Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II / Edition 1

Paperback (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $30.50
Usually ships in 1-2 business days
(Save 86%)
Other sellers (Paperback)
  • All (4) from $30.50   
  • New (1) from $188.17   
  • Used (3) from $30.50   
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any coupons and promotions
Seller since 2007

Feedback rating:



New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.


Ships from: Avenel, NJ

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Sort by


The two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2005, held in Xi'an, China, in December 2005. The 338 revised papers presented - 254 regular and 84 extended papers - were carefully reviewed and selected from over 1800 submissions. The first volume is organized in topical sections on learning and fuzzy systems, evolutionary computation, intelligent agents and systems, intelligent information retrieval, support vector machines, swarm intelligence, data mining, pattern recognition, and applications. The second volume is subdivided in topical sections on cryptography and coding, cryptographic protocols, intrusion detection, security models and architecture, security management, watermarking and information hiding, web and network applications, image and signal processing, and applications.

Read More Show Less

Product Details

Table of Contents

Cryptography and Coding.- A Fast Inversion Algorithm and Low-Complexity Architecture over GF(2 m ).- An ID-Based Optimistic Fair Signature Exchange Protocol from Pairings.- FMS Attack-Resistant WEP Implementation Is Still Broken.- Design of a New Kind of Encryption Kernel Based on RSA Algorithm.- On the Security of Condorcet Electronic Voting Scheme.- Special Distribution of the Shortest Linear Recurring Sequences in Z /(p) Field.- Cryptanalysis of a Cellular Automata Cryptosystem.- A New Conceptual Framework Within Information Privacy: Meta Privacy.- Error Oracle Attacks on Several Modes of Operation.- Stability of the Linear Complexity of the Generalized Self-shrinking Sequences.- On the Construction of Some Optimal Polynomial Codes.- Perceptual Hashing of Video Content Based on Differential Block Similarity.- Cryptographic Protocols.- Secure Software Smartcard Resilient to Capture.- Revised Fischlin’s (Blind) Signature Schemes.- Certificateless Threshold Signature Schemes.- An Efficient Certificateless Signature Scheme.- ID-Based Restrictive Partially Blind Signatures.- Batch Verification with DSA-Type Digital Signatures for Ubiquitous Computing.- On Anonymity of Group Signatures.- The Running-Mode Analysis of Two-Party Optimistic Fair Exchange Protocols.- Password-Based Group Key Exchange Secure Against Insider Guessing Attacks.- On the Security of Some Password-Based Key Agreement Schemes.- A New Group Rekeying Method in Secure Multicast.- Pairing-Based Provable Blind Signature Scheme Without Random Oracles.- Efficient ID-Based Proxy Signature and Proxy Signcryption Form Bilinear Pairings.- An Identity-Based Threshold Signcryption Scheme with Semantic Security.- A Token-Based Single Sign-On Protocol.- Simple Threshold RSA Signature Scheme Based on Simple Secret Sharing.- Efficient Compilers for Authenticated Group Key Exchange.- Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys.- Intrusion Detection.- An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks.- A New User-Habit Based Approach for Early Warning of Worms.- A Multi-gigabit Virus Detection Algorithm Using Ternary CAM.- Sampling Distance Analysis of Gigantic Data Mining for Intrusion Detection Systems.- Hardware-Software Hybrid Packet Processing for Intrusion Detection Systems.- D-S Evidence Theory and Its Data Fusion Application in Intrusion Detection.- A New Network Anomaly Detection Technique Based on Per-Flow and Per-Service Statistics.- SoIDPS: Sensor Objects-Based Intrusion Detection and Prevention System and Its Implementation.- A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services.- Tamper Detection for Ubiquitous RFID-Enabled Supply Chain.- Measuring the Histogram Feature Vector for Anomaly Network Traffic.- Efficient Small Face Detection in Surveillance Images Using Major Color Component and LDA Scheme.- Fast Motion Detection Based on Accumulative Optical Flow and Double Background Model.- Reducing Worm Detection Time and False Alarm in Virus Throttling.- Protection Against Format String Attacks by Binary Rewriting.- Masquerade Detection System Based on Principal Component Analysis and Radial Basics Function.- Anomaly Detection Method Based on HMMs Using System Call and Call Stack Information.- Parallel Optimization Technology for Backbone Network Intrusion Detection System.- Attack Scenario Construction Based on Rule and Fuzzy Clustering.- A CBR Engine Adapting to IDS.- Application of Fuzzy Logic for Distributed Intrusion Detection.- Security Models and Architecture.- Dynamic Access Control for Pervasive Grid Applications.- On the Security of the Canetti-Krawczyk Model.- A Novel Architecture for Detecting and Defending Against Flooding-Based DDoS Attacks.- A Variant of Poly1305 MAC and Its Security Proof.- Covert Channel Identification Founded on Information Flow Analysis.- Real-Time Risk Assessment with Network Sensors and Intrusion Detection Systems.- Design and Implementation of a Parallel Crypto Server.- Survivability Computation of Networked Information Systems.- Assessment of Windows System Security Using Vulnerability Relationship Graph.- A New (t, n)-Threshold Multi-secret Sharing Scheme.- An Efficient Message Broadcast Authentication Scheme for Sensor Networks.- Digital Image Authentication Based on Error-Correction Codes.- Design and Implementation of Efficient Cipher Engine for IEEE 802.11i Compatible with IEEE 802.11n and IEEE 802.11e.- Secure Delegation-by-Warrant ID-Based Proxy Signcryption Scheme.- Building Security Requirements Using State Transition Diagram at Security Threat Location.- Study on Security iSCSI Based on SSH.- A Scheduling Algorithm Based on a Trust Mechanism in Grid.- Enhanced Security and Privacy Mechanism of RFID Service for Pervasive Mobile Device.- Worm Propagation Modeling and Analysis on Network.- An Extensible AAA Infrastructure for IPv6.- The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11i.- A Noble Key Pre-distribution Scheme with LU Matrix for Secure Wireless Sensor Networks.- Security Management.- A Virtual Bridge Certificate Authority Model.- Weak Signals in Information Security Management.- PDTM: A Policy-Driven Trust Management Framework in Distributed Systems.- Methodology of Quantitative Risk Assessment for Information System Security.- A Secure and Efficient (t, n) Threshold Verifiable Multi-secret Sharing Scheme.- Improvement on an Optimized Protocol for Mobile Network Authentication and Security.- Neural Network Based Flow Forecast and Diagnosis.- Protecting Personal Data with Various Granularities: A Logic-Based Access Control Approach.- Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function.- Topology-Based Macroscopical Response and Control Technology for Network Security Event.- Watermarking and Information Hiding.- Adaptive Hiding Scheme Based on VQ-Indices Using Commutable Codewords.- Reversible Data Hiding for Image Based on Histogram Modification of Wavelet Coefficients.- An Image Steganography Using Pixel Characteristics.- Alternatives for Multimedia Messaging System Steganography.- Error Concealment for Video Transmission Based on Watermarking.- Applying the AES and Its Extended Versions in a General Framework for Hiding Information in Digital Images.- An Image Hiding Algorithm Based on Bit Plane.- A Blind Audio Watermarking Algorithm Robust Against Synchronization Attack.- Semi-fragile Watermarking Algorithm for Detection and Localization of Temper Using Hybrid Watermarking Method in MPEG-2 Video.- Public Watermarking Scheme Based on Multiresolution Representation and Double Hilbert Scanning.- Performance Evaluation of Watermarking Techniques for Secure Multimodal Biometric Systems.- An Improvement of Auto-correlation Based Video Watermarking Scheme Using Independent Component Analysis.- A Digital Watermarking Technique Based on Wavelet Packages.- A Spectral Images Digital Watermarking Algorithm.- Restoration in Secure Text Document Image Authentication Using Erasable Watermarks.- Web and Network Applications.- The Study of RED Algorithm Used Multicast Router Based Buffer Management.- Genetic Algorithm Utilized in Cost-Reduction Driven Web Service Selection.- MacroOS: A Pervasive Computing Platform Supporting Context Awareness and Context Management.- A Frame for Selecting Replicated Multicast Servers Using Genetic Algorithm.- On a Novel Methodology for Estimating Available Bandwidth Along Network Paths.- A New AQM Algorithm for Enhancing Internet Capability Against Unresponsive Flows.- Client Server Access: Wired vs. Wireless LEO Satellite-ATM Connectivity; A (MS-Ro-BAC) Experiment.- An Algorithm for Automatic Inference of Referential Integrities During Translation from Relational Database to XML Schema.- A Fuzzy Integral Method to Merge Search Engine Results on Web.- The Next Generation PARLAY X with QoS/QoE.- A Design of Platform for QoS-Guaranteed Multimedia Services Provisioning on IP-Based Convergence Network.- of Knowledge Management System for Technical Support in Construction Industries.- An Event Correlation Approach Based on the Combination of IHU and Codebook.- Image and Signal Processing.- Face Recognition Based on Support Vector Machine Fusion and Wavelet Transform.- A Dynamic Face and Fingerprint Fusion System for Identity Authentication.- Image Recognition for Security Verification Using Real-Time Joint Transform Correlation with Scanning Technique.- Binarized Revocable Biometrics in Face Recognition.- Short Critical Area Computational Method Using Mathematical Morphology.- A Robust Lane Detection Approach Based on MAP Estimate and Particle Swarm Optimization.- MFCC and SVM Based Recognition of Chinese Vowels.- A Spatial/Frequency Hybrid Vector Quantizer Based on a Classification in the DCT Domain.- Removing of Metal Highlight Spots Based on Total Variation Inpainting with Multi-sources-flashing.- Component-Based Online Learning for Face Detection and Verification.- SPIHT Algorithm Based on Fast Lifting Wavelet Transform in Image Compression.- Modified EZW Coding for Stereo Residual.- Optimal Prototype Filters for Near-Perfect-Reconstruction Cosine-Modulated Filter Banks.- Fast Motion Estimation Scheme for Real Time Multimedia Streaming with H.264.- Motion-Compensated 3D Wavelet Video Coding Based on Adaptive Temporal Lifting Filter Implementation.- Accurate Contouring Technique for Object Boundary Extraction in Stereoscopic Imageries.- Robust Object Tracking Based on Uncertainty Factorization Subspace Constraints Optical Flow.- Bearings-Only Target Tracking Using Node Selection Based on an Accelerated Ant Colony Optimization.- Image Classification and Delineation of Fragments.- A Novel Wavelet Image Coding Based on Non-uniform Scalar Quantization.- A General Image Based Nematode Identification System Design.- A Novel SVD-Based RLS Blind Adaptive Multiuser Detector for CDMA Systems.- New Electronic Digital Image Stabilization Algorithm in Wavelet Transform Domain.- Line Segments and Dominate Points Detection Based on Hough Transform.- The Study of the Auto Color Image Segmentation.- Regularized Image Restoration by Means of Fusion for Digital Auto Focusing.- Fast Ray-Space Interpolation Based on Occlusion Analysis and Feature Points Detection.- Non-parametric ICA Algorithm for Hybrid Sources Based on GKNN Estimation.- SUSAN Window Based Cost Calculation for Fast Stereo Matching.- An Efficient Adaptive De-blocking Algorithm.- Facial Features Location by Analytic Boosted Cascade Detector.- New Approach for Segmentation and Pattern Recognition of Jacquard Images.- Nonstationarity of Network Traffic Within Multi-scale Burstiness Constraint.- Principle of Image Encrypting Algorithm Based on Magic Cube Transformation.- A Study on Motion Prediction and Coding for In-Band Motion Compensated Temporal Filtering.- Adaptive Sampling for Monte Carlo Global Illumination Using Tsallis Entropy.- Applications.- Incremental Fuzzy Decision Tree-Based Network Forensic System.- Robust Reliable Control for a Class of Fuzzy Dynamic Systems with Time-Varying Delay.- Using Concept Taxonomies for Effective Tree Induction.- A Similarity-Based Recommendation Filtering Algorithm for Establishing Reputation-Based Trust in Peer-to-Peer Electronic Communities.- Automatic Classification of Korean Traditional Music Using Robust Multi-feature Clustering.- A Private and Efficient Mobile Payment Protocol.- Universal Designated-Verifier Proxy Blind Signatures for E-Commerce.- An Efficient Control Method for Elevator Group Control System.- Next Generation Military Communication Systems Architecture.- Early Warning for Network Worms.- Skeleton Representation of Character Based on Multiscale Approach.- Channel Equalization Based on Two Weights Neural Network.- Assessment of Uncertainty in Mineral Prospectivity Prediction Using Interval Neutrosophic Set.- Ring-Based Anonymous Fingerprinting Scheme.- Scalable and Robust Fingerprinting Scheme Using Statistically Secure Extension of Anti-collusion Code.- Broadcast Encryption Using Identity-Based Public-Key Cryptosystem.- Multimedia Digital Right Management Using Selective Scrambling for Mobile Handset.- Design and Implementation of Crypto Co-processor and Its Application to Security Systems.- Continuous Speech Research Based on HyperSausage Neuron.- Variable-Rate Channel Coding for Space-Time Coded MIMO System.- A New Watermarking Method Based on DWT.- Efficient Point Rendering Method Using Sequential Level-of-Detail.- Construction of a Class of Compactly Supported Biorthogonal Multiple Vector-Valued Wavelets.- Metabolic Visualization and Intelligent Shape Analysis of the Hippocampus.- Characteristic Classification and Correlation Analysis of Source-Level Vulnerabilities in the Linux Kernel.
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)