Ilsun You, and Pankoo Kim Motivation-Based Risk Analysis Process for IT Systems, p.446 ,
Ksiezopolski Formalizing Information Flow Control in a Model-Driven Approach, p.456 ,
Reif Security Assessment of Computer Networks Based on Attack Graphs and Security Events, p.462 ,
Pipeline Optimization Model for QKD Post-processing System, p.472 ,
Baokang Zhao, and Bo Liu Privacy and Trust Management Aggregation of Network Protocol Data Near Its Source, p.482 ,
526 Bogdan Ksiezopolski, Adam Wierzbicki, and Damian Rusinek Cryptography Efficient Variant of Rainbow without Triangular Matrix Representation, p.532 ,
Banerjee An Algorithm to Analyze Non-injective, p.576 ,
and Fangguo Zhang Implementation of Efficient Operations over GF (2 32 ) Using Graphics Processing Units, p.602 ,
Jianfeng Ma Table of Contents XXI Multimedia Security High-Quality Reversible Data Hiding Approach Based on Evaluating Multiple Prediction Methods, p.622 ,
633 Ya-Ting Chang, Min-Hao Wu, and Shiuh-Jeng Wang Experimental Evaluation of an Algorithm for the Detection of, Tampered JPEG Images, p.643 ,
Ferraro Petrillo Dependable Systems and Applications A Semantic-Based Malware Detection System Design Based on Channels, p.653 ,
Baokang Zhao, and Hao Sun An Efficient Semantic-Based Organization and Similarity Search Method for Internet Data Resources, p.663 ,
Baokang Zhao, and Chunqing Wu Efficient DVFS to Prevent Hard Faults for Many-Core Architectures, p.674 ,