The SCEAS System
Navigation Menu

Conferences in DBLP

International Symposium on Information Technology (itcc)
2005 (conf/itcc/2005-1)


  1. Additional Referees. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:- [Conf]

  2. Committees. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:- [Conf]

  3. General Chair's Message. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:- [Conf]
  4. Andy Auyeung
    A New Phylogenetic Tree Model for Fuzzy Characters. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:2-7 [Conf]
  5. Jiancong Luo, Ishfaq Ahmad, Munib Ahmed, Raymond A. Paul
    Parallel Multiple Sequence Alignment with Dynamic Scheduling. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:8-13 [Conf]
  6. Naveen Kandiraju, Sumeet Dua, Steven A. Conrad
    Dihedral Angle based Dimensionality Reduction for Protein Structural Comparison. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:14-19 [Conf]
  7. Rasiah Loganantharaj
    Recognizing Transcription Start Site (TSS) of Plant Promoters. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:20-25 [Conf]
  8. Sumeet Dua, Naveen Kandiraju, Hilary W. Thompson
    Design and Implementation of a Unique Blood-Vessel Detection Algorithm towards Early Diagnosis of Diabetic Retinopathy. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:26-31 [Conf]
  9. Ya Zhang, Hongyuan Zha, Chao-Hsien Chu
    A Time-Series Biclustering Algorithm for Revealing Co-Regulated Genes. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:32-37 [Conf]
  10. Ahmed Muthana M. Nadhim, Jianhua He, Jiangtao Xi, Zongkai Yang
    An Adaptive Scalable Multiuser-OFDM System for Multimedia Transmission Over Fading Channels. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:40-45 [Conf]
  11. Alain Bretto, Luc Gillibert
    Hypergraph Lossless Image Compression. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:46-50 [Conf]
  12. Ata Kabán
    A Scalable Generative Topographic Mapping for Sparse Data Sequences. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:51-56 [Conf]
  13. Ebru Celikel
    Language Discrimination via PPM Model. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:57-62 [Conf]
  14. Hong Zhao, Nirwan Ansari, Yun Q. Shi
    Layered MPEG Video Transmission over IP DiffServ. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:63-67 [Conf]
  15. Jinghua Zhang, Charles B. Owen
    Hybrid Coding for Animated Polygonal Meshes: Combining Delta and Octree. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:68-73 [Conf]
  16. Piyali Mandal, Ashish Thakral, Shekhar Verma
    Watermark Based Digital Rights Management. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:74-78 [Conf]
  17. S. Mahapatra, Kuldeep Singh
    A Parallel Scheme for Implementing Multialphabet Arithmetic Coding in High-Speed Programmable Hardware. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:79-84 [Conf]
  18. Shumin Tian, P. Karivaratha Rajan
    Multiple Description Coding Using Transforms and Data Fusion. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:85-90 [Conf]
  19. Tao Tao, Amar Mukherjee
    Multiple-Pattern Matching For LZW Compressed Files. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:91-96 [Conf]
  20. Wen Hu, Guoxin Zheng
    Orthogonal Hermite Pulses Used for UWB M-ary Communication. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:97-101 [Conf]
  21. Xinrong Hu, Tianzhen Wang, Dehua Li
    A New Approach of Color Quantization Based On Ant Colony Clustering Algorithm. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:102-108 [Conf]
  22. Yu Sun, Dongdong Li, Ishfaq Ahmad, Jiancong Luo
    A Rate Control Algorithm for Wireless Video Transmission Using Perceptual Tuning. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:109-114 [Conf]
  23. Bruce D. Caulkins, Joohan Lee, Morgan C. Wang
    Packet- vs. Session-Based Modeling for Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:116-121 [Conf]
  24. Charles Wesley Ford, Chia-Chu Chiang, Hao Wu, Radhika R. Chilka, John R. Talburt
    Text Data Mining: A Case Study. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:122-127 [Conf]
  25. Chung-Hong Lee, Hsin-Chang Yang
    A Classifier-based Text Mining Approach for Evaluating Semantic Relatedness Using Support Vector Machines. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:128-133 [Conf]
  26. Dechang Chen, Dong Hua, Konstantinos Sirlantzis, Xiaobin Ma
    On the Relation Between Dependence and Diversity in Multiple Classifier Systems. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:134-139 [Conf]
  27. Hassan Reza, Emanuel S. Grant
    Quality-Oriented Software Architecture. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:140-145 [Conf]
  28. Jeffrey Huang, Shijun Li
    Mining p53 Binding Sites Using Profile Hidden Markov Model. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:146-151 [Conf]
  29. Kazem Taghva, Rania Elkhoury, Jeffrey S. Coombs
    Arabic Stemming Without A Root Dictionary. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:152-157 [Conf]
  30. Kazem Taghva, Russell Beckley, Mohammad Sadeh
    A Stemming Algorithm for the Farsi Language. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:158-162 [Conf]
  31. M. Emre Celebi, Y. Alp Aslandogan, Paul R. Bergstresser
    Mining Biomedical Images with Density-Based Clustering. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:163-168 [Conf]
  32. Mali Abdollahian, R. Foroughi
    Optimal Statistical Model for Forecasting Ozone. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:169-173 [Conf]
  33. Mali Abdollahian, R. Foroughi
    Regression Analysis of Ozone Data. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:174-178 [Conf]
  34. Mark Smith, Alireza Khotanzad
    XML Representation of Digital Videos for Visual Data Mining Applications. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:179-183 [Conf]
  35. N. Churcharoenkrung, Yang Sok Kim, Byeong Ho Kang
    Dynamic Web Content Filtering based on User's Knowledge. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:184-188 [Conf]
  36. Quoc-Nam Tran
    An Efficient Clustering Algorithm Using Graphical Techniques. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:189-194 [Conf]
  37. Ray R. Hashemi, Joshua H. Early, Mahmood Bahar, Alexander A. Tyler, John F. Young
    A Signature-Based Liver Cancer Predictive System. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:195-199 [Conf]
  38. Shakirah Mohd Taib, Soon-ja Yeom, Byeong Ho Kang
    Elimination of Redundant Information for Web Data Mining. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:200-205 [Conf]
  39. Soon Myoung Chung, Murali Mangamuri
    Mining Association Rules from the Star Schema on a Parallel NCR Teradata Database System. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:206-212 [Conf]
  40. Xin Jin, Bamshad Mobasher, Yanzan Zhou
    A Web Recommendation System Based on Maximum Entropy. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:213-218 [Conf]
  41. Abel Matus-Castillejos, Ric Jentzsch
    A Time Series Data Management Framework. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:220-225 [Conf]
  42. Ali Saman Tosun
    Design Theoretic Approach to Replicated Declustering. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:226-231 [Conf]
  43. Ali Saman Tosun
    Constrained Declustering. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:232-237 [Conf]
  44. Ira Rudowsky, Olga Kulyba, Mikhail Kunin, Dmitri Ogarodnikov, Theodore Raphan
    Managing a Relational Database with Intelligent Agents. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:238-242 [Conf]
  45. Moses Garuba, Anteneh Girma
    Impact Of External Security Measures On Data Access Implementation With Online Database Management System. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:243-248 [Conf]
  46. Navdeep Kaur, Rajwinder Singh, Anil Kumar Sarje, Manoj Misra
    Performance Evaluation of Secure Concurrency Control Algorithm for Multilevel Secure Distributed Database Systems. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:249-254 [Conf]
  47. Oviliani Yenty Yuliana, Suphamit Chittayasothorn
    XML Schema Re-Engineering Using a Conceptual Schema Approach. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:255-260 [Conf]
  48. Soon Myoung Chung, Sheeya B. Jesurajaiah
    Schemaless XML Document Management in Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:261-266 [Conf]
  49. Angelo Leto, Ezio Corso, Riccardo Murri, Alessio Terpin, Cristian Zoicas, Stefano Cozzini
    EGRID Project: Experience Report on the Implementation of a Grid Infrastructure for the Analysis of Financial Data. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:268-273 [Conf]
  50. Chia-Chu Chiang
    Development of Concurrent Systems through Coordination. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:274-279 [Conf]
  51. Dianxun Shuai, Xiang Feng, Rui Gong, Xing Wang
    A New Generalized Particle Approach to Allot Resources And Jobs for Grid Computing. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:280-285 [Conf]
  52. Emmanuel Jeannot, Gerald Monard
    Computing Molecular Potential Energy Surface with DIET. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:286-291 [Conf]
  53. Qianfei Fu, Shoubao Yang, Maosheng Li, Junmao Zhun
    Transaction Mechanism Design in Decentralized Computational Market. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:292-297 [Conf]
  54. Giovanni Aloisio, Massimo Cafaro, Dario Conte, Sandro Fiore, Gian Paolo Marra, Gianvito Quarta
    A Grid-Enabled Web Map Server. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:298-303 [Conf]
  55. Giovanni Aloisio, Massimo Cafaro, Italo Epicoco, Daniele Lezzi, Robert van Engelen
    The GSI Plug-in for gSOAP: Enhanced Security, Performance, and Reliability. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:304-309 [Conf]
  56. Maosheng Li, Shoubao Yang, Qianfei Fu, Yang Jin
    Research on Grid Resource Reliability Model Based on Promise. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:310-315 [Conf]
  57. Michele Di Santo, Nadia Ranaldo, Eugenio Zimeo
    Metacomputing through the Enactment of a BPEL4WS Workflow in a Grid Environment. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:316-321 [Conf]
  58. Mario Cannataro, Pietro Hiram Guzzi, Tommaso Mazza, Giuseppe Tradigo, Pierangelo Veltri
    Algorithms and Databases in Bioinformatics: Towards a Proteomic Ontology. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:322-328 [Conf]
  59. Mine Altunay, D. Colonnese, C. Warade
    High Throughput Web Services for Life Sciences. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:329-334 [Conf]
  60. Minjun Wang, Geoffrey Fox, Marlon E. Pierce
    Grid-Based Collaboration in Interactive Data Language Applications. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:335-341 [Conf]
  61. Oussama Kassem Zein, Yvon Kermarrec
    An Approach for Service Description and a Flexible Way to Discover Services in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:342-347 [Conf]
  62. Pichet Amnuaykanjanasin, Natawut Nupairoj
    The BPEL Orchestrating Framework for Secured Grid Services. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:348-353 [Conf]
  63. Rashedur M. Rahman, Ken Barker, Reda Alhajj
    Replica Placement in Data Grid: Considering Utility and Risk. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:354-359 [Conf]
  64. Shrideep Pallickara, Geoffrey Fox, Sangmi Lee Pallickara
    An Analysis of Reliable Delivery Specifications for Web Services. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:360-365 [Conf]
  65. Umesh Kant, Daniel Grosu
    Double Auction Protocols for Resource Allocation in Grids. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:366-371 [Conf]
  66. Xiaosong Hou, Chik How Tan
    A New Electronic Cash Model. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:374-379 [Conf]
  67. Charles C. Willow
    Automatic Agent and Data Mining for e-Commerce. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:380-384 [Conf]
  68. Chima Adiele
    A Characterization of Web Data Sources to Facilitate E-Commerce Transactions. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:385-390 [Conf]
  69. Elhadi Shakshuki
    A Methodology for Evaluating Agent Toolkits. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:391-396 [Conf]
  70. Taedong Han
    Exploring Price and Product Information Search Behavior in e-Market. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:397-402 [Conf]
  71. Yao-Chung Chang, Jiann-Liang Chen, Wen-Ming Tseng
    A Mobile Commerce Framework Based on Web Services Architecture. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:403-408 [Conf]
  72. Liang Peng, Keqing He, Bing Li, Jin Liu
    The Interoperability between Different e-Business Specifications. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:409-413 [Conf]
  73. Wudong Liu, Lulu He, Jing Liu, Keqing He
    A Semantic Interoperability Extension Model to the ebXML Registry. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:414-419 [Conf]
  74. Yiyao Hao, Daniel M. Havey, David A. Turner
    An Exchange Protocol for Alternative Currencies. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:420-424 [Conf]
  75. Zoran Djuric
    IPS - Secure Internet Payment System. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:425-430 [Conf]
  76. Frank P. Coyle, Mitchell A. Thornton
    A Framework and Process for Curricular Integration and Innovation Using Project Based Interdisciplinary Teams. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:432-435 [Conf]
  77. Hye Sun Kim, Seong Baeg Kim
    An Integrated Course Based on Educational Games. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:436-441 [Conf]
  78. Imke Sassen, Birgit Schwartz-Reinken
    Adaptation and Configuration - Support-Possibilities of Different Learner Types within Virtual Learning Environments - An Experience Report. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:442-446 [Conf]
  79. Kyoung Mi Yang, Rockford J. Ross, Seong Baeg Kim
    Constructing Different Learning Paths Through e-Learning. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:447-452 [Conf]
  80. Paul Douglas, Steve Barker
    An E-learning tool for Database Administration. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:453-458 [Conf]
  81. Pavel Azalov
    Synthetic Exercises on the Web. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:459-464 [Conf]
  82. Zongkai Yang, Qingtang Liu, Kun Yan, Wanting Deng, Jing Jin
    Integration of Digital Rights Management into Learning Content Management System. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:465-469 [Conf]
  83. Rukmini Reddy Muduganti, Shravan Kumar Sogani, Henry Hexmoor
    Comparison of Information Technology Adoption Rates across Laggards, Innovators and Others. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:470-475 [Conf]
  84. Shlomo Argamon, Nazli Goharian, David A. Grossman, Ophir Frieder, N. Raju
    A Specialization in Information and Knowledge Management Systems for the Undergraduate Computer Science Curriculum. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:476-481 [Conf]
  85. Steve Barker, Paul Douglas
    An Intelligent Tutoring System for Program Semantics. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:482-487 [Conf]
  86. Victor Adamchik, Ananda Gunawardena
    Adaptive Book: Teaching and Learning Environment for Programming Education. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:488-492 [Conf]
  87. Jordi Castellà-Roca, Guillermo Navarro, Jose A. Ortega-Ruiz, Joaquín García
    Digital Chips for an On-Line Casino. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:494-499 [Conf]
  88. Joaquín García, Frédéric Cuppens, Fabien Autrel, Jordi Castellà-Roca, Joan Borrell, Guillermo Navarro, Jose A. Ortega-Ruiz
    Protecting On-Line Casinos against Fraudulent Player Drop-Out. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:500-505 [Conf]
  89. Philippe Golle
    Dealing Cards in Poker Games. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:506-511 [Conf]
  90. Ron Coleman
    Single-Parameter Blackjack Betting Systems Inspired by Scatter Search. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:512-517 [Conf]
  91. Ying-Chieh Chen, Jing-Jang Hwang, Ronggong Song, George Yee, Larry Korba
    Online Gaming Cheating and Security Issue. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:518-523 [Conf]
  92. A. Murat Fiskiran, Ruby B. Lee
    Fast Parallel Table Lookups to Accelerate Symmetric-Key Cryptography. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:526-531 [Conf]
  93. Akashi Satoh, Tadanobu Inoue
    ASIC-Hardware-Focused Comparison for Hash Functions MD5, RIPEMD-160, and SHS. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:532-537 [Conf]
  94. Alireza Hodjat, David Hwang, Ingrid Verbauwhede
    A Scalable and High Performance Elliptic Curve Processor with Resistance to Timing Attacks. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:538-543 [Conf]
  95. Catherine H. Gebotys, C. C. Tiu, X. Chen
    A Countermeasure for EM Attack of a Wireless PDA. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:544-549 [Conf]
  96. Christophe Nègre
    Quadrinomial Modular Arithmetic using Modified Polynomial Basis. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:550-555 [Conf]
  97. François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater
    FPGA Implementations of the ICEBERG Block Cipher. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:556-561 [Conf]
  98. François-Xavier Standaert, Eric Peeters, Jean-Jacques Quisquater
    On the Masking Countermeasure and Higher-Order Power Analysis Attacks. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:562-567 [Conf]
  99. Francis M. Crowe, Alan Daly, William P. Marnane
    A Scalable Dual Mode Arithmetic Unit for Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:568-573 [Conf]
  100. Francisco Rodríguez-Henríquez, Nazar A. Saqib, Nareli Cruz Cortés
    A Fast Implementation of Multiplicative Inversion Over GF(2m). [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:574-579 [Conf]
  101. T. S. Ganesh, T. S. B. Sudarshan
    ASIC Implementation of a Unified Hardware Architecture for Non-Key Based Cryptographic Hash Primitives. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:580-585 [Conf]
  102. Guido Bertoni, Vittorio Zaccaria, Luca Breveglieri, Matteo Monchiero, Gianluca Palermo
    AES Power Attack Based on Induced Cache Miss and Countermeasure. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:586-591 [Conf]
  103. Hung-Ching Chang, Chun-Chin Chen, Chih-Feng Lin
    XScale Hardware Acceleration on Cryptographic Algorithms for IPSec Applications. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:592-597 [Conf]
  104. Kooroush Manochehri, Saadat Pourmozafari
    Modified Radix-2 Montgomery Modular Multiplication to Make It Faster and Simpler. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:598-602 [Conf]
  105. Luiza de Macedo Mourelle, Nadia Nedjah
    Reconfigurable Hardware for Addition Chains Based Modular Exponentiation. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:603-607 [Conf]
  106. Maged Hamada Ibrahim
    Verifiable Threshold Sharing of a Large Secret Safe-Prime. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:608-613 [Conf]
  107. Nadia Nedjah, Luiza de Macedo Mourelle
    Pareto-Optimal Hardware for Substitution Boxes. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:614-619 [Conf]
  108. Shay Gueron, Or Zuk
    Applications of The Montgomery Exponent. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:620-625 [Conf]
  109. Fabio Sozzani, Guido Bertoni, Stefano Turcato, Luca Breveglieri
    A Parallelized Design for an Elliptic Curve Cryptosystem Coprocessor. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:626-630 [Conf]
  110. Takeshi Okamoto, Atsuo Inomata, Eiji Okamoto
    A Proposal of Short Proxy Signature using Pairing. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:631-635 [Conf]
  111. Willi Geiselmann, Hubert Köpfer, Rainer Steinwandt, Eran Tromer
    Improved Routing-Based Linear Algebra for the Number Field Sieve. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:636-641 [Conf]
  112. Xinxin Fan, Thomas J. Wollinger, Yumin Wang
    Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves and Its Implementations. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:642-647 [Conf]
  113. Akira Yamada, Yutaka Miyake, Keisuke Takemori, Toshiaki Tanaka
    Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:650-655 [Conf]
  114. Bharat B. Madan, Shashi Phoha, Kishor S. Trivedi
    StackOFFence: A Technique for Defending Against Buffer Overflow Attacks. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:656-661 [Conf]
  115. Debra L. Cook, Angelos D. Keromytis
    Conversion and Proxy Functions for Symmetric Key Ciphers. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:662-667 [Conf]
  116. Dianxiang Xu, Vivek Goel
    An Aspect-Oriented Approach to Mobile Agent Access Control. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:668-673 [Conf]
  117. Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati
    An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:674-678 [Conf]
  118. Hamilton E. Link, William D. Neumann
    Clarifying Obfuscation: Improving the Security of White-Box DES. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:679-684 [Conf]
  119. Heeyoul Kim, Seong-Min Hong, Hyunsoo Yoon, Jung Wan Cho
    Secure Group Communication with Multiplicative One-way Functions. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:685-690 [Conf]
  120. Jidong Long, Daniel G. Schwartz, Sara Stoecklin, Mahesh K. Patel
    Application of Loop Reduction to Learning Program Behaviors for Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:691-696 [Conf]
  121. Khaled Hussain, Sharon Rajan, Naveen Addulla, Ghada S. Moussa
    No-Capture Hardware Feature for Securing Sensitive Information. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:697-702 [Conf]
  122. Mathieu Jaume, Charles Morisset
    Formalisation and implementation of Access control models. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:703-708 [Conf]
  123. P. Muppala, Johnson P. Thomas, Ajith Abraham
    QoS-Based Authentication Scheme for Ad Hoc Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:709-714 [Conf]
  124. Sriranjani Sitaraman, Srinivasan Krishnamurthy, S. Venkatesan
    Byteprints: A Tool to Gather Digital Evidence. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:715-720 [Conf]
  125. Thomas E. Carroll, Daniel Grosu
    A Secure and Efficient Voter-Controlled Anonymous Election Scheme. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:721-726 [Conf]
  126. Valentina Casola, Massimiliano Rak, Antonino Mazzeo, Nicola Mazzocca
    Security Design and Evaluation in a VoIP Secure Infrastracture: A Policy Based Approach. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:727-732 [Conf]
  127. Vipul Goyal, Ajith Abraham, Sugata Sanyal, Sang-Yong Han
    The N/R One Time Password System. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:733-738 [Conf]
  128. Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal
    CompChall: Addressing Password Guessing Attacks. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:739-744 [Conf]
  129. Weiliang Zhao, Vijay Varadharajan
    Efficient TTP-Free Mental Poker Protocols. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:745-750 [Conf]
  130. Xue Ying Chen, Ruizhong Wei
    A Dynamic Method for Handling the Inference Problem in Multilevel Secure Databases. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:751-756 [Conf]
  131. Yijuan Shi, Gongliang Chen, Jianhua Li
    ID-Based One Round Authenticated Group Key Agreement Protocol with Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:757-761 [Conf]
  132. Yu Yu, Jussipekka Leiwo, Benjamin Premkumar
    Securely Utilizing External Computing Power. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:762-767 [Conf]
  133. Yun Q. Shi, Guorong Xuan, Chengyun Yang, Jianjiong Gao, Zhenping Zhang, Peiqi Chai, Dekun Zou, Chunhua Chen, Wen Chen
    Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Function. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:768-773 [Conf]
  134. Zhen Liu, Susan M. Bridges
    Dynamic Learning of Automata from the Call Stack Log for Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:774-779 [Conf]
  135. Zili Shao, Chun Xue, Qingfeng Zhuge, Edwin Hsing-Mean Sha, Bin Xiao
    Efficient Array & Pointer Bound Checking Against Buffer Overflow Attacks via Hardware/Software. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:780-785 [Conf]
  136. M. Emre Celebi, Y. Alp Aslandogan
    A Comparative Study of Three Moment-Based Shape Descriptors. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:788-793 [Conf]
  137. Rifat Ozcan, Y. Alp Aslandogan
    Concept-Based Information Access. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:794-799 [Conf]
  138. Sourav Sengupta, Bernard J. Jansen
    Designing a Value Based Niche Search Engine Using Evolutionary Strategies. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:800-805 [Conf]
  139. Jun-feng Song, Wei Ming Zhang, Weidong Xiao
    A Mathematical Investigation on Retrieval Performance Evaluation Measures of Information Retrieval Algorithm. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:806-810 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002