/CaoCL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/CaoCW05, author = {Wenming Cao and Wanfang Chai and Shoujue Wang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Channel Equalization Based on Two Weights Neural Network}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {1068--1073}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_159}, doi = {10.1007/11596981\_159}, timestamp = {Tue, 26 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/CaoCW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/CaoLW05, author = {Wenming Cao and Jianqing Li and Shoujue Wang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Continuous Speech Research Based on HyperSausage Neuron}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {1110--1115}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_166}, doi = {10.1007/11596981\_166}, timestamp = {Tue, 26 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/CaoLW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/CaoLX05, author = {Tianjie Cao and Dongdai Lin and Rui Xue}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Universal Designated-Verifier Proxy Blind Signatures for E-Commerce}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {1036--1041}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_154}, doi = {10.1007/11596981\_154}, timestamp = {Thu, 02 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/CaoLX05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ChaeDJ05, author = {Kyu{-}Yeol Chae and Won{-}Pyo Dong and Chang{-}Sung Jeong}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {{SUSAN} Window Based Cost Calculation for Fast Stereo Matching}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {947--952}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_140}, doi = {10.1007/11596981\_140}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ChaeDJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ChangL05, author = {Chin{-}Chen Chang and Jung{-}San Lee}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Improvement on an Optimized Protocol for Mobile Network Authentication and Security}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {538--541}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_79}, doi = {10.1007/11596981\_79}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ChangL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ChangLY05, author = {Chin{-}Chen Chang and Chia{-}Chen Lin and Jun{-}Bin Yeh}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Adaptive Hiding Scheme Based on VQ-Indices Using Commutable Codewords}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {567--572}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_84}, doi = {10.1007/11596981\_84}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ChangLY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ChenZL05, author = {Xiaofeng Chen and Fangguo Zhang and Shengli Liu}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {ID-Based Restrictive Partially Blind Signatures}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {117--124}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_17}, doi = {10.1007/11596981\_17}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ChenZL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ChoCKC05, author = {Seongje Cho and Hyeyoung Chang and HongGeun Kim and WoongChul Choi}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {\emph{SoIDPS}: Sensor Objects-Based Intrusion Detection and Prevention System and Its Implementation}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {260--266}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_38}, doi = {10.1007/11596981\_38}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ChoCKC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ChoiKKCK05, author = {Yoo{-}Joo Choi and Jeong{-}Sik Kim and Min{-}Jeong Kim and Soo{-}Mi Choi and Myoung{-}Hee Kim}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Metabolic Visualization and Intelligent Shape Analysis of the Hippocampus}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {1140--1148}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_171}, doi = {10.1007/11596981\_171}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ChoiKKCK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ChoiKLK05, author = {Won{-}Hyuck Choi and Doo{-}Hyun Kim and Kwang{-}Jae Lee and Jung{-}Sun Kim}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {The Study of {RED} Algorithm Used Multicast Router Based Buffer Management}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {669--678}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_99}, doi = {10.1007/11596981\_99}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ChoiKLK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/CuiF05, author = {Shuning Cui and Boqin Feng}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A Fuzzy Integral Method to Merge Search Engine Results on Web}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {731--736}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_107}, doi = {10.1007/11596981\_107}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/CuiF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/DagdelenBK05, author = {Ulvi Dagdelen and Aytekin Bagis and Dervis Karaboga}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {An Efficient Control Method for Elevator Group Control System}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {1042--1047}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_155}, doi = {10.1007/11596981\_155}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/DagdelenBK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/DingDX05, author = {Guiguang Ding and Qionghai Dai and Wenli Xu}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Motion-Compensated 3D Wavelet Video Coding Based on Adaptive Temporal Lifting Filter Implementation}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {863--868}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_126}, doi = {10.1007/11596981\_126}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/DingDX05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/DohOP05, author = {Kyu B. Doh and Jungho Ohn and Ting{-}C. Poon}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Image Recognition for Security Verification Using Real-Time Joint Transform Correlation with Scanning Technique}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {780--787}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_114}, doi = {10.1007/11596981\_114}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/DohOP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/DongSY05, author = {Ping Dong and Xiangdong Shi and Jiehui Yang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Design of a New Kind of Encryption Kernel Based on {RSA} Algorithm}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {27--32}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_4}, doi = {10.1007/11596981\_4}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/DongSY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/DongZH05, author = {Lihua Dong and Yong Zeng and Yupu Hu}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Stability of the Linear Complexity of the Generalized Self-shrinking Sequences}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {68--73}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_10}, doi = {10.1007/11596981\_10}, timestamp = {Mon, 31 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/DongZH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/DuanCZ05, author = {Shanshan Duan and Zhenfu Cao and Yuan Zhou}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Secure Delegation-by-Warrant ID-Based Proxy Signcryption Scheme}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {445--450}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_65}, doi = {10.1007/11596981\_65}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/DuanCZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/FanCZ05, author = {Wenbing Fan and Jing Chen and Jina Zhen}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {{SPIHT} Algorithm Based on Fast Lifting Wavelet Transform in Image Compression}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {838--844}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_122}, doi = {10.1007/11596981\_122}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/FanCZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/FengY05, author = {Xiang{-}Chu Feng and Yongdong Yang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A New Watermarking Method Based on {DWT}}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {1122--1126}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_168}, doi = {10.1007/11596981\_168}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/FengY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/FengYHZD05, author = {Zhilin Feng and Jianwei Yin and Zhaoyang He and Wuheng Zuo and Jinxiang Dong}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {New Approach for Segmentation and Pattern Recognition of Jacquard Images}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {965--970}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_143}, doi = {10.1007/11596981\_143}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/FengYHZD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/GorantlaS05, author = {M. Choudary Gorantla and Ashutosh Saxena}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {An Efficient Certificateless Signature Scheme}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {110--116}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_16}, doi = {10.1007/11596981\_16}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/GorantlaS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/GuZZ05, author = {Chunxiang Gu and Yuefei Zhu and YaJuan Zhang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {An ID-Based Optimistic Fair Signature Exchange Protocol from Pairings}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {9--16}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_2}, doi = {10.1007/11596981\_2}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/GuZZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HanY05, author = {Changcai Han and Dongfeng Yuan}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Variable-Rate Channel Coding for Space-Time Coded {MIMO} System}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {1116--1121}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_167}, doi = {10.1007/11596981\_167}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/HanY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HeHZZY05, author = {Hui He and Mingzeng Hu and Weizhe Zhang and Hongli Zhang and Zhi Yang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Topology-Based Macroscopical Response and Control Technology for Network Security Event}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {560--566}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_83}, doi = {10.1007/11596981\_83}, timestamp = {Thu, 09 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/HeHZZY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HongH05, author = {Sungjune Hong and Sunyoung Han}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {The Next Generation {PARLAY} {X} with QoS/QoE}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {737--742}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_108}, doi = {10.1007/11596981\_108}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/HongH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HouZZ05, author = {Yunshu Hou and Yanning Zhang and Rongchun Zhao}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Robust Object Tracking Based on Uncertainty Factorization Subspace Constraints Optical Flow}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {875--880}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_128}, doi = {10.1007/11596981\_128}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/HouZZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/House05, author = {Terry C. House}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Client Server Access: Wired vs. Wireless {LEO} Satellite-ATM Connectivity; {A} (MS-Ro-BAC) Experiment}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {719--724}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_105}, doi = {10.1007/11596981\_105}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/House05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HuangC05, author = {Hui{-}Feng Huang and Chin{-}Chen Chang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {554--559}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_82}, doi = {10.1007/11596981\_82}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/HuangC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HuangZX05, author = {Mei{-}juan Huang and Jianzhong Zhang and Shu{-}cui Xie}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A Secure and Efficient (\emph{t}, \emph{n}) Threshold Verifiable Multi-secret Sharing Scheme}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {532--537}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_78}, doi = {10.1007/11596981\_78}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/HuangZX05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HuiT05, author = {Hui Li and Ting Shen}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A Token-Based Single Sign-On Protocol}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {180--185}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_27}, doi = {10.1007/11596981\_27}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/HuiT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/JiangFYWYK05, author = {Gangyi Jiang and Liangzhong Fan and Mei Yu and Rangding Wang and Xien Ye and Yong{-}Deak Kim}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Fast Ray-Space Interpolation Based on Occlusion Analysis and Feature Points Detection}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {935--940}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_138}, doi = {10.1007/11596981\_138}, timestamp = {Sun, 11 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/JiangFYWYK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/JungR05, author = {Seung Wook Jung and Christoph Ruland}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Secure Software Smartcard Resilient to Capture}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {86--95}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_13}, doi = {10.1007/11596981\_13}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/JungR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/KajavaSV05, author = {Jorma Kajava and Reijo Savola and Rauno Varonen}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Weak Signals in Information Security Management}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {508--517}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_75}, doi = {10.1007/11596981\_75}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/KajavaSV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/KangS05, author = {Daniel Kang and Byeong{-}Seok Shin}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Efficient Point Rendering Method Using Sequential Level-of-Detail}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {1127--1133}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_169}, doi = {10.1007/11596981\_169}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/KangS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/KimCCJ05, author = {Hyun{-}Mi Kim and Ik{-}Hwan Cho and A{-}Young Cho and Dong{-}Seok Jeong}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Semi-fragile Watermarking Algorithm for Detection and Localization of Temper Using Hybrid Watermarking Method in {MPEG-2} Video}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {623--628}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_92}, doi = {10.1007/11596981\_92}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/KimCCJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/KimCKPL05, author = {Sosun Kim and Nam Su Chang and Chang Han Kim and Young{-}Ho Park and Jongin Lim}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A Fast Inversion Algorithm and Low-Complexity Architecture over \emph{GF}(2\({}^{\mbox{\emph{m}}}\))}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {1--8}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_1}, doi = {10.1007/11596981\_1}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/KimCKPL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/KimJB05, author = {Jinhyung Kim and Dongwon Jeong and Doo{-}Kwon Baik}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {An Algorithm for Automatic Inference of Referential Integrities During Translation from Relational Database to {XML} Schema}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {725--730}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_106}, doi = {10.1007/11596981\_106}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/KimJB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/KimJK05, author = {Seong{-}Woo Kim and Young{-}Chul Jung and Young{-}Tak Kim}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A Design of Platform for QoS-Guaranteed Multimedia Services Provisioning on IP-Based Convergence Network}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {743--748}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_109}, doi = {10.1007/11596981\_109}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/KimJK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/KimJLC05, author = {Shin{-}Hyoung Kim and Jong{-}Whan Jang and Seung Phil Lee and Jae{-}Ho Choi}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Accurate Contouring Technique for Object Boundary Extraction in Stereoscopic Imageries}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {869--874}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_127}, doi = {10.1007/11596981\_127}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/KimJLC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/KimLKCC05, author = {Howon Kim and Mun{-}Kyu Lee and Dong Kyue Kim and Sang{-}Kyoon Chung and Kyoil Chung}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Design and Implementation of Crypto Co-processor and Its Application to Security Systems}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {1104--1109}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_165}, doi = {10.1007/11596981\_165}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/KimLKCC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/KimS05, author = {Seong{-}Whan Kim and HyunSung Sung}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {An Improvement of Auto-correlation Based Video Watermarking Scheme Using Independent Component Analysis}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {643--648}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_95}, doi = {10.1007/11596981\_95}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/KimS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/KimSJC05, author = {Jangbok Kim and Jaehong Shim and Gihyun Jung and Kyunghee Choi}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Reducing Worm Detection Time and False Alarm in Virus Throttling}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {297--302}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_44}, doi = {10.1007/11596981\_44}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/KimSJC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/KoJKLE05, author = {Kwangsun Ko and Insook Jang and Yong{-}hyeog Kang and JinSeok Lee and Young Ik Eom}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Characteristic Classification and Correlation Analysis of Source-Level Vulnerabilities in the Linux Kernel}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {1149--1156}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_172}, doi = {10.1007/11596981\_172}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/KoJKLE05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/KooJ05, author = {Han{-}Suh Koo and Chang{-}Sung Jeong}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Modified {EZW} Coding for Stereo Residual}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {845--850}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_123}, doi = {10.1007/11596981\_123}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/KooJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/KraipeerapunFB05, author = {Pawalai Kraipeerapun and Chun Che Fung and Warick Brown}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Assessment of Uncertainty in Mineral Prospectivity Prediction Using Interval Neutrosophic Set}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {1074--1079}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_160}, doi = {10.1007/11596981\_160}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/KraipeerapunFB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/KwonLKJK05, author = {Goo{-}Rak Kwon and Tea{-}Young Lee and Kyoung{-}Ho Kim and Jae{-}Do Jin and Sung{-}Jea Ko}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Multimedia Digital Right Management Using Selective Scrambling for Mobile Handset}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {1098--1103}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_164}, doi = {10.1007/11596981\_164}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/KwonLKJK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/Lee05, author = {Kyoung{-}Mi Lee}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Component-Based Online Learning for Face Detection and Verification}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {832--837}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_121}, doi = {10.1007/11596981\_121}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/Lee05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LeeCCC05, author = {Seungwon Lee and Seongje Cho and Jongmoo Choi and Yookun Cho}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Batch Verification with DSA-Type Digital Signatures for Ubiquitous Computing}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {125--130}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_18}, doi = {10.1007/11596981\_18}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/LeeCCC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LeeD05, author = {Yoon Cheol Lee and Hiroshi Doi}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {On the Security of Condorcet Electronic Voting Scheme}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {33--42}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_5}, doi = {10.1007/11596981\_5}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/LeeD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LeeK05a, author = {Byungil Lee and Howon Kim}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Enhanced Security and Privacy Mechanism of {RFID} Service for Pervasive Mobile Device}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {469--475}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_69}, doi = {10.1007/11596981\_69}, timestamp = {Thu, 02 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LeeK05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LeeLK05, author = {Tai Sik Lee and Dong Wook Lee and Jeong Hyun Kim}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Introduction of Knowledge Management System for Technical Support in Construction Industries}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {749--756}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_110}, doi = {10.1007/11596981\_110}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/LeeLK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LeiJW05, author = {Qiang Lei and Zhengtao Jiang and Yumin Wang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Ring-Based Anonymous Fingerprinting Scheme}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {1080--1085}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_161}, doi = {10.1007/11596981\_161}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/LeiJW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiC05, author = {Yajing Li and Weihong Chen}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {On the Construction of Some Optimal Polynomial Codes}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {74--79}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_11}, doi = {10.1007/11596981\_11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/LiC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiCP05, author = {Hui{-}Xian Li and Chun{-}Tian Cheng and Liao{-}Jun Pang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A New (\emph{t}, \emph{n})-Threshold Multi-secret Sharing Scheme}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {421--426}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_61}, doi = {10.1007/11596981\_61}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/LiCP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiHLY05, author = {Kenli Li and Yan He and Renfa Li and Tao Yang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A Scheduling Algorithm Based on a Trust Mechanism in Grid}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {463--468}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_68}, doi = {10.1007/11596981\_68}, timestamp = {Thu, 15 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/LiHLY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiJFZC05, author = {Jingtao Li and Yinan Jing and Peng Fu and Gendu Zhang and Yongqiang Chen}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A Similarity-Based Recommendation Filtering Algorithm for Establishing Reputation-Based Trust in Peer-to-Peer Electronic Communities}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {1017--1024}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_151}, doi = {10.1007/11596981\_151}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/LiJFZC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiLLL05, author = {Zhanchun Li and Zhitang Li and Yao Li and Bin Liu}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Masquerade Detection System Based on Principal Component Analysis and Radial Basics Function}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {309--314}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_46}, doi = {10.1007/11596981\_46}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/LiLLL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiMH05, author = {Fuhai Li and Jinwen Ma and Dezhi Huang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {{MFCC} and {SVM} Based Recognition of Chinese Vowels}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {812--819}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_118}, doi = {10.1007/11596981\_118}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/LiMH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiMM05, author = {Xinghua Li and Jianfeng Ma and Sang{-}Jae Moon}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {On the Security of the Canetti-Krawczyk Model}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {356--363}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_53}, doi = {10.1007/11596981\_53}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiMM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiTW05, author = {Lingjuan Li and Wenyu Tang and Ruchuan Wang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A {CBR} Engine Adapting to {IDS}}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {334--339}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_50}, doi = {10.1007/11596981\_50}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiTW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiXZL05, author = {Qian{-}Mu Li and Man{-}Wu Xu and Hong Zhang and Fengyu Liu}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Neural Network Based Flow Forecast and Diagnosis}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {542--547}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_80}, doi = {10.1007/11596981\_80}, timestamp = {Mon, 19 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/LiXZL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiY05, author = {Bicheng Li and Hujun Yin}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Face Recognition Based on Support Vector Machine Fusion and Wavelet Transform}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {764--771}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_112}, doi = {10.1007/11596981\_112}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/LiY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiZ05, author = {Ming Li and Wei Zhao}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {267--272}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_39}, doi = {10.1007/11596981\_39}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/LiZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiangWH05, author = {Xiaoping Liang and Xiaoyun Wu and Jiwu Huang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Reversible Data Hiding for Image Based on Histogram Modification of Wavelet Coefficients}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {573--580}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_85}, doi = {10.1007/11596981\_85}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/LiangWH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiaoHH05, author = {Z. W. Liao and S. X. Hu and T. Z. Huang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Line Segments and Dominate Points Detection Based on Hough Transform}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {917--922}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_135}, doi = {10.1007/11596981\_135}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/LiaoHH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiaoQHR05, author = {Jian Liao and Yinghao Qi and Peiwei Huang and Mentian Rong}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Pairing-Based Provable Blind Signature Scheme Without Random Oracles}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {161--166}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_24}, doi = {10.1007/11596981\_24}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/LiaoQHR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LimKK05, author = {Chan Lim and Hyun Soo Kang and TaeYong Kim}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Fast Motion Estimation Scheme for Real Time Multimedia Streaming with {H.264}}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {857--862}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_125}, doi = {10.1007/11596981\_125}, timestamp = {Thu, 19 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/LimKK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LinWL05, author = {Mengquan Lin and Qiangmin Wang and Jianhua Li}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Methodology of Quantitative Risk Assessment for Information System Security}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {526--531}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_77}, doi = {10.1007/11596981\_77}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/LinWL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LinXZ05, author = {Xuegang Lin and Rongsheng Xu and Miaoliang Zhu}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Survivability Computation of Networked Information Systems}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {407--414}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_59}, doi = {10.1007/11596981\_59}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/LinXZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiuC05, author = {Weiping Liu and Wandong Cai}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Study on Security iSCSI Based on {SSH}}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {457--462}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_67}, doi = {10.1007/11596981\_67}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/LiuC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiuCW05, author = {Jingmei Liu and Xiangguo Cheng and Xinmei Wang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Cryptanalysis of a Cellular Automata Cryptosystem}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {49--54}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_7}, doi = {10.1007/11596981\_7}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/LiuCW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiuDWL05, author = {Wu Liu and Hai{-}Xin Duan and Jianping Wu and Xing Li}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {{PDTM:} {A} Policy-Driven Trust Management Framework in Distributed Systems}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {518--525}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_76}, doi = {10.1007/11596981\_76}, timestamp = {Thu, 25 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiuDWL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiuF05, author = {Zaiqiang Liu and Dengguo Feng}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Incremental Fuzzy Decision Tree-Based Network Forensic System}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {995--1002}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_148}, doi = {10.1007/11596981\_148}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/LiuF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiuLL05, author = {Bin Liu and Zhitang Li and Zhanchun Li}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {An Image Hiding Algorithm Based on Bit Plane}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {611--616}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_90}, doi = {10.1007/11596981\_90}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/LiuLL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiuW05a, author = {Qin Liu and Chanle Wu}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A Frame for Selecting Replicated Multicast Servers Using Genetic Algorithm}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {695--702}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_102}, doi = {10.1007/11596981\_102}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/LiuW05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LuPB05, author = {Zhe{-}Ming Lu and Hui Pei and Hans Burkhardt}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A Spatial/Frequency Hybrid Vector Quantizer Based on a Classification in the {DCT} Domain}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {820--825}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_119}, doi = {10.1007/11596981\_119}, timestamp = {Wed, 10 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/LuPB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LuoZWP05, author = {Xiaohua Luo and Kougen Zheng and Zhaohui Wu and Yunhe Pan}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {MacroOS: {A} Pervasive Computing Platform Supporting Context Awareness and Context Management}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {687--694}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_101}, doi = {10.1007/11596981\_101}, timestamp = {Wed, 25 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/LuoZWP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/Lv05, author = {Kewei Lv}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Revised Fischlin's (Blind) Signature Schemes}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {96--103}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_14}, doi = {10.1007/11596981\_14}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/Lv05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LvY05, author = {Xixiang Lv and Bo Yang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Broadcast Encryption Using Identity-Based Public-Key Cryptosystem}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {1092--1097}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_163}, doi = {10.1007/11596981\_163}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/LvY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LvYCL05, author = {Shaohe Lv and Jianping Yin and Zhiping Cai and Chi Liu}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {On a Novel Methodology for Estimating Available Bandwidth Along Network Paths}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {703--710}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_103}, doi = {10.1007/11596981\_103}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/LvYCL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/MaLS05, author = {Long Ma and Changjun Li and Shuni Song}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A Spectral Images Digital Watermarking Algorithm}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {655--660}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_97}, doi = {10.1007/11596981\_97}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/MaLS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/MaYW05, author = {Linru Ma and Lin Yang and Jianxin Wang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Attack Scenario Construction Based on Rule and Fuzzy Clustering}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {328--333}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_49}, doi = {10.1007/11596981\_49}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/MaYW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/MaikSP05, author = {Vivek Maik and Jeongho Shin and Joon Ki Paik}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Regularized Image Restoration by Means of Fusion for Digital Auto Focusing}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {929--934}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_137}, doi = {10.1007/11596981\_137}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/MaikSP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/MoonKJCMAK05, author = {Daesung Moon and Taehae Kim and Seunghwan Jung and Yongwha Chung and Kiyoung Moon and Dosung Ahn and Sang{-}Kyoon Kim}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Performance Evaluation of Watermarking Techniques for Secure Multimodal Biometric Systems}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {635--642}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_94}, doi = {10.1007/11596981\_94}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/MoonKJCMAK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/NaqviR05, author = {Syed Naqvi and Michel Riguidel}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Dynamic Access Control for Pervasive Grid Applications}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {348--355}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_52}, doi = {10.1007/11596981\_52}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/NaqviR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/OhigashiSM05, author = {Toshihiro Ohigashi and Yoshiaki Shiraishi and Masakatu Morii}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {{FMS} Attack-Resistant {WEP} Implementation Is Still Broken}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {17--26}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_3}, doi = {10.1007/11596981\_3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/OhigashiSM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/PangJL05, author = {Ying{-}Han Pang and Andrew Teoh Beng Jin and David Ngo Chek Ling}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Binarized Revocable Biometrics in Face Recognition}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {788--795}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_115}, doi = {10.1007/11596981\_115}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/PangJL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/PapapanagiotouKMG05, author = {Konstantinos Papapanagiotou and Emmanouel Kellinis and Giannis F. Marias and Panagiotis Georgiadis}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Alternatives for Multimedia Messaging System Steganography}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {589--596}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_87}, doi = {10.1007/11596981\_87}, timestamp = {Wed, 16 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/PapapanagiotouKMG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ParkCO05, author = {Kyu{-}Sik Park and Youn{-}Ho Cho and Sang{-}Hun Oh}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Automatic Classification of Korean Traditional Music Using Robust Multi-feature Clustering}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {1025--1029}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_152}, doi = {10.1007/11596981\_152}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ParkCO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ParkCY05, author = {Chang{-}Won Park and Sung Jin Choi and Hee Yong Youn}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A Noble Key Pre-distribution Scheme with {LU} Matrix for Secure Wireless Sensor Networks}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {494--499}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_73}, doi = {10.1007/11596981\_73}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ParkCY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ParkK05, author = {Sang{-}ho Park and Taekyoung Kwon}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {An Efficient Message Broadcast Authentication Scheme for Sensor Networks}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {427--432}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_62}, doi = {10.1007/11596981\_62}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ParkK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ParkKSK05, author = {Young{-}Ran Park and Hyun{-}Ho Kang and Sang{-}Uk Shin and Ki{-}Ryong Kwon}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {An Image Steganography Using Pixel Characteristics}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {581--588}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_86}, doi = {10.1007/11596981\_86}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ParkKSK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/PengL05, author = {Changgen Peng and Xiang Li}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {An Identity-Based Threshold Signcryption Scheme with Semantic Security}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {173--179}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_26}, doi = {10.1007/11596981\_26}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/PengL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/PotdarWC05, author = {Vidyasagar M. Potdar and Chen Wu and Elizabeth Chang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Tamper Detection for Ubiquitous RFID-Enabled Supply Chain}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {273--278}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_40}, doi = {10.1007/11596981\_40}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/PotdarWC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/PuhanH05, author = {Niladri B. Puhan and Anthony T. S. Ho}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Restoration in Secure Text Document Image Authentication Using Erasable Watermarks}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {661--668}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_98}, doi = {10.1007/11596981\_98}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/PuhanH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/PurevjiiAIKP05, author = {Bat{-}Odon Purevjii and Masayoshi Aritsugi and Sayaka Imai and Yoshinari Kanamori and Cherri M. Pancake}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Protecting Personal Data with Various Granularities: {A} Logic-Based Access Control Approach}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {548--553}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_81}, doi = {10.1007/11596981\_81}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/PurevjiiAIKP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/RongGSZ05, author = {Xiaofeng Rong and Xiaojuan Gao and Ruidan Su and Lihua Zhou}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Design and Implementation of a Parallel Crypto Server}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {398--406}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_58}, doi = {10.1007/11596981\_58}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/RongGSZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/SachidanandaGV05, author = {Saraswathi Sachidananda and Srividya Gopalan and Sridhar Varadarajan}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Hardware-Software Hybrid Packet Processing for Intrusion Detection Systems}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {236--243}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_35}, doi = {10.1007/11596981\_35}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/SachidanandaGV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/SeoC05, author = {Hee Suk Seo and Tae Ho Cho}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Application of Fuzzy Logic for Distributed Intrusion Detection}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {340--347}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_51}, doi = {10.1007/11596981\_51}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/SeoC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/SeoYKCLK05, author = {Seong Chae Seo and Jin Ho You and Young Dae Kim and Jun Yong Choi and Sang Jun Lee and Byung Ki Kim}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Building Security Requirements Using State Transition Diagram at Security Threat Location}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {451--456}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_66}, doi = {10.1007/11596981\_66}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/SeoYKCLK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/SeolK05, author = {Jae{-}Min Seol and Seong{-}Whan Kim}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Scalable and Robust Fingerprinting Scheme Using Statistically Secure Extension of Anti-collusion Code}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {1086--1091}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_162}, doi = {10.1007/11596981\_162}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/SeolK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ShenQSL05, author = {Jianjun Shen and Sihan Qing and Qingni Shen and Liping Li}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Covert Channel Identification Founded on Information Flow Analysis}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {381--387}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_56}, doi = {10.1007/11596981\_56}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ShenQSL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ShiY05, author = {Yi Shi and Xinyu Yang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A Novel Architecture for Detecting and Defending Against Flooding-Based DDoS Attacks}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {364--374}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_54}, doi = {10.1007/11596981\_54}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ShiY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/SkinnerHC05, author = {Geoff Skinner and Song Han and Elizabeth Chang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A New Conceptual Framework Within Information Privacy: Meta Privacy}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {55--61}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_8}, doi = {10.1007/11596981\_8}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/SkinnerHC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/SongLK05, author = {Il{-}Seop Song and Youngseok Lee and Taeck{-}Geun Kwon}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A Multi-gigabit Virus Detection Algorithm Using Ternary {CAM}}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {220--227}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_33}, doi = {10.1007/11596981\_33}, timestamp = {Sun, 19 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/SongLK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/SukLL05, author = {Jung{-}Youp Suk and Gun Woo Lee and Kuhn{-}Il Lee}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {New Electronic Digital Image Stabilization Algorithm in Wavelet Transform Domain}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {911--916}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_134}, doi = {10.1007/11596981\_134}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/SukLL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/SunZSC05, author = {Xiaojuan Sun and Xinliang Zhou and Ninghui Sun and Mingyu Chen}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Parallel Optimization Technology for Backbone Network Intrusion Detection System}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {322--327}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_48}, doi = {10.1007/11596981\_48}, timestamp = {Mon, 11 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/SunZSC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/Tang05, author = {Shaohua Tang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Simple Threshold {RSA} Signature Scheme Based on Simple Secret Sharing}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {186--191}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_28}, doi = {10.1007/11596981\_28}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/Tang05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/TangM05, author = {Qiang Tang and Chris J. Mitchell}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {On the Security of Some Password-Based Key Agreement Schemes}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {149--154}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_22}, doi = {10.1007/11596981\_22}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/TangM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/TangM05a, author = {Qiang Tang and Chris J. Mitchell}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Efficient Compilers for Authenticated Group Key Exchange}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {192--197}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_29}, doi = {10.1007/11596981\_29}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/TangM05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/TianSW05, author = {Haibo Tian and Xi Sun and Yumin Wang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A Virtual Bridge Certificate Authority Model}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {500--507}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_74}, doi = {10.1007/11596981\_74}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/TianSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/TianZD05, author = {Junfeng Tian and Weidong Zhao and Ruizhong Du}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {{D-S} Evidence Theory and Its Data Fusion Application in Intrusion Detection}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {244--251}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_36}, doi = {10.1007/11596981\_36}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/TianZD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/TikkanenV05, author = {Antti Tikkanen and Teemupekka Virtanen}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Early Warning for Network Worms}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {1054--1059}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_157}, doi = {10.1007/11596981\_157}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/TikkanenV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/TrietD05, author = {Minh{-}Triet Tran and Anh Duc Duong}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Applying the {AES} and Its Extended Versions in a General Framework for Hiding Information in Digital Images}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {605--610}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_89}, doi = {10.1007/11596981\_89}, timestamp = {Mon, 16 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/TrietD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WaizumiKKN05, author = {Yuji Waizumi and Daisuke Kudo and Nei Kato and Yoshiaki Nemoto}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A New Network Anomaly Detection Technique Based on Per-Flow and Per-Service Statistics}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {252--259}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_37}, doi = {10.1007/11596981\_37}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/WaizumiKKN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WanCY05, author = {Shuai Wan and Yilin Chang and Fuzheng Yang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Error Concealment for Video Transmission Based on Watermarking}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {597--604}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_88}, doi = {10.1007/11596981\_88}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/WanCY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/Wang05, author = {Weixing Wang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Image Classification and Delineation of Fragments}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {887--892}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_130}, doi = {10.1007/11596981\_130}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/Wang05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangC05, author = {Qin Wang and Zhenfu Cao}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Efficient ID-Based Proxy Signature and Proxy Signcryption Form Bilinear Pairings}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {167--172}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_25}, doi = {10.1007/11596981\_25}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/WangC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangCLQ05, author = {Lichen Wang and Zhenfu Cao and Xiangxue Li and Haifeng Qian}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Certificateless Threshold Signature Schemes}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {104--109}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_15}, doi = {10.1007/11596981\_15}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/WangCLQ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangFY05, author = {Ping Wang and Binxing Fang and Xiao{-}chun Yun}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A New User-Habit Based Approach for Early Warning of Worms}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {212--219}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_32}, doi = {10.1007/11596981\_32}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/WangFY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangH05, author = {Junping Wang and Yue Hao}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Short Critical Area Computational Method Using Mathematical Morphology}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {796--803}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_116}, doi = {10.1007/11596981\_116}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/WangH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangL05, author = {Changjie Wang and Ho{-}fung Leung}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A Private and Efficient Mobile Payment Protocol}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {1030--1035}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_153}, doi = {10.1007/11596981\_153}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/WangL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangLLY05, author = {Fasong Wang and Hongwei Li and Rui Li and Shaoquan Yu}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Non-parametric {ICA} Algorithm for Hybrid Sources Based on {GKNN} Estimation}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {941--946}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_139}, doi = {10.1007/11596981\_139}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangLLY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangLW05, author = {Dayin Wang and Dongdai Lin and Wenling Wu}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A Variant of Poly1305 {MAC} and Its Security Proof}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {375--380}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_55}, doi = {10.1007/11596981\_55}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/WangLW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangOTO05, author = {Lihua Wang and Takeshi Okamoto and Tsuyoshi Takagi and Eiji Okamoto}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {198--203}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_30}, doi = {10.1007/11596981\_30}, timestamp = {Thu, 16 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangOTO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangW05a, author = {Guoyou Wang and Wentao Wang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A Novel Wavelet Image Coding Based on Non-uniform Scalar Quantization}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {893--898}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_131}, doi = {10.1007/11596981\_131}, timestamp = {Tue, 28 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/WangW05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangZ05, author = {Xiangyang Wang and Hong Zhao}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A Blind Audio Watermarking Algorithm Robust Against Synchronization Attack}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {617--622}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_91}, doi = {10.1007/11596981\_91}, timestamp = {Thu, 02 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangZ05a, author = {Youqing Wang and Donghua Zhou}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Robust Reliable Control for a Class of Fuzzy Dynamic Systems with Time-Varying Delay}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {1003--1010}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_149}, doi = {10.1007/11596981\_149}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/WangZ05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangZS05, author = {Lei Wang and Beiji Zou and Jia{-}Guang Sun}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Facial Features Location by Analytic Boosted Cascade Detector}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {959--964}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_142}, doi = {10.1007/11596981\_142}, timestamp = {Tue, 28 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/WangZS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WeiW05, author = {Jinwu Wei and Jiangxing Wu}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Nonstationarity of Network Traffic Within Multi-scale Burstiness Constraint}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {971--976}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_144}, doi = {10.1007/11596981\_144}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/WeiW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WenWW05, author = {Fengtong Wen and Wenling Wu and Qiaoyan Wen}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Error Oracle Attacks on Several Modes of Operation}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {62--67}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_9}, doi = {10.1007/11596981\_9}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/WenWW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/XieSC05, author = {Xuemei Xie and Guangming Shi and Xuyang Chen}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Optimal Prototype Filters for Near-Perfect-Reconstruction Cosine-Modulated Filter Banks}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {851--856}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_124}, doi = {10.1007/11596981\_124}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/XieSC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/XuBZHS05, author = {Qing Xu and Shiqiang Bao and Rui Zhang and Ruijuan Hu and Mateu Sbert}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Adaptive Sampling for Monte Carlo Global Illumination Using Tsallis Entropy}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {989--994}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_147}, doi = {10.1007/11596981\_147}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/XuBZHS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/XuS05, author = {Yong Xu and Yuxiang Sun}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A New Group Rekeying Method in Secure Multicast}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {155--160}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_23}, doi = {10.1007/11596981\_23}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/XuS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/XuW05, author = {Benlian Xu and Zhiquan Wang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Bearings-Only Target Tracking Using Node Selection Based on an Accelerated Ant Colony Optimization}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {881--886}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_129}, doi = {10.1007/11596981\_129}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/XuW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/XuXX05, author = {Zhiliang Xu and Shengli Xie and Youjun Xiang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {An Efficient Adaptive De-blocking Algorithm}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {953--958}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_141}, doi = {10.1007/11596981\_141}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/XuXX05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/XuZA05, author = {Chen Xu and Weiqiang Zhang and Francis R. Austin}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A Digital Watermarking Technique Based on Wavelet Packages}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {649--654}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_96}, doi = {10.1007/11596981\_96}, timestamp = {Mon, 09 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/XuZA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/XuZZS05, author = {Qijian Xu and Naitong Zhang and Jie Zhang and Yu Sun}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Next Generation Military Communication Systems Architecture}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {1048--1053}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_156}, doi = {10.1007/11596981\_156}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/XuZZS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/Yan05, author = {Wei Yan}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Measuring the Histogram Feature Vector for Anomaly Network Traffic}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {279--284}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_41}, doi = {10.1007/11596981\_41}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/Yan05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YaoCPZC05, author = {Zhiqiang Yao and Liping Chen and Rihong Pan and Boxian Zou and Licong Chen}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Public Watermarking Scheme Based on Multiresolution Representation and Double Hilbert Scanning}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {629--634}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_93}, doi = {10.1007/11596981\_93}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/YaoCPZC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YeomP05a, author = {Ki{-}Won Yeom and Ji{-}Hyung Park}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {204--211}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_31}, doi = {10.1007/11596981\_31}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/YeomP05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YiIR05, author = {Hong Yan Yi and Beatriz de la Iglesia and Victor J. Rayward{-}Smith}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Using Concept Taxonomies for Effective Tree Induction}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {1011--1016}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_150}, doi = {10.1007/11596981\_150}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/YiIR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YinLG05, author = {Qian Yin and Yunlun Luo and Ping Guo}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Special Distribution of the Shortest Linear Recurring Sequences in \emph{Z} /(\emph{p}) Field}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {43--48}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_6}, doi = {10.1007/11596981\_6}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/YinLG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YouFYHZT05, author = {Xinhua You and Bin Fang and Xinge You and Zhenyu He and Dan Zhang and Yuan Yan Tang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Skeleton Representation of Character Based on Multiscale Approach}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {1060--1067}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_158}, doi = {10.1007/11596981\_158}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/YouFYHZT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YouSKCLK05, author = {Jin Ho You and Seong Chae Seo and Young Dae Kim and Jun Yong Choi and Sang Jun Lee and Byung Ki Kim}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Protection Against Format String Attacks by Binary Rewriting}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {303--308}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_45}, doi = {10.1007/11596981\_45}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/YouSKCLK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZengM05, author = {Yong Zeng and Jianfeng Ma}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Sampling Distance Analysis of Gigantic Data Mining for Intrusion Detection Systems}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {228--235}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_34}, doi = {10.1007/11596981\_34}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZengM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangC05, author = {Tongqi Zhang and Qingjiang Chen}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Construction of a Class of Compactly Supported Biorthogonal Multiple Vector-Valued Wavelets}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {1134--1139}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_170}, doi = {10.1007/11596981\_170}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ZhangC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangDLW05, author = {Hong Zhang and Hai{-}Xin Duan and Wu Liu and Jianping Wu}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {An Extensible {AAA} Infrastructure for IPv6}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {482--487}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_71}, doi = {10.1007/11596981\_71}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ZhangDLW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangFCY05, author = {Yongzheng Zhang and Binxing Fang and Yue Chi and Xiao{-}chun Yun}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Assessment of Windows System Security Using Vulnerability Relationship Graph}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {415--420}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_60}, doi = {10.1007/11596981\_60}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ZhangFCY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangJXYWB05, author = {Li Zhang and Shiming Ji and Yi Xie and Qiaoling Yuan and Yuehua Wan and Guanjun Bao}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Principle of Image Encrypting Algorithm Based on Magic Cube Transformation}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {977--982}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_145}, doi = {10.1007/11596981\_145}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ZhangJXYWB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangMM05, author = {Fan Zhang and Jianfeng Ma and Sang{-}Jae Moon}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {The Security Proof of a 4-Way Handshake Protocol in {IEEE} 802.11i}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {488--493}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_72}, doi = {10.1007/11596981\_72}, timestamp = {Tue, 23 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangMM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangP05, author = {Cheng Zhang and Qinke Peng}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Anomaly Detection Method Based on HMMs Using System Call and Call Stack Information}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {315--321}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_47}, doi = {10.1007/11596981\_47}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ZhangP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangWWM05, author = {Yunkai Zhang and Fangwei Wang and Changguang Wang and Jianfeng Ma}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Worm Propagation Modeling and Analysis on Network}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {476--481}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_70}, doi = {10.1007/11596981\_70}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ZhangWWM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangWY05, author = {Yuqing Zhang and Zhiling Wang and Bo Yang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {The Running-Mode Analysis of Two-Party Optimistic Fair Exchange Protocols}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {137--142}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_20}, doi = {10.1007/11596981\_20}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ZhangWY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangZ05, author = {Ling Zhang and Xianda Zhang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A Novel SVD-Based {RLS} Blind Adaptive Multiuser Detector for {CDMA} Systems}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {905--910}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_133}, doi = {10.1007/11596981\_133}, timestamp = {Sun, 05 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangZC05, author = {Fan Zhang and Xinhong Zhang and Zhiguo Chen}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Digital Image Authentication Based on Error-Correction Codes}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {433--438}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_63}, doi = {10.1007/11596981\_63}, timestamp = {Tue, 10 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ZhangZC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangZSX05, author = {Dongdong Zhang and Wenjun Zhang and Li Song and Hongkai Xiong}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A Study on Motion Prediction and Coding for In-Band Motion Compensated Temporal Filtering}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {983--988}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_146}, doi = {10.1007/11596981\_146}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ZhangZSX05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhaoLZ05, author = {Liyuan Zhao and Keqin Liu and Jun Zheng}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A New {AQM} Algorithm for Enhancing Internet Capability Against Unresponsive Flows}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {711--718}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_104}, doi = {10.1007/11596981\_104}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ZhaoLZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhengLZL05, author = {Jin Zheng and Bo Li and Bing Zhou and Wei Li}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Fast Motion Detection Based on Accumulative Optical Flow and Double Background Model}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {291--296}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_43}, doi = {10.1007/11596981\_43}, timestamp = {Thu, 28 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ZhengLZL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhengQ05, author = {Qiuhua Zheng and Yuntao Qian}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {An Event Correlation Approach Based on the Combination of {IHU} and Codebook}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {757--763}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_111}, doi = {10.1007/11596981\_111}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ZhengQ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhouHY05, author = {Yong Zhou and Xiaofeng Hu and Qingtai Ye}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A Robust Lane Detection Approach Based on {MAP} Estimate and Particle Swarm Optimization}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {804--811}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_117}, doi = {10.1007/11596981\_117}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ZhouHY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhouL05, author = {Sujing Zhou and Dongdai Lin}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {On Anonymity of Group Signatures}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {131--136}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_19}, doi = {10.1007/11596981\_19}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ZhouL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhouNLB05, author = {Bai{-}Tao Zhou and Won Nah and Kang Woong Lee and Joong{-}Hwan Baek}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A General Image Based Nematode Identification System Design}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {899--904}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_132}, doi = {10.1007/11596981\_132}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ZhouNLB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhouSB05, author = {Xuebing Zhou and Martin Schmucker and Christopher L. Brown}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Perceptual Hashing of Video Content Based on Differential Block Similarity}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {80--85}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_12}, doi = {10.1007/11596981\_12}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ZhouSB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhouSDML05, author = {Jun Zhou and Guangda Su and Yafeng Deng and Kai Meng and Congcong Li}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {A Dynamic Face and Fingerprint Fusion System for Identity Authentication}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {772--779}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_113}, doi = {10.1007/11596981\_113}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ZhouSDML05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhuangDZW05, author = {Jian Zhuang and Haifeng Du and Jinhua Zhang and Sunan Wang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {The Study of the Auto Color Image Segmentation}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {923--928}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_136}, doi = {10.1007/11596981\_136}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ZhuangDZW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cis/2005-2, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981}, doi = {10.1007/11596981}, isbn = {3-540-30819-9}, timestamp = {Tue, 23 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/2005-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.