Skip to main content
Large scale constrained problems 19 optimization 20 Decomposition approach 21 Variable interaction identification 22 2 3 a b s t r a c t 24 Cooperative Coevolutionary algorithms (CC) have been successful in solving large scale 25... more
    • by 
    • Engineering
Large scale optimization problems are very challenging problems. Most of the recently developed optimization algorithms lose their efficiency when the dimensionality of the problems increases. Decomposing a large scale problem into... more
    • by 
    •   2  
      MathematicsComputer Science
This paper proposes a chaotic fingerprint images encryption approach. An image of a fingerprint is encrypted via a twodimensional (2D) chaotic sequence obtained from multi-scroll chaotic attractors. Initial values of the chaotic... more
    • by 
    •   6  
      Applied MathematicsDesignAttractor TheoryNumerical Analysis
The core of bio-cryptography lies in the stability of cryptographic keys generated from uncertain biometrics. It is essential to minimize every possible uncertainty during the biometric feature extraction process. In fingerprint feature... more
    • by  and +1
    •   2  
      Information IntegrationComputers Security
Host-based anomaly intrusion detection system design is very challenging due to the notoriously high false alarm rate. This paper introduces a new host-based anomaly intrusion detection methodology using discontiguous system call... more
    • by 
    •   8  
      Computer ArchitectureDistributed ComputingComputer SecurityComputer Hardware
Biometric authentication systems can address the problems of genuine user verification and usability suffered by the conventional cryptosystems based on the password and token. However, as biometrics is not replaceable, its privacy has... more
    • by 
    •   2  
      CryptographyBiometric Authentication
The wide-spread use of mobile devices has made it possible to develop mobile voting system as a complement to the existing electronic voting system. However, due to limited onboard resource, it is challenging to achieve both efficiency... more
    • by 
    •   6  
      Electronic VotingCryptographyPublic key cryptographySystem Security
Cancelable (revocable) fingerprint templates have been proposed to protect fingerprint data. However, many of them have incurred significant authentication performance degradation. In this paper, we propose a cancelable fingerprint... more
    • by  and +1
    •   3  
      Smart CardsSmart CardMessage Authentication
In response to the call for papers 127 papers were submitted to the conference. These papers were evaluated on the basis of their significance, novelty, and technical quality. Each paper was reviewed by at least three members of the... more
    • by 
In this paper, we propose a method to directly estimate a camera's motion parameters by using normal flow vectors. In contrast to traditional methods, which tackle the problem by calculating optical flows or establishing motion... more
    • by 
    •   2  
      Cognitive ScienceElectrical and Electronic Engineering
In this paper, we aim to shed some light on the benefits and challenges brought about by using biometrics for securing mobile payments. Some potential solutions to address the challenges are also proposed and analyzed. Based on our... more
    • by  and +1
    •   2  
      Mobile CommerceCryptography
Identifying incomplete or partial fingerprints from a large fingerprint database remains a difficult challenge today. Existing studies on partial fingerprints focus on one-to-one matching using local ridge details. In this paper, we... more
    • by 
    •   4  
      Information SystemsAlgorithmsSpace perceptionElectrical and Electronic Engineering
An orientation model provides an analytical means for describing fingerprint ridge orientations. It can help in data storage and recovery as well as other possible communication applications related to biometric security. Since... more
    • by 
    •   7  
      TopologyCryptographyData HidingInternet Computing
Act (HIPAA) has set privacy and security regulations for the US healthcare industry. HIPAA has also established principles for security standards that global e-health industry tends to follow. In this paper, a hybrid public key... more
    • by 
    •   5  
      Public Key InfrastructureSecurity ManagementMutual AuthenticationSecurity Architecture
Current computer networks and systems are facing serious threats from cyber terrorism and crime, which cause huge financial loss and potential life hazard. Although these attack systems have become more easy-to-use, sophisticated, and... more
    • by 
    • Distributed Computing
    • by 
    •   2  
      Information SystemsDistributed Computing
h i g h l i g h t s • We have proposed a KP-ABE scheme with ''attribute privacy'' features. • We have introduced a general transformation from the KP-ABE scheme to the ABEKS scheme. • We have designed a secure ABEKS scheme by the... more
    • by 
    •   2  
      Information SystemsDistributed Computing
Being the most important critical infrastructure in Cyber-Physical Systems (CPSs), a smart grid exhibits the complicated nature of large scale, distributed and dynamic environment. Taxonomy of attacks is an effective tool in... more
    • by 
    • Distributed Computing
In this paper, we have proposed a fingerprint orientation model based on 2D Fourier expansions (FOMFE) in the phase plane. The FOMFE does not require prior knowledge of singular points (SPs). It is able to describe the overall ridge... more
    • by 
    •   6  
      AlgorithmsArtificial IntelligenceFingerprint AuthenticationFingerprint Recognition
Key management has become a challenging issue in the design and deployment of secure wireless sensor networks. A common assumption in most existing distributed key management schemes is that all sensor nodes have the same capability.... more
    • by 
    •   12  
      EngineeringDistributed ComputingRemote SensingMesh Networks