Conferences in DBLP
Additional Referees. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:- [Conf ] Committees. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:- [Conf ] General Chair's Message. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:- [Conf ] Andy Auyeung A New Phylogenetic Tree Model for Fuzzy Characters. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:2-7 [Conf ] Jiancong Luo , Ishfaq Ahmad , Munib Ahmed , Raymond A. Paul Parallel Multiple Sequence Alignment with Dynamic Scheduling. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:8-13 [Conf ] Naveen Kandiraju , Sumeet Dua , Steven A. Conrad Dihedral Angle based Dimensionality Reduction for Protein Structural Comparison. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:14-19 [Conf ] Rasiah Loganantharaj Recognizing Transcription Start Site (TSS) of Plant Promoters. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:20-25 [Conf ] Sumeet Dua , Naveen Kandiraju , Hilary W. Thompson Design and Implementation of a Unique Blood-Vessel Detection Algorithm towards Early Diagnosis of Diabetic Retinopathy. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:26-31 [Conf ] Ya Zhang , Hongyuan Zha , Chao-Hsien Chu A Time-Series Biclustering Algorithm for Revealing Co-Regulated Genes. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:32-37 [Conf ] Ahmed Muthana M. Nadhim , Jianhua He , Jiangtao Xi , Zongkai Yang An Adaptive Scalable Multiuser-OFDM System for Multimedia Transmission Over Fading Channels. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:40-45 [Conf ] Alain Bretto , Luc Gillibert Hypergraph Lossless Image Compression. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:46-50 [Conf ] Ata Kabán A Scalable Generative Topographic Mapping for Sparse Data Sequences. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:51-56 [Conf ] Ebru Celikel Language Discrimination via PPM Model. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:57-62 [Conf ] Hong Zhao , Nirwan Ansari , Yun Q. Shi Layered MPEG Video Transmission over IP DiffServ. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:63-67 [Conf ] Jinghua Zhang , Charles B. Owen Hybrid Coding for Animated Polygonal Meshes: Combining Delta and Octree. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:68-73 [Conf ] Piyali Mandal , Ashish Thakral , Shekhar Verma Watermark Based Digital Rights Management. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:74-78 [Conf ] S. Mahapatra , Kuldeep Singh A Parallel Scheme for Implementing Multialphabet Arithmetic Coding in High-Speed Programmable Hardware. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:79-84 [Conf ] Shumin Tian , P. Karivaratha Rajan Multiple Description Coding Using Transforms and Data Fusion. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:85-90 [Conf ] Tao Tao , Amar Mukherjee Multiple-Pattern Matching For LZW Compressed Files. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:91-96 [Conf ] Wen Hu , Guoxin Zheng Orthogonal Hermite Pulses Used for UWB M-ary Communication. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:97-101 [Conf ] Xinrong Hu , Tianzhen Wang , Dehua Li A New Approach of Color Quantization Based On Ant Colony Clustering Algorithm. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:102-108 [Conf ] Yu Sun , Dongdong Li , Ishfaq Ahmad , Jiancong Luo A Rate Control Algorithm for Wireless Video Transmission Using Perceptual Tuning. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:109-114 [Conf ] Bruce D. Caulkins , Joohan Lee , Morgan C. Wang Packet- vs. Session-Based Modeling for Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:116-121 [Conf ] Charles Wesley Ford , Chia-Chu Chiang , Hao Wu , Radhika R. Chilka , John R. Talburt Text Data Mining: A Case Study. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:122-127 [Conf ] Chung-Hong Lee , Hsin-Chang Yang A Classifier-based Text Mining Approach for Evaluating Semantic Relatedness Using Support Vector Machines. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:128-133 [Conf ] Dechang Chen , Dong Hua , Konstantinos Sirlantzis , Xiaobin Ma On the Relation Between Dependence and Diversity in Multiple Classifier Systems. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:134-139 [Conf ] Hassan Reza , Emanuel S. Grant Quality-Oriented Software Architecture. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:140-145 [Conf ] Jeffrey Huang , Shijun Li Mining p53 Binding Sites Using Profile Hidden Markov Model. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:146-151 [Conf ] Kazem Taghva , Rania Elkhoury , Jeffrey S. Coombs Arabic Stemming Without A Root Dictionary. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:152-157 [Conf ] Kazem Taghva , Russell Beckley , Mohammad Sadeh A Stemming Algorithm for the Farsi Language. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:158-162 [Conf ] M. Emre Celebi , Y. Alp Aslandogan , Paul R. Bergstresser Mining Biomedical Images with Density-Based Clustering. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:163-168 [Conf ] Mali Abdollahian , R. Foroughi Optimal Statistical Model for Forecasting Ozone. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:169-173 [Conf ] Mali Abdollahian , R. Foroughi Regression Analysis of Ozone Data. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:174-178 [Conf ] Mark Smith , Alireza Khotanzad XML Representation of Digital Videos for Visual Data Mining Applications. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:179-183 [Conf ] N. Churcharoenkrung , Yang Sok Kim , Byeong Ho Kang Dynamic Web Content Filtering based on User's Knowledge. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:184-188 [Conf ] Quoc-Nam Tran An Efficient Clustering Algorithm Using Graphical Techniques. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:189-194 [Conf ] Ray R. Hashemi , Joshua H. Early , Mahmood Bahar , Alexander A. Tyler , John F. Young A Signature-Based Liver Cancer Predictive System. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:195-199 [Conf ] Shakirah Mohd Taib , Soon-ja Yeom , Byeong Ho Kang Elimination of Redundant Information for Web Data Mining. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:200-205 [Conf ] Soon Myoung Chung , Murali Mangamuri Mining Association Rules from the Star Schema on a Parallel NCR Teradata Database System. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:206-212 [Conf ] Xin Jin , Bamshad Mobasher , Yanzan Zhou A Web Recommendation System Based on Maximum Entropy. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:213-218 [Conf ] Abel Matus-Castillejos , Ric Jentzsch A Time Series Data Management Framework. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:220-225 [Conf ] Ali Saman Tosun Design Theoretic Approach to Replicated Declustering. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:226-231 [Conf ] Ali Saman Tosun Constrained Declustering. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:232-237 [Conf ] Ira Rudowsky , Olga Kulyba , Mikhail Kunin , Dmitri Ogarodnikov , Theodore Raphan Managing a Relational Database with Intelligent Agents. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:238-242 [Conf ] Moses Garuba , Anteneh Girma Impact Of External Security Measures On Data Access Implementation With Online Database Management System. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:243-248 [Conf ] Navdeep Kaur , Rajwinder Singh , Anil Kumar Sarje , Manoj Misra Performance Evaluation of Secure Concurrency Control Algorithm for Multilevel Secure Distributed Database Systems. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:249-254 [Conf ] Oviliani Yenty Yuliana , Suphamit Chittayasothorn XML Schema Re-Engineering Using a Conceptual Schema Approach. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:255-260 [Conf ] Soon Myoung Chung , Sheeya B. Jesurajaiah Schemaless XML Document Management in Object-Oriented Databases. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:261-266 [Conf ] Angelo Leto , Ezio Corso , Riccardo Murri , Alessio Terpin , Cristian Zoicas , Stefano Cozzini EGRID Project: Experience Report on the Implementation of a Grid Infrastructure for the Analysis of Financial Data. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:268-273 [Conf ] Chia-Chu Chiang Development of Concurrent Systems through Coordination. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:274-279 [Conf ] Dianxun Shuai , Xiang Feng , Rui Gong , Xing Wang A New Generalized Particle Approach to Allot Resources And Jobs for Grid Computing. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:280-285 [Conf ] Emmanuel Jeannot , Gerald Monard Computing Molecular Potential Energy Surface with DIET. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:286-291 [Conf ] Qianfei Fu , Shoubao Yang , Maosheng Li , Junmao Zhun Transaction Mechanism Design in Decentralized Computational Market. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:292-297 [Conf ] Giovanni Aloisio , Massimo Cafaro , Dario Conte , Sandro Fiore , Gian Paolo Marra , Gianvito Quarta A Grid-Enabled Web Map Server. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:298-303 [Conf ] Giovanni Aloisio , Massimo Cafaro , Italo Epicoco , Daniele Lezzi , Robert van Engelen The GSI Plug-in for gSOAP: Enhanced Security, Performance, and Reliability. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:304-309 [Conf ] Maosheng Li , Shoubao Yang , Qianfei Fu , Yang Jin Research on Grid Resource Reliability Model Based on Promise. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:310-315 [Conf ] Michele Di Santo , Nadia Ranaldo , Eugenio Zimeo Metacomputing through the Enactment of a BPEL4WS Workflow in a Grid Environment. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:316-321 [Conf ] Mario Cannataro , Pietro Hiram Guzzi , Tommaso Mazza , Giuseppe Tradigo , Pierangelo Veltri Algorithms and Databases in Bioinformatics: Towards a Proteomic Ontology. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:322-328 [Conf ] Mine Altunay , D. Colonnese , C. Warade High Throughput Web Services for Life Sciences. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:329-334 [Conf ] Minjun Wang , Geoffrey Fox , Marlon E. Pierce Grid-Based Collaboration in Interactive Data Language Applications. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:335-341 [Conf ] Oussama Kassem Zein , Yvon Kermarrec An Approach for Service Description and a Flexible Way to Discover Services in Distributed Systems. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:342-347 [Conf ] Pichet Amnuaykanjanasin , Natawut Nupairoj The BPEL Orchestrating Framework for Secured Grid Services. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:348-353 [Conf ] Rashedur M. Rahman , Ken Barker , Reda Alhajj Replica Placement in Data Grid: Considering Utility and Risk. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:354-359 [Conf ] Shrideep Pallickara , Geoffrey Fox , Sangmi Lee Pallickara An Analysis of Reliable Delivery Specifications for Web Services. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:360-365 [Conf ] Umesh Kant , Daniel Grosu Double Auction Protocols for Resource Allocation in Grids. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:366-371 [Conf ] Xiaosong Hou , Chik How Tan A New Electronic Cash Model. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:374-379 [Conf ] Charles C. Willow Automatic Agent and Data Mining for e-Commerce. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:380-384 [Conf ] Chima Adiele A Characterization of Web Data Sources to Facilitate E-Commerce Transactions. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:385-390 [Conf ] Elhadi Shakshuki A Methodology for Evaluating Agent Toolkits. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:391-396 [Conf ] Taedong Han Exploring Price and Product Information Search Behavior in e-Market. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:397-402 [Conf ] Yao-Chung Chang , Jiann-Liang Chen , Wen-Ming Tseng A Mobile Commerce Framework Based on Web Services Architecture. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:403-408 [Conf ] Liang Peng , Keqing He , Bing Li , Jin Liu The Interoperability between Different e-Business Specifications. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:409-413 [Conf ] Wudong Liu , Lulu He , Jing Liu , Keqing He A Semantic Interoperability Extension Model to the ebXML Registry. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:414-419 [Conf ] Yiyao Hao , Daniel M. Havey , David A. Turner An Exchange Protocol for Alternative Currencies. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:420-424 [Conf ] Zoran Djuric IPS - Secure Internet Payment System. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:425-430 [Conf ] Frank P. Coyle , Mitchell A. Thornton A Framework and Process for Curricular Integration and Innovation Using Project Based Interdisciplinary Teams. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:432-435 [Conf ] Hye Sun Kim , Seong Baeg Kim An Integrated Course Based on Educational Games. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:436-441 [Conf ] Imke Sassen , Birgit Schwartz-Reinken Adaptation and Configuration - Support-Possibilities of Different Learner Types within Virtual Learning Environments - An Experience Report. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:442-446 [Conf ] Kyoung Mi Yang , Rockford J. Ross , Seong Baeg Kim Constructing Different Learning Paths Through e-Learning. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:447-452 [Conf ] Paul Douglas , Steve Barker An E-learning tool for Database Administration. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:453-458 [Conf ] Pavel Azalov Synthetic Exercises on the Web. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:459-464 [Conf ] Zongkai Yang , Qingtang Liu , Kun Yan , Wanting Deng , Jing Jin Integration of Digital Rights Management into Learning Content Management System. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:465-469 [Conf ] Rukmini Reddy Muduganti , Shravan Kumar Sogani , Henry Hexmoor Comparison of Information Technology Adoption Rates across Laggards, Innovators and Others. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:470-475 [Conf ] Shlomo Argamon , Nazli Goharian , David A. Grossman , Ophir Frieder , N. Raju A Specialization in Information and Knowledge Management Systems for the Undergraduate Computer Science Curriculum. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:476-481 [Conf ] Steve Barker , Paul Douglas An Intelligent Tutoring System for Program Semantics. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:482-487 [Conf ] Victor Adamchik , Ananda Gunawardena Adaptive Book: Teaching and Learning Environment for Programming Education. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:488-492 [Conf ] Jordi Castellà-Roca , Guillermo Navarro , Jose A. Ortega-Ruiz , Joaquín García Digital Chips for an On-Line Casino. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:494-499 [Conf ] Joaquín García , Frédéric Cuppens , Fabien Autrel , Jordi Castellà-Roca , Joan Borrell , Guillermo Navarro , Jose A. Ortega-Ruiz Protecting On-Line Casinos against Fraudulent Player Drop-Out. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:500-505 [Conf ] Philippe Golle Dealing Cards in Poker Games. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:506-511 [Conf ] Ron Coleman Single-Parameter Blackjack Betting Systems Inspired by Scatter Search. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:512-517 [Conf ] Ying-Chieh Chen , Jing-Jang Hwang , Ronggong Song , George Yee , Larry Korba Online Gaming Cheating and Security Issue. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:518-523 [Conf ] A. Murat Fiskiran , Ruby B. Lee Fast Parallel Table Lookups to Accelerate Symmetric-Key Cryptography. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:526-531 [Conf ] Akashi Satoh , Tadanobu Inoue ASIC-Hardware-Focused Comparison for Hash Functions MD5, RIPEMD-160, and SHS. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:532-537 [Conf ] Alireza Hodjat , David Hwang , Ingrid Verbauwhede A Scalable and High Performance Elliptic Curve Processor with Resistance to Timing Attacks. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:538-543 [Conf ] Catherine H. Gebotys , C. C. Tiu , X. Chen A Countermeasure for EM Attack of a Wireless PDA. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:544-549 [Conf ] Christophe Nègre Quadrinomial Modular Arithmetic using Modified Polynomial Basis. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:550-555 [Conf ] François-Xavier Standaert , Gilles Piret , Gaël Rouvroy , Jean-Jacques Quisquater FPGA Implementations of the ICEBERG Block Cipher. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:556-561 [Conf ] François-Xavier Standaert , Eric Peeters , Jean-Jacques Quisquater On the Masking Countermeasure and Higher-Order Power Analysis Attacks. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:562-567 [Conf ] Francis M. Crowe , Alan Daly , William P. Marnane A Scalable Dual Mode Arithmetic Unit for Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:568-573 [Conf ] Francisco Rodríguez-Henríquez , Nazar A. Saqib , Nareli Cruz Cortés A Fast Implementation of Multiplicative Inversion Over GF(2m ). [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:574-579 [Conf ] T. S. Ganesh , T. S. B. Sudarshan ASIC Implementation of a Unified Hardware Architecture for Non-Key Based Cryptographic Hash Primitives. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:580-585 [Conf ] Guido Bertoni , Vittorio Zaccaria , Luca Breveglieri , Matteo Monchiero , Gianluca Palermo AES Power Attack Based on Induced Cache Miss and Countermeasure. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:586-591 [Conf ] Hung-Ching Chang , Chun-Chin Chen , Chih-Feng Lin XScale Hardware Acceleration on Cryptographic Algorithms for IPSec Applications. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:592-597 [Conf ] Kooroush Manochehri , Saadat Pourmozafari Modified Radix-2 Montgomery Modular Multiplication to Make It Faster and Simpler. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:598-602 [Conf ] Luiza de Macedo Mourelle , Nadia Nedjah Reconfigurable Hardware for Addition Chains Based Modular Exponentiation. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:603-607 [Conf ] Maged Hamada Ibrahim Verifiable Threshold Sharing of a Large Secret Safe-Prime. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:608-613 [Conf ] Nadia Nedjah , Luiza de Macedo Mourelle Pareto-Optimal Hardware for Substitution Boxes. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:614-619 [Conf ] Shay Gueron , Or Zuk Applications of The Montgomery Exponent. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:620-625 [Conf ] Fabio Sozzani , Guido Bertoni , Stefano Turcato , Luca Breveglieri A Parallelized Design for an Elliptic Curve Cryptosystem Coprocessor. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:626-630 [Conf ] Takeshi Okamoto , Atsuo Inomata , Eiji Okamoto A Proposal of Short Proxy Signature using Pairing. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:631-635 [Conf ] Willi Geiselmann , Hubert Köpfer , Rainer Steinwandt , Eran Tromer Improved Routing-Based Linear Algebra for the Number Field Sieve. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:636-641 [Conf ] Xinxin Fan , Thomas J. Wollinger , Yumin Wang Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves and Its Implementations. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:642-647 [Conf ] Akira Yamada , Yutaka Miyake , Keisuke Takemori , Toshiaki Tanaka Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:650-655 [Conf ] Bharat B. Madan , Shashi Phoha , Kishor S. Trivedi StackOFFence: A Technique for Defending Against Buffer Overflow Attacks. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:656-661 [Conf ] Debra L. Cook , Angelos D. Keromytis Conversion and Proxy Functions for Symmetric Key Ciphers. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:662-667 [Conf ] Dianxiang Xu , Vivek Goel An Aspect-Oriented Approach to Mobile Agent Access Control. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:668-673 [Conf ] Raju Gangishetti , M. Choudary Gorantla , Manik Lal Das , Ashutosh Saxena , Ved Prakash Gulati An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:674-678 [Conf ] Hamilton E. Link , William D. Neumann Clarifying Obfuscation: Improving the Security of White-Box DES. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:679-684 [Conf ] Heeyoul Kim , Seong-Min Hong , Hyunsoo Yoon , Jung Wan Cho Secure Group Communication with Multiplicative One-way Functions. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:685-690 [Conf ] Jidong Long , Daniel G. Schwartz , Sara Stoecklin , Mahesh K. Patel Application of Loop Reduction to Learning Program Behaviors for Anomaly Detection. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:691-696 [Conf ] Khaled Hussain , Sharon Rajan , Naveen Addulla , Ghada S. Moussa No-Capture Hardware Feature for Securing Sensitive Information. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:697-702 [Conf ] Mathieu Jaume , Charles Morisset Formalisation and implementation of Access control models. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:703-708 [Conf ] P. Muppala , Johnson P. Thomas , Ajith Abraham QoS-Based Authentication Scheme for Ad Hoc Wireless Networks. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:709-714 [Conf ] Sriranjani Sitaraman , Srinivasan Krishnamurthy , S. Venkatesan Byteprints: A Tool to Gather Digital Evidence. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:715-720 [Conf ] Thomas E. Carroll , Daniel Grosu A Secure and Efficient Voter-Controlled Anonymous Election Scheme. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:721-726 [Conf ] Valentina Casola , Massimiliano Rak , Antonino Mazzeo , Nicola Mazzocca Security Design and Evaluation in a VoIP Secure Infrastracture: A Policy Based Approach. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:727-732 [Conf ] Vipul Goyal , Ajith Abraham , Sugata Sanyal , Sang-Yong Han The N/R One Time Password System. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:733-738 [Conf ] Vipul Goyal , Virendra Kumar , Mayank Singh , Ajith Abraham , Sugata Sanyal CompChall: Addressing Password Guessing Attacks. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:739-744 [Conf ] Weiliang Zhao , Vijay Varadharajan Efficient TTP-Free Mental Poker Protocols. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:745-750 [Conf ] Xue Ying Chen , Ruizhong Wei A Dynamic Method for Handling the Inference Problem in Multilevel Secure Databases. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:751-756 [Conf ] Yijuan Shi , Gongliang Chen , Jianhua Li ID-Based One Round Authenticated Group Key Agreement Protocol with Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:757-761 [Conf ] Yu Yu , Jussipekka Leiwo , Benjamin Premkumar Securely Utilizing External Computing Power. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:762-767 [Conf ] Yun Q. Shi , Guorong Xuan , Chengyun Yang , Jianjiong Gao , Zhenping Zhang , Peiqi Chai , Dekun Zou , Chunhua Chen , Wen Chen Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Function. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:768-773 [Conf ] Zhen Liu , Susan M. Bridges Dynamic Learning of Automata from the Call Stack Log for Anomaly Detection. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:774-779 [Conf ] Zili Shao , Chun Xue , Qingfeng Zhuge , Edwin Hsing-Mean Sha , Bin Xiao Efficient Array & Pointer Bound Checking Against Buffer Overflow Attacks via Hardware/Software. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:780-785 [Conf ] M. Emre Celebi , Y. Alp Aslandogan A Comparative Study of Three Moment-Based Shape Descriptors. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:788-793 [Conf ] Rifat Ozcan , Y. Alp Aslandogan Concept-Based Information Access. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:794-799 [Conf ] Sourav Sengupta , Bernard J. Jansen Designing a Value Based Niche Search Engine Using Evolutionary Strategies. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:800-805 [Conf ] Jun-feng Song , Wei Ming Zhang , Weidong Xiao A Mathematical Investigation on Retrieval Performance Evaluation Measures of Information Retrieval Algorithm. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:806-810 [Conf ]