Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ISCC
ISCC 2015
Generate Citations
2015 IEEE Symposium on Computers and Communication (ISCC)
July 6 2015 to July 9 2015
Larnaca, Cyprus
Table of Contents
Index
Freely available from IEEE.
pp. 1-1
Program
Freely available from IEEE.
pp. 1-28
Committees
Freely available from IEEE.
pp. 1-5
Performance analysis of a rate-adaptive bandwidth allocation scheme in 5G mobile networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Demetris Posnakides
,
Constandinos X. Mavromoustakis
,
Georgios Skourletopoulos
,
George Mastorakis
,
Evangelos Pallis
,
Jordi Mongay Batalla
Game-theoretic based scheduling for demand-side management in 5G smart grids
Full-text access may be available. Sign in or learn about subscription options.
pp. 8-12
by
Firooz B. Saghezchi
,
Fatemeh B. Saghezchi
,
Alberto Nascimento
,
Jonathan Rodriguez
Relaying for 5G: A novel low-error relaying protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-18
by
Chunbo Luo
,
Gerard Parr
,
Sally McClean
,
Cathryn Peoples
,
Xinheng Wang
,
James Nightingale
,
Qi Wang
A map-based platform for smart mobility services
Full-text access may be available. Sign in or learn about subscription options.
pp. 19-24
by
Pietro Marchetta
,
Eduard Natale
,
Antonio Pescape
,
Alessandro Salvi
,
Stefania Santini
Advanced observation and telemetry heart system utilizing wearable ECG device and a Cloud platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-30
by
Ioannis Chatzigiannakis
,
Emil Stoyanov Valchinov
,
Athanasios Antoniou
,
Athanasios Kalogeras
,
Christos Alexakos
,
Panagiotis Konstantinopoulos
Federated data centers as smart city stabilizing factors
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-37
by
Alexis I. Aravanis
,
Terpsichori-Helen Velivassaki
,
Artemis Voulkidis
,
Theodore Zahariadis
,
Panayotis G. Cottis
Design and implement delay-aware QoS scheme for 3GPP LTE/LTE-A networks for mixed traffic flow
Full-text access may be available. Sign in or learn about subscription options.
pp. 38-44
by
Myasar R. Tabany
,
Chris G. Guy
Advanced vehicular sensing of road artifacts and driver behavior
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-49
by
Najah AbuAli
Benchmarking leading-edge mobile devices for data-intensive distributed mobile cloud applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 50-57
by
Nayyab Zia Naqvi
,
Tim Vansteenkiste-Muylle
,
Yolande Berbers
Performance of two-hop routing in delay tolerant networks with selfish nodes
Full-text access may be available. Sign in or learn about subscription options.
pp. 58-63
by
Yahui Wu
,
Hongbin Huang
,
Su Deng
,
Chaofan Dai
A first study on using MPTCP to reduce latency for cloud based mobile applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 64-69
by
Karl-Johan Grinnemo
,
Anna Brunstrom
A probabilistic model to corroborate three attacks in vehicular ad hoc networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 70-75
by
Laroussi Karim
,
Amar Bensaber Boucif
,
Mesfioui Mhamed
,
Biskri Ismail
Online electric vehicle recharge scheduling under different e-mobility operator's pricing models
Full-text access may be available. Sign in or learn about subscription options.
pp. 76-82
by
Isabel Amigo
,
Maurice Gagnaire
Fair pricing mechanism for coalitions in rural areas
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-90
by
Vasileios Botsis
,
Nikolaos D. Doulamis
,
Emmanouel Varvarigos
Demand allocation in local RES electricity market among multiple microgrids and multiple utilities through aggregators
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-98
by
Vasileios Botsis
,
Nikolaos D. Doulamis
,
Anastasios D. Doulamis
,
Emmanouel Varvarigos
Evaluating a cloud federation ecosystem to reduce carbon footprint by moving computational resources
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-104
by
Maurizio Giacobbe
,
Antonio Celesti
,
Maria Fazio
,
Massimo Villari
,
Antonio Puliafito
RT-SENMOS: Reliable transport for sensor networks with mobile sinks
Full-text access may be available. Sign in or learn about subscription options.
pp. 105-110
by
Charilaos Stais
,
George Xylomenos
Utilizing CAN-Bus and smartphones to enforce safe and responsible driving
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-115
by
Abd-Elhamid M. Taha
,
Nidal Nasser
Distributed delivery of popular videos over Ultra-dense networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 116-121
by
Chia-Cheng Yen
,
Jia-Shung Wang
Time Petri Nets for performance evaluation of composite web services architectures
Full-text access may be available. Sign in or learn about subscription options.
pp. 122-127
by
Abdelkrim Abdelli
,
Walid Serrai
,
Lynda Mokdad
,
Youcef Hammal
Extensive analysis of the Kad-based distributed computing system DuDE
Full-text access may be available. Sign in or learn about subscription options.
pp. 128-133
by
Peter Danielis
,
Jan Skodzik
,
Vlado Altmann
,
Benjamin Kappel
,
Dirk Timmermann
A comparative study of mobile database transaction models
Full-text access may be available. Sign in or learn about subscription options.
pp. 134-139
by
Ramzi A. Haraty
Unequal error protection for S3AC coding based on expanding window fountain codes
Full-text access may be available. Sign in or learn about subscription options.
pp. 140-145
by
Liuyue Su
,
Ge Gao
,
Cheng Yang
,
Ruimin Hu
,
Xiaochen Wang
,
Liuyue Su
,
Ge Gao
,
Ruimin Hu
,
Xiaochen Wang
,
Cheng Yang
,
Xin Su
Forensic analysis of instagram and path on an iPhone 5s mobile device
Full-text access may be available. Sign in or learn about subscription options.
pp. 146-151
by
Reema Al Mushcab
,
Pavel Gladyshev
Inferring relevance and presence of evidence in service-oriented and SaaS architectures
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-159
by
Sameera Almulla
,
Youssef Iraqi
,
Stephen D. Wolthusen
Genetic algorithm based intrusion detection system for wireless body area networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 160-165
by
Geethapriya Thamilarasu
Social-based forwarding in multi-channel vehicular networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 166-173
by
Matthias Sander Frigau
A shim layer for heterogeneous wireless communications scheduling in intelligent transport systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 174-179
by
Cristian Roman
,
Peter Ball
,
Shumao Ou
Internet of Things: Security vulnerabilities and challenges
Full-text access may be available. Sign in or learn about subscription options.
pp. 180-187
by
Ioannis Andrea
,
Chrysostomos Chrysostomou
,
George Hadjichristofi
Distributed sensor network for vehicles with prior right detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 188-192
by
Robert Zalman
,
Jan Kapitulik
,
Michal Kochlan
Monitoring of water level based on acoustic emissions
Full-text access may be available. Sign in or learn about subscription options.
pp. 193-197
by
Juraj Micek
,
Ondrej Karpis
,
Veronika Olesnanikova
,
Michal Kochlan
Monitoring and recognition of bird population in protected bird territory
Full-text access may be available. Sign in or learn about subscription options.
pp. 198-203
by
Michal Hodon
,
Peter Sarafin
,
Peter Sevcik
Maximizing performance of low-power WSN node on the basis of event-driven-programming approach: Minimization of operational energy costs of WSN node control unit
Full-text access may be available. Sign in or learn about subscription options.
pp. 204-209
by
Michal Hodon
,
Michal Chovanec
,
Lukas Cechovic
,
Martin Hudik
,
Jana Milanova
,
Michal Kochlan
,
Matua Jurecka
,
Jan Kapitulik
,
Peter Sevcik
Discovery of services in smart cities of mobile social users
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-215
by
Michele Girolami
,
Stefano Chessa
,
Erina Ferro
Encryption as a service for smart grid advanced metering infrastructure
Full-text access may be available. Sign in or learn about subscription options.
pp. 216-221
by
Md. Mahmud Hasan
,
Hussein T. Mouftah
Smartphones as smart cities sensors: MCS scheduling in the ParticipAct project
Full-text access may be available. Sign in or learn about subscription options.
pp. 222-228
by
Antonio Corradi
,
Giovanni Curatola
,
Luca Foschini
,
Raffaele Ianniello
,
Carlos Roberto De Rolt
Finding contextual clues to malware using a large corpus
Full-text access may be available. Sign in or learn about subscription options.
pp. 229-236
by
Neil C. Rowe
Forensic analysis of windows user space applications through heap allocations
Full-text access may be available. Sign in or learn about subscription options.
pp. 237-244
by
Michael Cohen
Events and causal factors charting of kernel traces for root cause analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 245-250
by
Yi-Ching Liao
,
Hanno Langweg
High performance fault-tolerance for clouds
Full-text access may be available. Sign in or learn about subscription options.
pp. 251-257
by
Dimosthenis Kyriazis
,
Vasileios Anagnostopoulos
,
Andrea Arcangeli
,
David Gilbert
,
Dimitrios Kalogeras
,
Ronen Kat
,
Cristian Klein
,
Panagiotis Kokkinos
,
Yossi Kuperman
,
Joel Nider
,
Petter Svard
,
Luis Tomas
,
Emmanuel Varvarigos
,
Theodora Varvarigou
Costs of a federated and hybrid cloud environment aimed at MapReduce video transcoding
Full-text access may be available. Sign in or learn about subscription options.
pp. 258-263
by
Alfonso Panarello
,
Antonio Celesti
,
Maria Fazio
,
Antonio Puliafito
,
Massimo Villari
Exploiting the FIWARE cloud platform to develop a remote patient monitoring system
Full-text access may be available. Sign in or learn about subscription options.
pp. 264-270
by
Maria Fazio
,
Antonio Celesti
,
Fermin Galan Marquez
,
Alex Glikson
,
Massimo Villari
On QoS-aware scheduling of data stream applications over fog computing infrastructures
Full-text access may be available. Sign in or learn about subscription options.
pp. 271-276
by
Valeria Cardellini
,
Vincenzo Grassi
,
Francesco Lo Presti
,
Matteo Nardelli
A message-based incentive mechanism for opportunistic networking applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 277-282
by
Vinicius F. S. Mota
,
Daniel F. Macedo
,
Yacine Ghamri-Doudane
,
Jose Marcos S. Nogueira
Energy-efficient base station management in heterogeneous networking environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 283-288
by
Georgios Kyriazis
,
Angelos Rouskas
,
George T. Karetsos
A two-dimensional structured overlay based on flexible routing tables
Full-text access may be available. Sign in or learn about subscription options.
pp. 289-294
by
Masashi Hojo
,
Hiroya Nagao
,
Takehiro Miyao
,
Kazuyuki Shudo
Discovering high-impact routing events using traceroutes
Full-text access may be available. Sign in or learn about subscription options.
pp. 295-300
by
Marco Di Bartolomeo
,
Valentino Di Donato
,
Maurizio Pizzonia
,
Claudio Squarcella
,
Massimo Rimondini
A fine-tuned control-theoretic approach for dynamic adaptive streaming over HTTP
Full-text access may be available. Sign in or learn about subscription options.
pp. 301-308
by
Maria Silvia Ito
,
Daniel Bezerra
,
Stenio Fernandes
,
Djamel Sadok
,
Geza Szabo
Modeling user interactions for conversion rate prediction in M-Commerce
Full-text access may be available. Sign in or learn about subscription options.
pp. 309-314
by
Gianni Fenu
,
Pier Luigi Pau
App2net: A platform to transfer and configure applications on programmable virtual networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 315-322
by
Ricardo Luis dos Santos
,
Oscar Mauricio Caicedo Rendon
,
Juliano Araujo Wickboldt
,
Lisandro Zambenedetti Granville
A novel tool for cost-efficient broadband development through infrastructure sharing
Full-text access may be available. Sign in or learn about subscription options.
pp. 323-328
by
Konstantinos Antonis
,
Christos Bouras
,
Georgios Diles
,
Vasileios Kokkinos
,
Leonidas Loukopoulos
Benchmarking the load scalability of IPv6 transition technologies: A black-box analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 329-334
by
Marius Georgescu
,
Hiroaki Hazeyama
,
Takeshi Okuda
,
Youki Kadobayashi
,
Suguru Yamaguchi
A lightweight, non-intrusive approach for orchestrating autonomously-managed network elements
Full-text access may be available. Sign in or learn about subscription options.
pp. 335-340
by
Christos Liaskos
Analysing traffic flows through sampling: A comparative study
Full-text access may be available. Sign in or learn about subscription options.
pp. 341-346
by
Joao Marco C. Silva
,
Paulo Carvalho
,
Solange Rito Lima
Improving network traffic acquisition and processing with the Java Virtual Machine
Full-text access may be available. Sign in or learn about subscription options.
pp. 347-352
by
Ruediger Gad
,
Martin Kappes
,
Inmaculada Medina-Bulo
Prediction-based connection manager for vehicular networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 353-358
by
Joao Mendes
,
Filipe Neves
,
Ricardo Matos
,
Susana Sargento
On the performance of localization prediction methods for vehicular Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 359-364
by
Leandro N. Balico
,
Horacio A. B. F. Oliveira
,
Efren L. Souza
,
Richard W. Pazzi
,
Eduardo F. Nakamura
A prediction-based routing algorithm for Vehicular Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 365-370
by
Leandro N. Balico
,
Horacio A.B.F. Oliveira
,
Raimundo S. Barreto
,
Antonio A.F. Loureiro
,
Richard W. Pazzi
Communication as a service for cloud VANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 371-377
by
Mouna Garai
,
Slim Rekhis
,
Noureddine Boudriga
Social amplification factor for mobile crowd sensing: The ParticipAct experience
Full-text access may be available. Sign in or learn about subscription options.
pp. 378-384
by
Stefano Chessa
,
Michele Girolami
,
Luca Foschini
,
Raffaele Ianniello
,
Antonio Corradi
Mining user check-in features for location classification in location-based social networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 385-390
by
Chen Yu
,
Yang Liu
,
Dezhong Yao
,
Hai Jin
,
Feng Lu
,
Hanhua Chen
,
Qiang Ding
Minimizing signaling cost in green routing for software defined networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 391-396
by
Hadi Alizadeh
,
Didem Goziipek
,
Seyed M. Buhari
,
Aysegul Yayimli
Evaluating the impact of network I/O on ultra-low delay packet switching
Full-text access may be available. Sign in or learn about subscription options.
pp. 397-402
by
George Baltas
,
George Xylomenos
Optimizing the SDN control-plane performance of the Openvswitch software switch
Full-text access may be available. Sign in or learn about subscription options.
pp. 403-408
by
Hsing-Yo Pan
,
Shie-Yuan Wang
Two-phase load balancing of In-Memory Key-Value Storages through NFV and SDN
Full-text access may be available. Sign in or learn about subscription options.
pp. 409-414
by
Alex F R Trajano
,
Marcial P Fernandez
Container-based network function virtualization for software-defined networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 415-420
by
Richard Cziva
,
Simon Jouet
,
Kyle J. S. White
,
Dimitrios P. Pezaros
Is it really worth to peer at IXPs? A comparative study
Full-text access may be available. Sign in or learn about subscription options.
pp. 421-426
by
Marco Di Bartolomeo
,
Giuseppe Di Battista
,
Roberto di Lallo
,
Claudio Squarcella
Experimenting with alternative path tracing solutions
Full-text access may be available. Sign in or learn about subscription options.
pp. 427-432
by
Pietro Marchetta
,
Walter de Donato
,
Valerio Persico
,
Antonio Pescape
QoE-based radio resource allocation in LTE femtocell considering transport limitations
Full-text access may be available. Sign in or learn about subscription options.
pp. 433-438
by
Ming Li
,
Phuong Nga Tran
,
Huseyin Kerem Tutuncuoglu
,
Andreas Timm-Giel
Design of roadside communication infrastructure with QoS guarantees
Full-text access may be available. Sign in or learn about subscription options.
pp. 439-444
by
Cristiano M. Silva
,
Wagner Meira
Geo-localized content replication for Vehicular Ad-hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 445-450
by
Fabricio A. Silva
,
Azzedine Boukerche
,
Thais R. M. Braga Silva
,
Linnyer B. Ruiz
,
Antonio A.F. Loureiro
Suggestion of routes for vehicles in vehicular networks using the multicommodity flow model
Full-text access may be available. Sign in or learn about subscription options.
pp. 451-456
by
Anna Izabel J. Tostes
,
Guilherme Maia
,
Fatima de L. P. Duarte-Figueiredo
,
Antonio A. F. Loureiro
PResync: A method for preventing resynchronization in the IEEE 802.11p standard
Full-text access may be available. Sign in or learn about subscription options.
pp. 457-462
by
Erick Donato
,
Guilherme Maia
,
Joao M.G. Duarte
,
Antonio A.F. Loureiro
,
Edmundo Madeira
,
Leandro Villas
EDCA virtual collision performance evaluation and mobility modeling in V2I communications
Full-text access may be available. Sign in or learn about subscription options.
pp. 463-470
by
Naila Bouchemal
,
Rola Naja
,
Mahmoud Moubarak
,
Samir Tohme
Acoustic model parameter estimation using distributed incremental adaptive networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 471-476
by
Sayed Mostafa Taheri
,
Hamed Nosrati
Performance of perceptual 1-bit compressed sensing for audio compression
Full-text access may be available. Sign in or learn about subscription options.
pp. 477-482
by
Hossam M. Kasem
,
Maha Elsabrouty
,
Osamu Muta
,
Hiroshi Furukawa
Digital signal processing for a sliceable transceiver for optical access networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 483-488
by
Silvia Saldana Cercos
,
Christoph Wagner
,
Juan Jose Vegas Olmos
,
Anna Manolova Fagertun
,
Idelfonso Tafur Monroy
Towards MEF services in a SDN environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 489-495
by
Carlos Ferreira
,
Joao Aparicio
,
Susana Sargento
,
Nuno Farinha
,
Vitor Mirones
An EC-based formalism for policy refinement in software-defined networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 496-501
by
Cristian Cleder Machado
,
Juliano Araujo Wickboldt
,
Lisandro Zambenedetti Granville
,
Alberto Schaeffer-Filho
Constructing an optimal spanning tree over a hybrid network with SDN and legacy switches
Full-text access may be available. Sign in or learn about subscription options.
pp. 502-507
by
Shie-Yuan Wang
,
Chia-Cheng Wu
,
Chih-Liang Chou
OpenFlow and services in the cloud: Core network demonstrator
Full-text access may be available. Sign in or learn about subscription options.
pp. 508-513
by
Goncalo Pardal
,
Joao Soares
,
Rafael Gouveia
,
Susana Sargento
Tool support for the evaluation of anomaly traffic classification for network resilience
Full-text access may be available. Sign in or learn about subscription options.
pp. 514-519
by
Anderson Santos da Silva
,
Juliano Araujo Wickboldt
,
Alberto Schaeffer-Filho
,
Angelos K. Marnerides
,
Andreas Mauthe
A failure prediction approach based on cloud theory and hidden Markov model in networked computing systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 520-525
by
Weiwei Zheng
,
Zhili Wang
,
Haoqiu Huang
,
Luoming Meng
,
Xuesong Qiu
A metric-correlation-based fault detection approach using clustering analysis in wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 526-531
by
Qian Liu
,
Yang Yang
,
Qiu Xue-song
A failure detector that gives information on the degree of confidence in the system
Full-text access may be available. Sign in or learn about subscription options.
pp. 532-537
by
Anubis Graciela de Moraes Rossetto
,
Claudio Geyer
,
Luciana Arantes
,
Pierre Sens
A sampling algorithm for intermittently connected delay tolerant wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 538-543
by
Israel L. C. Vasconcelos
,
David H. S. Lima
,
Carlos M. S. Figueiredo
,
Andre L. L. Aquino
Estimating queue formation rate in Wireless Sensor Networks using a fluid dynamic model
Full-text access may be available. Sign in or learn about subscription options.
pp. 544-548
by
Charalambos Sergiou
,
Vasos Vassiliou
,
Aristodemos Paphitis
Contribution aware task allocation in sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 549-554
by
Tingting Fu
,
Peng Liu
MuLTI: Multiple location tags inference for users in social networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 555-561
by
Zejia Chen
,
Jiahai Yang
,
Jessie Hui Wang
Change data capture in NoSQL databases: A functional and performance comparison
Full-text access may be available. Sign in or learn about subscription options.
pp. 562-567
by
Felipe Mathias Schmidt
,
Claudio Geyer
,
Alberto Schaeffer-Filho
,
Stefan DeBloch
,
Yong Hu
CIUV: Collaborating information against unreliable views
Full-text access may be available. Sign in or learn about subscription options.
pp. 568-573
by
Zimu Yuan
,
Zhiwei Xu
,
Guojie Li
Cracker: Crumbling large graphs into connected components
Full-text access may be available. Sign in or learn about subscription options.
pp. 574-581
by
Alessandro Lulli
,
Laura Ricci
,
Emanuele Carlini
,
Patrizio Dazzi
,
Claudio Lucchese
Design and optimization for distributed indexing scheme in switch-centric cloud storage system
Full-text access may be available. Sign in or learn about subscription options.
pp. 582-587
by
Yuang Liu
,
Xiaofeng Gao
,
Guihai Chen
NF-Dedupe: A novel no-fingerprint deduplication scheme for flash-based SSDs
Full-text access may be available. Sign in or learn about subscription options.
pp. 588-594
by
Zhengguo Chen
,
Zhiguang Chen
,
Nong Xiao
,
Fang Liu
Towards a performance characterization of a parallel file system over virtualized environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 595-600
by
Eduardo C. Inacio
,
Mario A. R. Dantas
,
Douglas D. J. de Macedo
SKVM: Scaling in-memory Key-Value store on multicore
Full-text access may be available. Sign in or learn about subscription options.
pp. 601-606
by
Ran Zheng
,
Wenjin Wang
,
Hai Jin
,
Qin Zhang
Towards making accessible human-interaction proofs more secure and usable
Full-text access may be available. Sign in or learn about subscription options.
pp. 607-612
by
Hakan Ezgi Kiziloz
,
Kemal Bicakci
Showing 100 out of 174
Load More
Load All