The SCEAS System
Navigation Menu

Conferences in DBLP

Computational Science and Its Applications (iccsa)
2007 (conf/iccsa/2007-2)

  1. Muhammet Fikret Ercan
    Parallel Image Understanding on a Multi-DSP System. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:1-12 [Conf]
  2. Mohammad Khatim Hasan, Mohamed Othman, Zulkifly Abbas, Jumat Sulaiman, Fatimah Ahmad
    Parallel Solution of High Speed Low Order FDTD on 2D Free Space Wave Propagation. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:13-24 [Conf]
  3. Mizanur Rahman
    Visibility Computations - Scanline Algorithms and Techniques. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:25-37 [Conf]
  4. Mikhail Panshenskov, Alexander Vakhitov
    Adaptive Scheduling of Parallel Computations for SPMD Tasks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:38-50 [Conf]
  5. Frank Dévai, Marina L. Gavrilova
    Determining the Visibility of a Planar Set of Line Segments in O(n log log n) Time. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:51-62 [Conf]
  6. Jianhong Zhang
    An Efficient Identity-Based Ring Signature Scheme and Its Extension. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:63-74 [Conf]
  7. In-Jung Kim, Cheol Won Lee, Eul-Gyu Im
    Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:75-84 [Conf]
  8. Wahyudi Martono, Hasimah Ali, Momoh-Jimoh E. Salami
    Keystroke Pressure-Based Typing Biometrics Authentication System Using Support Vector Machines. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:85-93 [Conf]
  9. Jungtaek Seo
    An Attack Classification Mechanism Based on Multiple Support Vector Machines. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:94-103 [Conf]
  10. Byoung-Sup Shim, Hyoung-Keun Park, Sun-Youb Kim, Yu-Chan Ra
    An Efficient Iteration Decoding Stopping Criterion for Turbo Codes. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:104-112 [Conf]
  11. Eun A. Jun, Seok Won Jung, Jeom Goo Kim, Jong In Lim
    Efficient an Implementation Method Research of a Smart Card Atomic Operation. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:113-121 [Conf]
  12. Do Hyeon Lee, Doo-young Kim, Jae-il Jung
    Mobile Agent Based Intrusion Detection System Adopting Hidden Markov Model. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:122-130 [Conf]
  13. Do-hyeon Lee, Sun Choi, Ji-hyeon Choi, Jae-il Jung
    Location-Aided Secure Routing Scheme in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:131-139 [Conf]
  14. Jeom Goo Kim, Do Hyeon Lee, Jeog-bae Lee
    A Design of Fair Blind Signatures Protocol Using PVNIOT. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:140-147 [Conf]
  15. Jeom Goo Kim, Do Hyeon Lee
    An Access Control Using SPKI Certificate in Peer-to-Peer Environment. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:148-156 [Conf]
  16. Geuk Lee, Seok Tae Kim, Inkyu Han, Chang Yong Lee, Seon Ho Park, Do Won Yi, Jung Min Oh
    Security and Test Environment for SIP. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:157-165 [Conf]
  17. Gang Taek Lee, Dong Hwi Lee, Kuinam J. Kim
    Simulation Based Nodal Analysis for Effects Based Operations. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:166-176 [Conf]
  18. Yong-Ho Kim, Dong Hwi Lee, Kuinam J. Kim
    A Stable Evidence Collection Procedure of a Volatile Data in Research. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:177-184 [Conf]
  19. Dong Hwi Lee, Kyong Ho Choi, Kuinam J. Kim
    Intelligence Report and the Analysis Against the Phishing Attack Which Uses a Social Engineering Technique. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:185-194 [Conf]
  20. Young-Ju Han, Seon-Ho Park, Jung-Ho Eom, Tai-Myoung Chung
    Energy-Efficient Distance Based Clustering Routing Scheme for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:195-206 [Conf]
  21. DaeHyuck Park, Euisun Kang, Younghwan Lim
    An Automatic Mobile Web Generation Method from PC Web Using DFS and W-DFS. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:207-215 [Conf]
  22. Woo Jin Jung, Hyung Joo Ki, Tae-Jin Lee, Hyunseung Choo, Min Young Chung
    Cross-Layer Design for Reducing Handoff Latency in Mobile Network. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:216-225 [Conf]
  23. Sukyoung Ahn, Youngsong Mun
    Quick Paging IP Scheme Using Residence Pattern of Mobile Node. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:226-236 [Conf]
  24. Kyunghye Lee, Youngsong Mun
    An Efficient Macro Mobility Scheme Supporting Reactive Fast Handover Mode in HMIPv6. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:237-246 [Conf]
  25. Hongju Cheng, Xiaohua Jia, Hai Liu
    Access Scheduling on the Control Channels in TDMA Wireless Mesh Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:247-260 [Conf]
  26. M. Sanabani, Subramaniam Shamala, Mohamed Othman, Z. Zukarnain
    An Enhanced Bandwidth Reservation Scheme Based on Road Topology Information for QoS Sensitive Multimedia Wireless Cellular Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:261-274 [Conf]
  27. Jungrae Kim, Ki-Young Jang, Hyunseung Choo, Won Kim
    Energy Efficient LEACH with TCP for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:275-285 [Conf]
  28. JeongHoon Park, Sangho Lee, Youho Lee, Hyunseung Choo
    Route Optimization with Additional Destination-Information in Mobile Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:286-295 [Conf]
  29. Sangim Ahn, Kiwon Chong
    Requirements Change Management on Feature-Oriented Requirements Tracing. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:296-307 [Conf]
  30. Majeed Pooyandeh, Saadi Mesgari, Abbas Alimohammadi, Rouzbeh Shad
    A Comparison Between Complexity and Temporal GIS Models for Spatio-temporal Urban Applications. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:308-321 [Conf]
  31. Manuel Álvarez, Juan Raposo, Alberto Pan, Fidel Cacheda, Fernando Bellas, Victor Carneiro
    Crawling the Content Hidden Behind Web Forms. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:322-333 [Conf]
  32. Misun Kim, Youngsong Mun
    Simple Performance Model for Differentiated Services in Mobile IPv6 Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:334-345 [Conf]
  33. Pornpit Wongthongtham, Elizabeth Chang, Tharam S. Dillon
    Multi-site Distributed Software Development: Issues, Solutions, and Challenges. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:346-359 [Conf]
  34. DaeHyuck Park, Euisun Kang, Younghwan Lim
    A Design and Implementation of Transcoder for Displaying Diagram Data of Multimedia Title on Web Browser. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:360-369 [Conf]
  35. Maria F. Trujillo, Marta Millán, Edward Ortiz
    A Recommender System Based on Multi-features. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:370-382 [Conf]
  36. Tran Hoang Hai, Faraz Khan, Eui-nam Huh
    Hybrid Intrusion Detection System for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:383-396 [Conf]
  37. KiJoo Kim, MunSu Kang, YoungSik Choi
    A Site-Ranking Algorithm for a Small Group of Sites. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:397-405 [Conf]
  38. Kang Soo Tae, An Ryeol Jeong, Kang Soo You
    Cognitive Model of Schema as Complex System. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:406-414 [Conf]
  39. Gyodu Koo, Ki-Sung Yu, Minki Noh, Youngsong Mun
    Improved Fast Handover Protocol Using HMIPv6 Based on IEEE 802.16e Network. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:415-423 [Conf]
  40. Kyunghye Lee, Youngsong Mun
    Advanced Macro Mobility Handover Supporting Fast Handover in HMIPv6. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:424-433 [Conf]
  41. Yajun Du, Zheng Pei, Haiming Li, Dan Xiang, Kai Li
    New Fast Algorithm for Constructing Concept Lattice. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:434-447 [Conf]
  42. Amalina Farhi Ahmad Fadzlah, Aziz Deraman
    Measuring the Usability of Software Applications: Metrics for Behaviorness. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:448-454 [Conf]
  43. Bo-Hyun Seok, Pill-Woo Lee, Eui-nam Huh, Ki-Moon Choi, Kang-Soo Tae
    An Efficient Information Dissemination for Publish/Subscription System on Grid. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:455-468 [Conf]
  44. Moonseong Kim, Sungchang Lee, Hyunseung Choo
    On Dynamic Multicast Trees for Stormless Binding Update in Network Mobility. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:469-478 [Conf]
  45. Youngsong Mun, Miyoung Kim
    Authentication Scheme Using Mobile IPv4 in VPN Intranet. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:479-488 [Conf]
  46. Cláudia J. Barenco Abbas, L. Javier García-Villalba, Victoria López López
    Implementation and Attacks Analysis of a Honeypot. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:489-502 [Conf]
  47. Meng-Hui Lim, Sanggon Lee, Youngho Park, HoonJae Lee
    An Enhanced One-Round Pairing-Based Tripartite Authenticated Key Agreement Protocol. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:503-513 [Conf]
  48. Zhen Cao, Hui Deng, Yuanchen Ma, Po Hu
    Integrating Identity Based Cryptography with Cryptographically Generated Addresses in Mobile IPv6. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:514-525 [Conf]
  49. Juan Hernández-Serrano, Josep Pegueroles, Miguel Soriano
    Supporting Mobility in GKM over Ad-Hoc Network Using a Decentralized and Spontaneous Algorithm. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:526-539 [Conf]
  50. Antonio Izquierdo, Joaquín Torres Márquez, José María Sierra, Mildrey Carbonell
    Using Adaptative Encryption for Ubiquitous Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:540-548 [Conf]
  51. Mildrey Carbonell, José María Sierra, Jose Antonio Onieva, Javier Lopez, Jianying Zhou
    Estimation of TTP Features in Non-repudiation Service. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:549-558 [Conf]
  52. Huanzhao Wang, Dongwei Luo, Yufei Guo, Qingping Zhao
    TLKMS: A Dynamic Keys Management Scheme for Large-Scale Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:559-572 [Conf]
  53. Hae Young Lee, Tae Ho Cho
    Fuzzy Security Parameter Determining Method for the Commutative Cipher Based Filtering in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:573-583 [Conf]
  54. Seok-Cheol Lee, Tae Gun Jeon, Hyun-Suk Hwang, Chang Soo Kim
    Design and Implementation of Wireless Sensor Based-Monitoring System for Smart Factory. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:584-592 [Conf]
  55. KwangMo Jung, Joong-Jin Kook, Kwang-Soon Choi, Seong-Dong Kim, Sangwon Min
    Energy Efficient Route Recovery Methods for Wireless Sensor Networks Using Hybrid Checkpointing. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:593-601 [Conf]
  56. Qing Xu, Mateu Sbert, Miquel Feixas, Jianfeng Zhang
    AM-GM Difference Based Adaptive Sampling for Monte Carlo Global Illumination. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:602-611 [Conf]
  57. Yu Zhang
    Data-Driven Feature Control Models for Creating Virtual Faces. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:612-626 [Conf]
  58. Minh Tran, Amitava Datta
    Variable Neighbourhood Texture Synthesis with Patch Initialisation. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:627-638 [Conf]
  59. Deok-Soo Kim, Bohyung Lee, Chung In Won, Donguk Kim, Joonghyun Ryu, Youngsong Cho, Chong-Min Kim, Sunghoon Lee, Jonghwa Bhak
    Multi-Resolution Protein Model. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:639-652 [Conf]
  60. Tetsuo Ida, Hidekazu Takahashi, Mircea Marin, Fadoua Ghourabi
    Modeling Origami for Computational Construction and Beyond. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:653-665 [Conf]
  61. Rui Rodrigues, José F. M. Morgado, Frutuoso G. M. Silva, Abel J. P. Gomes
    A Ghost Cell-Based Data Structure for Multiresolution Meshes. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:666-679 [Conf]
  62. Akemi Gálvez, Andrés Iglesias, Angel Cobo, Jaime Puig-Pey, Jesús Espinola
    Bézier Curve and Surface Fitting of 3D Point Clouds Through Genetic Algorithms, Functional Networks and Least-Squares Approximation. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:680-693 [Conf]
  63. Nazr-e-Batool, Ahmad Fadzil M. Hani, Vooi Voon Yap
    Markov-Gibbs Random Field Modeling of 3D Skin Surface Textures for Haptic Applications. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:694-705 [Conf]
  64. Jaeho Lee, Joon Young Park, Young Choi
    Elliptic Polygon Based 2D Sketch Interface for 3D Shape Matching. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:706-715 [Conf]
  65. Zhi-ping Hu, Yuan-jun He, Zong-ying Uo
    View Synthesis of the New Viewpoint Based on Contour Information. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:716-726 [Conf]
  66. Ferran Prados, Imma Boada, Miquel Feixas, A. Prats, G. Blasco, S. Pedraza, J. Puig
    DTIWeb: A Web-Based Framework for DTI Data Visualization and Processing. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:727-740 [Conf]
  67. Qing Xu, Mateu Sbert
    A New Way to Re-using Paths. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:741-750 [Conf]
  68. Jongchan Lee, Miyoung Hwang, Sangjoon Park, HaeSuk Jang, Byunggi Kim
    A Routing Scheme of Mobile Sink in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:751-763 [Conf]
  69. Jiyoung Song, Sangjoon Park, Jongchan Lee, Hyunjoo Moon, Byunggi Kim
    Explicit Routing Designation (ERD) Method the Cache Information in Nested Mobile Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:764-777 [Conf]
  70. Ji-Hong Kim, Yong-Hyun Kim, Youn-Sik Hong, Ki-Young Lee
    Performance Analysis of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:778-789 [Conf]
  71. Vinicius M. Pacheco, Ricardo Staciarini Puttini
    An Administration Structure for the OLSR Protocol. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:790-803 [Conf]
  72. Hamideh Babaei, Mahmood Fathy, Morteza Romoozi
    Obstacle Mobility Model Based on Activity Area in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:804-817 [Conf]
  73. Jongbae Moon, Donggyu Kwak, Yongyun Cho, Sangjoon Park, Jongchan Lee
    A XML Script-Based Testing Tool for Embedded Softwares. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:818-828 [Conf]
  74. Yongyun Cho, Kyoungho Shin, Jongsun Choi, Jaeyoung Choi
    A Context-Adaptive Workflow Language for Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:829-838 [Conf]
  75. Eunhoe Kim, Jaeyoung Choi
    A Semantic Interoperable Context Infrastructure Using Web Services. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:839-848 [Conf]
  76. Hyun-Joo Moon, Jae-Woo Yoo, Jongmyung Choi
    An Effective Detection Method for Clustering Similar XML DTDs Using Tag Sequences. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:849-860 [Conf]
  77. Josep Soler, Imma Boada, Ferran Prados, Jordi Poch, Ramón Fabregat
    An Automatic Correction Tool for Relational Algebra Queries. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:861-872 [Conf]
  78. Tae-Gun Jeong
    Study on the Nonlinearity of the Nonstationary Impulse Signal Using Reassigned Time-Frequency Analysis. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:873-882 [Conf]
  79. Seoung Soo Lee, Ho-Yeon Ryu, Keun-Sang Park, Hyo Sang Jung
    Development of Systematic Design Automation System for Hemming Die Manufacturing Process. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:883-894 [Conf]
  80. Dojoong Kim, Tae-Gun Jeong
    Numerical Simulation of the Lateral Frequency Response of a Thin Cantilever Beam-Like Structure by Using the Finite Element Model. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:895-906 [Conf]
  81. Suhong Ahn, Yang Na
    On the Ink Transfer Process in Gravure Printing. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:907-918 [Conf]
  82. ChangWoo Lee, Jangwon Lee, Keehyun Shin
    A Study on the Optimal Taper Tension Control in a Roll to Roll Machine. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:919-930 [Conf]
  83. Hoang Minh To, Dong Keun Shin, Sung Lim Ko
    On-Line Measurement of Wrinkle Using Machine Vision. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:931-940 [Conf]
  84. Andrey Toropov
    An Effective Visualization and Analysis Method for Edge Measurement. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:941-950 [Conf]
  85. Seung-Hwan Yu, Soojin Kang, Kwan-Soo Lee, Sukkee Um
    The Analysis of Film Flow Around Rotating Roller Partially Immersed Ink. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:951-960 [Conf]
  86. C. W. Kim, C. H. Park, S. S. Lee
    An Automated Design System of Press Die Components Using 3-D CAD Library. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:961-974 [Conf]
  87. Vee Liem Chee, Wei Chuen Yau
    Security Analysis of TORA Routing Protocol. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:975-986 [Conf]
  88. Daeyoung Kim, Younggang Cui, Sangjin Kim, Heekuck Oh
    A Privacy Protecting UMTS AKA Protocol Providing Perfect Forward Secrecy. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:987-995 [Conf]
  89. Seokhyang Cho, Kiwon Song, Dongsub Cho, Dongho Won
    Secure Mobile Content Delivery Using Dynamic Group Key Agreement with Batch Verification. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:996-1007 [Conf]
  90. Meng-Hui Lim, Sanggon Lee, Youngho Park, HoonJae Lee
    An Enhanced ID-Based Deniable Authentication Protocol on Pairings. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:1008-1017 [Conf]
  91. Kyounghee Ko, Pilyong Kang, Wontae Sim
    Design of Hybrid Network Discovery Module for Detecting Client Applications and ActiveX Controls. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:1018-1027 [Conf]
  92. Faraz Idris Khan, Hassan Jameel, S. M. K. Raazi, Adil Mehmood Khan, Eui-nam Huh
    An Efficient Re-keying Scheme for Cluster Based Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:1028-1037 [Conf]
  93. Rafa Marin, Santiago Zapata, Antonio F. Gomez
    Secure Protocol for Fast Authentication in EAP-Based Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:1038-1051 [Conf]
  94. Youngsong Mun, Kyunghye Lee, Seonggeun Ryu, Teail Shin
    Using Return Routability for Authentication of Fast Handovers in Mobile IPv6. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:1052-1061 [Conf]
  95. Seonggeun Ryu, Youngsong Mun
    Enhancement for Security of Peer-to-Peer by Expanding CGA Mechanism. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:1062-1071 [Conf]
  96. Chunum Kong, Hyunseung Choo, Won Kim
    A Simplified Anonymous Dynamic Source Routing Protocol for Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:1072-1084 [Conf]
  97. Young-Geun Choi, Jeonil Kang, DaeHun Nyang
    Proactive Code Verification Protocol in Wireless Sensor Network. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:1085-1096 [Conf]
  98. Hyun-Sook Cho, Bong-Hwan Lee, Kyu-Won Lee
    A Trust Management Model for PACS-Grid. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:1097-1106 [Conf]
  99. Jong-Myoung Kim, Young-Ju Han, Seon-Ho Park, Tai-Myoung Chung
    N-Dimensional Grid-Based Key Predistribution in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2007, pp:1107-1120 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002