Paper Title
|
Paper ID
|
No
|
RTBIMS: Accuracy Enhancement in Iterative
Multiplication Strategy for Computing Propagated Trust
|
149
|
1
|
Cryptographic Keys Management for H.264
Scalable Coded Video Security
|
160
|
2
|
Computing Trust Resultant using Intervals
|
171
|
3
|
A Secure and Robust Video Watermarking Based
on Chaotic Maps
|
202
|
4
|
An Entanglement-based quantum key distribution
protocol
|
210
|
5
|
Multiple-Chi-square Tests and Their
Application on Distinguishing Attacks
|
224
|
6
|
On the Period of GSM’s A5/1 Stream Cipher and
Its Internal State Transition Structure
|
225
|
7
|
Security Analyzing and Designing GUI with the
Resources Model
|
247
|
8
|
hybrid rule threshold adjustment system for
intrusion detection
|
265
|
9
|
An Improved Attack on A5/1
|
299
|
10
|
Watermarking in Farsi binary document images
using fractal coding
|
302
|
11
|
A Reversible Data Embedding Scheme Based on
Search Order Coding for VQ Index Tables
|
310
|
12
|
Attacks and Improvement to an RFID
Authentication Protocol Conforming to EPC C-1 G-2 Standard
|
313
|
13
|
Trust Modeling and Verification Using Colored
Petri Nets
|
316
|
14
|
An efficient buyer-seller watermarking
protocol based on proxy signatures
|
333
|
15
|
New Color Image Encryption Based on Hyper
Chaos
|
354
|
16
|