Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Electronic Science and Technology
1674-862X
2012 Issue 3
Special Issue on Network and Communication Security
Chin-Chen Chang;Ming-Shiang Hwang
..............page:193-194
Authentication Mechanism for Secret Sharing Using Boolean Operation
Yi-Hui Chen;Pei-Yu Lin
..............page:195-198
Elliptic Curve Point Multiplication by Generalized Mersenne Numbers
Tao Wu;Li-Tian Liu
..............page:199-208
Efficient Certificateless Aggregate Signature Scheme
Yu-Chi Chen;Gwoboa Horng;Chao-Liang Liu;Yuan-Yu Tsai;Chi-Shiang Chan
..............page:209-214
Wireless Application Protocol for Potential Threats to Mobile Agent Network Security
M. Indra Sena Reddy;K. Subba Reddy;P. J. Bhatt;Rajeev Chetwani
..............page:215-219
Bidirectional Background Modeling for Video Surveillance
Chih-Yang Lin;Wei-Wen Chang;Yung-Chen Chou
..............page:232-237
Reversible Data Embedding Scheme Using Relationships between Pixel-Values and Their Neighbors
Chia-Chen Lin;Chin-Chen Chang;Yi-Hui Chen
..............page:238-249
An Adaptive Steganographic Algorithm for Point Geometry Based on Nearest Neighbors Search
Yuan-Yu Tsai;Chi-Shiang Chan;Chao-Liang Liu
..............page:220-226
Using Hash Tree for Delegation Revocation in Grids
Chi-Tung Chen;Ming-Tsun Lin;Iuon-Chang Lin
..............page:256-262
Secure Digital Contents Distributing System on P2P Networks
Yi-Ju Lin;Ing-Chau Chang;Hung-Wen Yang;Chou-Chen Yang
..............page:263-268
Study of Intrusion Detection Systems
Li-Chin Huang;Min-Shiang Hwang
..............page:269-275
Sequential Pattern Technology for Visual Fire Detection
Yu-Chiang Li;Wei-Cheng Wu
..............page:276-280
New Feedback Architecture for VCO-Based Delta-Sigma ADCs Utilizing Phase Shifter
Ali Mohammadi;Ahmad Ayatollahi;Adib Abrishamifar
..............page:281-285
Information
..............page:286-287