2011
2011
Volume 5, Number 2, 2011 April
-
- Bouncer: Policy-Based Fine Grained Access Control in Large Databases, Lukasz Opyrchal, Jeff Cooper, Ryan Poyar, Brian Lenahan, Daniel Zeinner (pp. 1-16).
- Cyber Security Threats Detection Using Ensemble Architecture, Te-Shun Chou (pp. 17-32).
- Digital Watermarking Scheme Based on Fast Fourier Transformation for Audio Copyright Protection, Pranab Kumar Dhar, Jong-Myon Kim (pp. 33-48).
- Evaluation of Countermeasures Against Fault Attacks on Smart Cards, Ahmadou A. SERE, Julien Iguchi-Cartigny, Jean-Louis Lanet (pp. 49-60).
- Multibiometrics Feature Level Fusion by Graph Clustering, Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna KantaSing (pp. 61-74).
- Proxy Re-encryption with Keyword Search: New Definitions and Algorithms with Proofs, Wei-Chuen Yau, Raphael Phan, Swee-Huay Heng, Bok-Min Goi (pp. 75-90).