1 |
Chi-Yao Weng, Shiuh-Jeng Wang, Jonathan Liu, and Dushyant Goyal, "Prediciton-based reversible data hiding using empirical histograms in images," Transactions on Internet and Information Systems, vol. 6, no. 4, pp. 1248-1266, 2012./
|
|
2 |
M. Zuhairi, H. Zafar, and D. Harle, "Dynamic reverse route for on-demand routing protocol in MANET," KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, vol. 6, no. 5, pp. 1354-1372, 2012./
|
|
3 |
Yahui Wu, Su Deng, and Hongbin Huang, "Optimal control of two-hop routing in DTNs with time-varying selfish behavior," KSII Transactions on Internet and Information Systems, vol.6, no.9, Sep 2012./
|
|
4 |
W. A. Hassan, H. S. Jo, M. Nekovee, C. Y. Leow and T. A. Rahman, "Spectrum sharing method for cognitive radio in TV white spaces: enhancing spectrum sensing and geolocation database," KSII Trans. Internet and Information Systems, vol. 6, no. 8, pp. 1894-1912, Aug. 2012./
|
|
5 |
D. Xu, Z. Feng and P. Zhang, "Power allocation schemes for downlink cognitive radio networks with opportunistic sub-channel access," KSII Trans. Internet and Information Systems, vol. 6, no. 7, pp. 1777-1791, July 2012./
|
|
6 |
Zhu Jian-Qi, Fu Feng, Chong-kwon Kim, Yin Ke-xin and Liu Yan-Heng, "A DoS Detection Method Based on Composition Self-similarity," KSII Transactions on Internet and Information Systems, vol.6, no.5, pp. 1463-1478, May 2012./
|
|
7 |
Guiyi Wei, Xianbo Yang and Jun Shao, "Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol," KSII transactions on internet and information systems, Vol. 6, No.12, pp.3352-3365, Dec 2012./
|
|
8 |
Xixiang Lv and Hui Li, "Group Key Agreement From Signcryption," KSII transactions on internet and information systems, Vol. 6, No. 12, pp. 3338-3351, Dec 2012./
|
|
9 |
E. C. Lee and S. H. Son, "Anti-spoofing method for iris recognition by combining the optical and textural features of human eye," KSII Transactions on Internet and Information Systems, vol. 6, no. 9, pp. 2424-2441, 2012. http://dx.doi.org/10.3837/tiis.2012.09.026/
|
|
10 |
C. S. Chan, Y. Y. Tsai, and C. L. Liu, "An image hiding scheme by linking pixels in the circular Wa ," KSII Trans. On Internet and Information Systems, Vol.6, No.6, pp.1718-1734, 2012./
|
|