column
Special Issue on Network and Communication Security
Chin-Chen Chang, Ming-Shiang Hwang
2012, 10(3): 193-194. DOI: 10.3969/j.issn.1674-862X.2012.03.001
Abstract PDF
Authentication Mechanism for Secret Sharing Using Boolean Operation
Yi-Hui Chen, Pei-Yu Lin
2012, 10(3): 195-198. DOI: 10.3969/j.issn.1674-862X.2012.03.002
Abstract PDF
Elliptic Curve Point Multiplication by Generalized Mersenne Numbers
Tao Wu, Li-Tian Liu
2012, 10(3): 199-208. DOI: 10.3969/j.issn.1674-862X.2012.03.003
Abstract PDF
Efficient Certificateless Aggregate Signature Scheme
Yu-Chi Chen, Gwoboa Horng, Chao-Liang Liu, Yuan-Yu Tsai, Chi-Shiang Chan
2012, 10(3): 209-214. DOI: 10.3969/j.issn.1674-862X.2012.03.004
Abstract PDF
Wireless Application Protocol for Potential Threats to Mobile Agent Network Security
M. Indra Sena Reddy, K. Subba Reddy, P. J. Bhatt, Rajeev Chetwani
2012, 10(3): 215-219. DOI: 10.3969/j.issn.1674-862X.2012.03.005
Abstract PDF
An Adaptive Steganographic Algorithm for Point Geometry Based on Nearest Neighbors Search
Yuan-Yu Tsai, Chi-Shiang Chan, Chao-Liang Liu
2012, 10(3): 220-226. DOI: 10.3969/j.issn.1674-862X.2012.03.006
Abstract PDF
Improving Computation Efficiency of Source Authentication by Elliptic Curve Cryptosystem
Iuon-Chang Lin, Jen-Ho Yang
2012, 10(3): 227-231. DOI: 10.3969/j.issn.1674-862X.2012.03.007
Abstract PDF
Bidirectional Background Modeling for Video Surveillance
Chih-Yang Lin, Wei-Wen Chang, Yung-Chen Chou
2012, 10(3): 232-237. DOI: 10.3969/j.issn.1674-862X.2012.03.008
Abstract PDF
Reversible Data Embedding Scheme Using Relationships between Pixel-Values and Their Neighbors
Chia-Chen Lin, Chin-Chen Chang, Yi-Hui Chen
2012, 10(3): 238-249. DOI: 10.3969/j.issn.1674-862X.2012.03.009
Abstract PDF
Proactive Weighted Threshold Signature Based on Generalized Chinese Remainder Theorem
Cheng Guo, Chin-Chen Chang
2012, 10(3): 250-255. DOI: 10.3969/j.issn.1674-862X.2012.03.010
Abstract PDF
Using Hash Tree for Delegation Revocation in Grids
Chi-Tung Chen, Ming-Tsun Lin, Iuon-Chang Lin
2012, 10(3): 256-262. DOI: 10.3969/j.issn.1674-862X.2012.03.011
Abstract PDF
Secure Digital Contents Distributing System on P2P Networks
Yi-Ju Lin, Ing-Chau Chang, Hung-Wen Yang, Chou-Chen Yang
2012, 10(3): 263-268. DOI: 10.3969/j.issn.1674-862X.2012.03.012
Abstract PDF
Study of Intrusion Detection Systems
Li-Chin Huang, Min-Shiang Hwang
2012, 10(3): 269-275. DOI: 10.3969/j.issn.1674-862X.2012.03.013
Abstract PDF
Sequential Pattern Technology for Visual Fire Detection
Yu-Chiang Li, Wei-Cheng Wu
2012, 10(3): 276-280. DOI: 10.3969/j.issn.1674-862X.2012.03.014
Abstract PDF
New Feedback Architecture for VCO-Based Delta-Sigma ADCs Utilizing Phase Shifter
Ali Mohammadi, Ahmad Ayatollahi, Adib Abrishamifar
2012, 10(3): 281-285. DOI: 10.3969/j.issn.1674-862X.2012.03.015
Abstract PDF