


default search action
AsiaJCIS 2012: Kaohsiung, Taiwan
- Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012, Kaohsiung, Taiwan, August 9-10, 2012. IEEE Computer Society 2012, ISBN 978-0-7695-4776-3

- Wen-Chung Kuo, Shao-Hung Kuo:

Reversible Data Hiding for JPEG Based on EMD. 1-5 - Chin-Feng Lee, Ming-Chi Shih, Cheng-Ta Huang:

An Efficient Lossless Data Hiding Scheme on VQ Index Coding. 6-9 - Chin-Chen Chang, Ngoc-Tu Huynh, Chia-Chun Lin:

Strong Tamper-Localization, Visual Secret Sharing Scheme Based on Exploiting Modification Direction. 10-16 - Yuji Suga:

SSL/TLS Status Survey in Japan - Transitioning against the Renegotiation Vulnerability and Short RSA Key Length Problem. 17-24 - T. Tsukaune, Yosuke Todo

, Masakatu Morii:
Proposal of a Secure WEP Operation against Existing Key Recovery Attacks and its Evaluation. 25-30 - Chien-Ting Kuo, He-Ming Ruan, Shih-Jen Chen, Chin-Laung Lei:

An Analysis of Security Patch Lifecycle Using Google Trend Tool. 31-34 - Tomoki Sato, Hiroaki Kikuchi:

Synthesis of Secure Passwords. 35-37 - Chin-Chen Chang, Hai-Duong Le, Ching-Hsiang Chang:

Mobile Friendly and Highly Efficient Remote User Authenticated Key Agreement Protocol Featuring Untraceability. 38-43 - Ruidong Li

, Masaaki Ohnishi, Yasunori Owada, Hiroaki Harai:
PDAF: Proactive Distributed Authentication Framework for Regional Network. 44-50 - Chung-Wei Chen, Shiuh-Jeng Wang, Yuh-Ren Tsai

, Hsing-Chung Chen:
Fast-Refreshing Tree-Based Group Key Agreement for Mobile Ad Hoc Networks. 51-58 - Kuo-Hui Yeh, Nai-Wei Lo, Tzong-Chen Wu, Ta-Chi Yang, Horng-Twu Liaw:

Analysis of an eHealth Care System with Smart Card Based Authentication. 59-61 - Dong-Jie Wu, Ching-Hao Mao, Te-En Wei, Hahn-Ming Lee, Kuo-Ping Wu:

DroidMat: Android Malware Detection through Manifest and API Calls Tracing. 62-69 - Hanjae Jeong, Dongho Won:

A Study on Method to Analyze Application on Bada Using GUI without Source Code. 70-73 - N. Hiroguchi, Hiroaki Kikuchi, Khamphao Sisaat, Surin Kittitornkun:

Geographical Visualization of Malware Download for Anomaly Detection. 74-78 - Masashi Eto, Daisuke Inoue, Mio Suzuki, Koji Nakao:

Multipurpose Network Monitoring Platform Using Dynamic Address Assignment. 79-84 - S. G. Worku, Zhong Ting, Zhiguang Qin:

Survey on Cloud Data Integrity Proof Techniques. 85-91 - He-Ming Ruan, Yu-Shian Chen, Chin-Laung Lei:

Data Integrity on Remote Storage for On-line Co-working. 92-99 - Chia-Mei Chen, D. J. Guan, Yu-Zhi Huang, Ya-Hui Ou:

Attack Sequence Detection in Cloud Using Hidden Markov Model. 100-103 - Ruo Ando:

Flaw and Configuration Analysis of Cloud Component Using First Order Logic. 104-108

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














