Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
CIS
2006
Springer
10 years 5 months ago
A New Multi-objective Evolutionary Optimisation Algorithm: The Two-Archive Algorithm
Many Multi-Objective Evolutionary Algorithms (MOEAs) have been proposed in recent years. However, almost all MOEAs have been evaluated on problems with two to four objectives only...
Kata Praditwong, Xin Yao
CIS
2006
Springer
10 years 5 months ago
An Efficient Watermarking Technique Using ADEW and CBWT for Copyright Protection
In this paper, we propose an efficient watermarking technique using adaptive differential energy watermarking (ADEW) and cross binding wavelet tree (CBWT) for copyright protection....
Goo-Rak Kwon, Seung-Won Jung, Sung-Jea Ko
CIS
2006
Springer
10 years 5 months ago
A Key Distribution Scheme Based on Public Key Cryptography for Sensor Networks
Xiaolong Li, Yaping Lin, Siqing Yang, Yeqing Yi, J...
CIS
2006
Springer
10 years 5 months ago
Efficient Implementation of Tate Pairing on a Mobile Phone Using Java
Pairing-based cryptosystems (PBC) have been attracted by researchers in cryptography. Some implementations show that PBC are relatively slower than the standard public key cryptosy...
Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto
CIS
2006
Springer
10 years 5 months ago
Security and Privacy on Authentication Protocol for Low-Cost RFID
Yong-Zhen Li, Young-Bok Cho, Nam-Kyoung Um, Sang H...
CIS
2006
Springer
10 years 5 months ago
Senior Executives Commitment to Information Security - from Motivation to Responsibility
For senior executives, information security is a basic requirement for business success. Yet, despite being well-motivated, top managers often have only a superficial understandin...
Jorma Kajava, Juhani Anttila, Rauno Varonen, Reijo...
CIS
2006
Springer
10 years 5 months ago
A New Parallel Multiplier for Type II Optimal Normal Basis
In hardware implementation for the finite field, the use of normal basis has several advantages, especially the optimal normal basis is the most efficient to hardware implementati...
Chang Han Kim, Yongtae Kim, Sung Yeon Ji, IlWhan P...
CIS
2006
Springer
10 years 5 months ago
Variational Decomposition Model in Besov Spaces and Negative Hilbert-Sobolev Spaces
In this paper, we propose a new variational decomposition model which splits an image into two components: a first one containing the structure and a second one the texture or nois...
Min Li, Xiangchu Feng
CIS
2006
Springer
10 years 5 months ago
Ontology-Based RFID System Model for Supporting Semantic Consistency in Ubiquitous Environment
The emerging ubiquitous computing is changing the current computing paradigm, and it lets the ubiquitous RFID applications consistently and independently utilize the sensed inform...
Dongwon Jeong, Keunhwan Jeon, Jang-won Kim, Jinhyu...
books