pp.12-19INVITED PAPEROpen Access Paper Uncertainty Mitigation for Trustworthiness-Oriented Applications in Wireless Ad Hoc Networks Feng LIJie WUAvinash SRINIVASAN
pp.38-45PAPER-Trust A Fault-Tolerant Architecture with Error Correcting Code for the Instruction-Level Temporal Redundancy Chao YANHongjun DAITianzhou CHEN
pp.56-66PAPER-Trust Accurate and Simplified Prediction of L2 Cache Vulnerability for Cost-Efficient Soft Error Protection Yu CHENGAnguo MAMinxuan ZHANG
pp.94-107PAPER-Security Using Regional Routing to Improve the Scalability and Security of Inter-Domain Multipath Routing Bin DAIFeng WANGBaokang ZHAOJinshu SU
pp.126-133PAPER-Security An Authentication Framework for Wireless Sensor Networks Using Identity-Based Signatures: Implementation and Evaluation Rehana YASMINEike RITTERGuilin WANG
pp.143-151PAPER-PrivacyOpen Access Paper Privacy-Enhancing Queries in Personalized Search with Untrusted Service Providers Yunsang OHHyoungshick KIMTakashi OBI
pp.161-168PAPER-Privacy A Privacy-Preserving Dynamic ID-Based Remote User Authentication Scheme with Access Control for Multi-Server Environment Min-Hua SHAOYing-Chih CHIN
pp.215-229PAPER-Dependable Computing On-the-Fly Trace Generation Approach to the Security Analysis of the TMN Protocol with Homomorphic Property: A Petri Nets-Based Method Yongyuth PERMPOONTANALARPApichai CHANGKHANAK
pp.230-238PAPER-Educational Technology A Method for Detecting Determiner Errors Designed for the Writing of Non-native Speakers of English Ryo NAGATAAtsuo KAWAI
pp.247-255PAPER-Image Processing and Video Processing Colorization Based Image Coding by Using Local Correlation between Luminance and Chrominance Yoshitaka INOUETakamichi MIYATAYoshinori SAKAI
pp.280-284LETTER-Image Processing and Video Processing Blind Adaptive Method for Image Restoration Using Microscanning Jose L. LOPEZ-MARTINEZVitaly KOBER