Zoom out Search Issue

www.signalprocessingsociety.org [17] MARCH 2015
Security Enhancement of Cooperative Single Carrier Systems http://dx.doi.org/10.1109/TIFS.2014.2360437 ....................................
............................................................. L. Wang, K. J. Kim, T. Q. Duong, M. Elkashlan, and H. V. Poor 90
Learning Fingerprint Reconstruction: From Minutiae to Image
http://dx.doi.org/10.1109/TIFS.2014.2363951 .......... K. Cao and A. K. Jain 104
An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration
http://dx.doi.org/10.1109/TIFS.2014.2364679 ............................................ C. Zhu, H. Nicanfar, V. C. M. Leung, and L. T. Yang 118
Smart Meter Privacy for Multiple Users in the Presence of an Alternative Energy Source
http://dx.doi.org/10.1109/TIFS.2014.2365365 .....
............................................................................................. J.
Gómez-Vilardebó and D. Gündüz 132
Implementation of a New Lightweight Encryption Design for Embedded Security
http://dx.doi.org/10.1109/TIFS.2014.2365734 .............
......................................................................................... G.
Bansod, N. Raval, and N. Pisharoty 142
A Privacy-Preserving Framework for Large-Scale Content-Based Information Retrieval
http://dx.doi.org/10.1109/TIFS.2014.2365998
......
................................................................... L. Weng, L. Amsaleg, A. Morton, and S. Marchand-Maillet 152
6RIWZDUH 3X]]OH $ &RXQWHUPHDVXUH WR 5HVRXUFH,QÁDWHG 'HQLDORI6HUYLFH $WWDFNV
http://dx.doi.org/10.1109/TIFS.2014.2366293 ..........
......................................................................................... Y. Wu, Z.
Zhao, F. Bao, and R. H. Deng 168
Time-Bound Anonymous Authentication for Roaming Networks
http://dx.doi.org/10.1109/TIFS.2014.2366300 .................................
...................................................... J. K. Liu, C.-K. Chu, S. S. M. Chow, X. Huang, M. H. Au, and J. Zhou 178
Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
http://dx.doi.org/10.1109/TIFS.2014.2368352 ............................................................. T. Jung, X.-Y. Li, Z. Wan, and M. Wan 190
:KDW <RX 6XEPLW ,V :KR <RX $UH $ 0XOWLPRGDO $SSURDFK IRU 'HDQRQ\PL]LQJ 6FLHQWLÀF 3XEOLFDWLRQV
http://dx.doi.org/10.1109/TIFS.2014.2368355 .................................... M. Payer, L. Huang, N. Z. Gong, K. Borgolte, and M. Frank 200
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
q
q
M
M
q
q
M
M
q
M
THE WORLD’S NEWSSTAND
®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
q
q
M
M
q
q
M
M
q
M
THE WORLD’S NEWSSTAND
®