Digital Library
Vol. 8, No. 7, July 28, 2014
[Regular Papers]
Internet & Communications
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Secure MQAM scheme
- signal constellation hopping (SCH)
- amplitude distortion (AD) factor
- phase hopping (PH) factor
- secrecy gain
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Application-Level Traffic Classification
- Application identification
- Statistical Signature
- Signature-based Classification
- Statistics-based Classification
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Adaptive Pricing
- Nash equilibrium
- Non cooperative power control game
- SINR
- Transmission Power
- Wireless ad hoc networks.
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Scarcity heuristic
- Social Commerce
- momentary characteristic
- persistent attribute
- scarcity of time
- scarcity of quantity
- provisional coupon
Multimedia
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Depth Image-Based Rendering (DIBR)
- Linear depth quantization
- Domain division depth quantization
- multiview intermediate image generation
- 3D Display
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- multi-view video
- compression coding
- multi-view video coding
- temporal correlation
- inter-view correlation
- prediction
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Internet Security
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- denial-of-service (DoS) attacks
- application layer DoS attack
- admission control
- busy period
- attack flow detection
- Bloom Filter
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- cryptography
- Privacy/Authorization/Authentication
- Certificateless Identification
- standard model
- proof of security
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Archives