IEICE TRANSACTIONS on Information and Systems

Archive Index

Online ISSN : 1745-1361
Volume E95-D No.1  (Publication Date:2012/01/01)
Previous | 
Next
Special Section on Trust, Security and Privacy in Computing and Communication Systems

pp.1-1  FOREWORD  Open Access Paper
FOREWORD
Guojun WANG  
Summary | FreeFull Text:PDF(72.4KB)

pp.2-11  INVITED PAPER  Open Access Paper
A Survey on Privacy Frameworks for RFID Authentication
Chunhua SU  Yingjiu LI  Yunlei ZHAO  Robert H. DENG  Yiming ZHAO  Jianying ZHOU  
Summary | FreeFull Text:PDF(635.2KB)

pp.12-19  INVITED PAPER  Open Access Paper
Uncertainty Mitigation for Trustworthiness-Oriented Applications in Wireless Ad Hoc Networks
Feng LI  Jie WU  Avinash SRINIVASAN  
Summary | FreeFull Text:PDF(944.2KB)

pp.20-28  INVITED PAPER  Open Access Paper
A Systematic Approach to Evaluating the Trustworthiness of the Internet Inter-Domain Routing Information
Peidong ZHU  Huayang CAO  Wenping DENG  Kan CHEN  Xiaoqiang WANG  
Summary | FreeFull Text:PDF(601.3KB)

pp.29-37  PAPER-Trust
Authentication Trust Metric and Assessment for Federated Identity Management Systems
Hidehito GOMI  
Summary | Full Text:PDF (349KB) >>Buy this Article

pp.38-45  PAPER-Trust
A Fault-Tolerant Architecture with Error Correcting Code for the Instruction-Level Temporal Redundancy
Chao YAN  Hongjun DAI  Tianzhou CHEN  
Summary | Full Text:PDF (777.9KB) >>Buy this Article

pp.46-55  PAPER-Trust
Study on Network Vulnerability Identification and Equilibrated Network Immunization Strategy
Chi GUO  Li-na WANG  Xiao-ying ZHANG  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.56-66  PAPER-Trust
Accurate and Simplified Prediction of L2 Cache Vulnerability for Cost-Efficient Soft Error Protection
Yu CHENG  Anguo MA  Minxuan ZHANG  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.67-77  PAPER-Trust
Improving Data Confidentiality and Integrity for Data Aggregation in Wireless Sensor Networks
Rabindra BISTA  Yong-Ki KIM  Myoung-Seon SONG  Jae-Woo CHANG  
Summary | Full Text:PDF (926.8KB) >>Buy this Article

pp.78-93  PAPER-Security
A Secure E-Ticketing Scheme for Mobile Devices with Near Field Communication (NFC) That Includes Exculpability and Reusability
Arnau VIVES-GUASCH  Maria-Magdalena PAYERAS-CAPELLA  Macia MUT-PUIGSERVER  Jordi CASTELLA-ROCA  Josep-Lluis FERRER-GOMILA  
Summary | Full Text:PDF (868.4KB) >>Buy this Article

pp.94-107  PAPER-Security
Using Regional Routing to Improve the Scalability and Security of Inter-Domain Multipath Routing
Bin DAI  Feng WANG  Baokang ZHAO  Jinshu SU  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

pp.108-116  PAPER-Security
Secure and Robust Framework for ID/Locator Mapping System
Pedro MARTINEZ-JULIA  Antonio F. GOMEZ-SKARMETA  Ved P. KAFLE  Masugi INOUE  
Summary | Full Text:PDF (790KB) >>Buy this Article

pp.117-125  PAPER-Security
An Efficient and Secure Service Discovery Protocol for Ubiquitous Computing Environments
Jangseong KIM  Joonsang BAEK  Jianying ZHOU  Taeshik SHON  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.126-133  PAPER-Security
An Authentication Framework for Wireless Sensor Networks Using Identity-Based Signatures: Implementation and Evaluation
Rehana YASMIN  Eike RITTER  Guilin WANG  
Summary | Full Text:PDF (224.4KB) >>Buy this Article

pp.134-142  PAPER-Privacy
A Clustering K-Anonymity Scheme for Location Privacy Preservation
Lin YAO  Guowei WU  Jia WANG  Feng XIA  Chi LIN  Guojun WANG  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.143-151  PAPER-Privacy  Open Access Paper
Privacy-Enhancing Queries in Personalized Search with Untrusted Service Providers
Yunsang OH  Hyoungshick KIM  Takashi OBI  
Summary | FreeFull Text:PDF(473.3KB)

pp.152-160  PAPER-Privacy
A Privacy Protection Method for Social Network Data against Content/Degree Attacks
Min Kyoung SUNG  Ki Yong LEE  Jun-Bum SHIN  Yon Dohn CHUNG  
Summary | Full Text:PDF (1MB) >>Buy this Article

pp.161-168  PAPER-Privacy
A Privacy-Preserving Dynamic ID-Based Remote User Authentication Scheme with Access Control for Multi-Server Environment
Min-Hua SHAO  Ying-Chih CHIN  
Summary | Full Text:PDF (870.1KB) >>Buy this Article

pp.169-176  PAPER-Privacy
JXTAnonym: An Anonymity Layer for JXTA Services Messaging
Marc DOMINGO-PRIETO  Joan ARNEDO-MORENO  
Summary | Full Text:PDF (261.6KB) >>Buy this Article

pp.177-180  LETTER-Privacy
The Chain Effect for the Reputation-Based Trust Model in Peer-to-Peer Computing
Sinjae LEE  Wonjun LEE  
Summary | Full Text:PDF (416.7KB) >>Buy this Article

pp.181-184  LETTER-Privacy
Recipients' Anonymity in Multihop Ad-Hoc Networks
Helena RIFA-POUS  Emmanouil A. PANAOUSIS  Christos POLITIS  
Summary | Full Text:PDF (137.6KB) >>Buy this Article

pp.185-187  LETTER-Privacy
Efficient Sequential Architecture of AES CCM for the IEEE 802.16e
Jae Deok JI  Seok Won JUNG  Jongin LIM  
Summary | Full Text:PDF (245.5KB) >>Buy this Article

pp.188-191  LETTER-Privacy
Delay Attack-Resilient Clock Synchronization for Wireless Sensor Networks
Eui-Jik KIM  Jeongsik IN  Sungkwan YOUM  Chul-Hee KANG  
Summary | Full Text:PDF (211.6KB) >>Buy this Article

Regular Section

pp.192-204  PAPER-Computer System
Combinatorial Auction-Based Marketplace Mechanism for Cloud Service Reservation
Ikki FUJIWARA  Kento AIDA  Isao ONO  
Summary | Full Text:PDF (1.9MB) >>Buy this Article

pp.205-214  PAPER-Software System
Feature Location in Source Code by Trace-Based Impact Analysis and Information Retrieval
Zhengong CAI  Xiaohu YANG  Xinyu WANG  Aleksander J. KAVS  
Summary | Full Text:PDF (410.5KB) >>Buy this Article

pp.215-229  PAPER-Dependable Computing
On-the-Fly Trace Generation Approach to the Security Analysis of the TMN Protocol with Homomorphic Property: A Petri Nets-Based Method
Yongyuth PERMPOONTANALARP  Apichai CHANGKHANAK  
Summary | Full Text:PDF (589.3KB) >>Buy this Article

pp.230-238  PAPER-Educational Technology
A Method for Detecting Determiner Errors Designed for the Writing of Non-native Speakers of English
Ryo NAGATA  Atsuo KAWAI  
Summary | Full Text:PDF (158.3KB) >>Buy this Article

pp.239-246  PAPER-Speech and Hearing
Efficient Candidate Scheme for Fast Codebook Search in G.723.1
Rong-San LIN  Jia-Yu WANG  
Summary | Full Text:PDF (708.5KB) >>Buy this Article

pp.247-255  PAPER-Image Processing and Video Processing
Colorization Based Image Coding by Using Local Correlation between Luminance and Chrominance
Yoshitaka INOUE  Takamichi MIYATA  Yoshinori SAKAI  
Summary | Full Text:PDF (878.4KB) >>Buy this Article

pp.256-266  PAPER-Multimedia Pattern Processing
Foldable Augmented Maps
Sandy MARTEDI  Hideaki UCHIYAMA  Guillermo ENRIQUEZ  Hideo SAITO  Tsutomu MIYASHITA  Takenori HARA  
Summary | Full Text:PDF (1.8MB) >>Buy this Article

pp.267-270  LETTER-Software Engineering
Kernel Based Asymmetric Learning for Software Defect Prediction
Ying MA  Guangchun LUO  Hao CHEN  
Summary | Full Text:PDF (73KB) >>Buy this Article

pp.271-274  LETTER-Pattern Recognition
Sparsity Preserving Embedding with Manifold Learning and Discriminant Analysis
Qian LIU  Chao LAN  Xiao Yuan JING  Shi Qiang GAO  David ZHANG  Jing Yu YANG  
Summary | Full Text:PDF (239.6KB) >>Buy this Article

pp.275-279  LETTER-Image Processing and Video Processing
QDFA: Query-Dependent Feature Aggregation for Medical Image Retrieval
Yonggang HUANG  Dianfu MA  Jun ZHANG  Yongwang ZHAO  
Summary | Full Text:PDF (385KB) >>Buy this Article

pp.280-284  LETTER-Image Processing and Video Processing
Blind Adaptive Method for Image Restoration Using Microscanning
Jose L. LOPEZ-MARTINEZ  Vitaly KOBER  
Summary | Full Text:PDF (547.6KB) >>Buy this Article

pp.285-288  LETTER-Image Recognition, Computer Vision
A Fast Sub-Volume Search Method for Human Action Detection
Ping GUO  Zhenjiang MIAO  Xiao-Ping ZHANG  Zhe WANG  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

Previous | 
Next
go to Page Top