Non-Interactive Key Establishment for Bundle Security Protocol of Space DTNs / Xixiang Lv, Yi Mu, Hui Li
Gabor Ordinal Measures for Face Recognition / Zhenhua Chai, et al.
Building a Scalable System for Stealthy P2P-Botnet Detection / Junjie Zhang, et al.
Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation / Jiantao Zhou, et al.
Human Identity and Gender Recognition from Gait Sequences with Arbitrary Walking Directions / Jiwen Lu, Gang Wang, Pierre Moulin
A High Performance Fingerprint Matching System for Large Databases Based on GPU / Pablo David Gutierrez, et al.
Data-Centric OS Kernel Malware Characterization / Junghwaan Ree, et al.
Digital Image Sharing by Diverse Image Media / Kai-Hui Lee, Pei-Ling Chiu
Catch Me If You Can: evaluating Android anti-malware against transformation attacks / Vaibhav Rastogi, Yan Chen, Xuxian Jiang
Top-k Query Result Completeness Verification in Tiered Sensor Networks / Chia-Mu Yu, et al.
etc.