- 2009
- Ajith Abraham, Crina Grosan
, Hongbo Liu, Yuehui Chen:
Hierarchical Takagi-Sugeno Models for Online Security Evaluation Systems. IAS 2009: 687-692 - Rabiah Ahmad, Ganthan Narayana Samy
, Nuzulha Khilwani Ibrahim, Peter A. Bath
, Zuraini Ismail
:
Threats Identification in Healthcare Information Systems Using Genetic Algorithm and Cox Regression. IAS 2009: 757-760 - Bachar Alrouh
, Gheorghita Ghinea
:
A Performance Evaluation of Security Mechanisms for Web Services. IAS 2009: 715-718 - Faeiz Alserhani, Monis Akhlaq, Irfan-Ullah Awan, John Mellor, Andrea J. Cullen, Pravin Mirchandani:
Evaluating Intrusion Detection Systems in High Speed Networks. IAS 2009: 454-459 - Yuan Bai, Xing Zhang, Bin Sun:
Building Trust Territory in Ad Hoc Networks. IAS 2009: 567-570 - Cui-Mei Bao:
Intrusion Detection Based on One-class SVM and SNMP MIB Data. IAS 2009: 346-349 - Pang Baomao, Shi Haoshan:
Research on Improved Algorithm for Chinese Word Segmentation Based on Markov Chain. IAS 2009: 236-238 - Caimei Wang, Zhengmao Li
:
Self-selecting Sub-secret Keys Sharing Scheme Based on Polynomials over Elliptic Curve. IAS 2009: 734-737 - Xiang Can, You Lin:
A New Conic Curve Digital Signature Scheme. IAS 2009: 623-626 - Chin-Chen Chang, Yen-Chang Chen, Chia-Chen Lin
:
A Resistant Secret Sharing Scheme. IAS 2009: 61-64 - Ching-Lung Chang, Jia-Yi Syu, Yuan-Sun Chu:
Zero Packet Loss Hand-off Mechanism in SIP-Based Wireless Networks. IAS 2009: 49-52 - Kan Chang
, Bo Yang, Wenhao Zhang:
Novel Fast Mode Decision Algorithm for P-Slices in H.264/AVC. IAS 2009: 189-193 - Chao Lv, Hui Li, Jianfeng Ma:
Analysis the Properties of TLS Based on Temporal Logic of Knowledge. IAS 2009: 19-22 - Shengbing Che, Zuguo Che, Haiyang Wang, Qiangbo Huang:
Image Compression Algorithm Based on Decreasing Bits Coding. IAS 2009: 217-220 - Xiaojiang Chen, Dingyi Fang
, Jingbo Shen, Feng Chen, Wenbo Wang, Lu He:
A Dynamic Graph Watermark Scheme of Tamper Resistance. IAS 2009: 3-6 - Long Chen, Bao-Long Guo, Wei Sun:
A New Multiple-Objects Tracking Method with Particle Filter. IAS 2009: 281-284 - Liang Chen, Chengmin Gao, Yong Xu:
Non-interactive Evaluation of Encrypted Elementary Functions. IAS 2009: 45-48 - Yueh-Hong Chen, Hsiang-Cheh Huang
:
Collusion-Resilient Fingerprinting Using Cropping and Subsampling. IAS 2009: 98-101 - Yu-Chi Chen
, Gwoboa Horng
, Chang-Chin Huang:
Privacy Protection in On-line Shopping for Electronic Documents. IAS 2009: 105-108 - Chien-Yuan Chen, Chih-Cheng Hsueh, Yu-Feng Lin:
A Generalization of de Weger's Method. IAS 2009: 344-347 - Chen Chen, Li Hui, Qingqi Pei, Lv Ning, Qingquan Peng:
An Effective Scheme for Defending Denial-of-Sleep Attack in Wireless Sensor Networks. IAS 2009: 446-449 - Yu-Yi Chen, Jun-Chao Lu, Shin-I Chen, Jinn-ke Jan:
A Low-cost RFID Authentication Protocol with Location Privacy Protection. IAS 2009: 109-113 - Lin Chen, Li Li, Yong Hu, Ke Lian:
Information Security Solution Decision-Making Based on Entropy Weight and Gray Situation Decision. IAS 2009: 7-10 - Wenbing Chen, Qizhou Li, Jianwei Yang:
Image Retrieval Based on Composite of Mean Shift and Assignment Model. IAS 2009: 568-571 - Ying Chen, Jian Shu, Hong Liu, Linlan Liu, Jiajie Gong:
MRDWA: Multi-role Dynamic Weighting Aggregation Algorithm in Event Driven Wireless Sensor Networks. IAS 2009: 311-314 - Ding-Hrong Chen, Shiang-En Tang:
A Name Recommendation Photo Album Using Probability Neural Network. IAS 2009: 379-382 - Fu-Kun Chen, Jui-Che Teng, Yue-Dar Jou, Wen-Yuan Liao:
Dynamically Constrained One-Bit Transform for Motion Vector Estimation. IAS 2009: 375-378 - Yongyue Chen, Huosong Xia:
A Study on the Algorithm Based on Image Color Correlation Mining. IAS 2009: 377-380 - Wenbing Chen, Jianwei Yang, Wangwei:
Image Retrieve Based on Primary Clusters. IAS 2009: 357-360 - Wuping Chen, Lei Zhang, Bo Qin, Qianhong Wu, Huanguo Zhang:
Certificateless One-Way Authenticated Two-Party Key Agreement Protocol. IAS 2009: 483-486