We use cookies to improve your experience with our site.

Algebraic Construction for Zero-Knowledge Sets
Rui Xue, Ning-Hui Li, Jiang-Tao Li
2008, 23(2): 166-175.
Abstract
WWW Business Applications Based on the Cellular Model
Toshio Kodama, Tosiyasu L. Kunii, Yoichi Seki
2008, 23(2): 176-187.
Abstract
An Efficient Clustering Algorithm for k-Anonymisation
Grigorios Loukides, Jian-Hua Shao
2008, 23(2): 188-202.
Abstract
Competitive Analysis of Two Special Online Device Replacement Problems
Chun-Lin Xin, Wei-Min Ma, Lei Yang
2008, 23(2): 203-213.
Abstract
Cryptanalysis of a Type of CRT-Based RSA Algorithms
Bao-Dong Qin, Ming Li, Fan-Yu Kong
2008, 23(2): 214-221.
Abstract
WNN-Based Network Security Situation Quantitative Prediction Method and Its Optimization
Ji-Bao Lai, Hui-Qiang Wang, Xiao-Wu Liu, Ying Liang, Rui-Juan Zheng, Guo-Sheng Zhao
2008, 23(2): 222-230.
Abstract
Constructing Maximum Entropy Language Models for Movie Review Subjectivity Analysis
Bo Chen, Hui He, Jun Guo
2008, 23(2): 231-239.
Abstract
Generic Transformation from Weakly to Strongly Unforgeable Signatures
Qiong Huang, Duncan S. Wong, Jin Li, Yi-Ming Zhao
2008, 23(2): 240-252.
Abstract
New Sealed-Bid Electronic Auction with Fairness, Security and Efficiency
Chia-Chi Wu, Chin-Chen Chang, Iuon-Chang Lin
2008, 23(2): 253-264.
Abstract
Forgeability of Wang-Tang-Li s ID-Based Restrictive Partially Blind Signature Scheme
Sheng-Li Liu, Xiao-Feng Chen, Fang-Guo Zhang
2008, 23(2): 265-269.
Abstract
A Robust and Fast Non-Local Means Algorithm for Image Denoising
Yan-Li Liu, Jin Wang, Xi Chen, Yan-Wen Guo, Qun-Sheng Peng
2008, 23(2): 270-279.
Abstract
Transition Texture Synthesis
Yueh-Yi Lai, Wen-Kai Tai
2008, 23(2): 280-289.
Abstract
Proper Reparametrization of Rational Ruled Surface
Jia Li, Li-Yong Shen, Xiao-Shan Gao
2008, 23(2): 290-297.
Abstract
Chip Multithreaded Consistency Model
Zu-Song Li, Dan-Dan Huan, Wei-Wu Hu, Zhi-Min Tang
2008, 23(2): 298-305.
Abstract