2017
2017
Volume 11, Number 1, 2017 January
-
- An BAN Logic Analysis Method Based on Yahalom Protocol, Ying Zhou, Lei Yu, Shaoming Pan, Zhibo Wang, Ying Zheng and Min Li (pp. 1-10).
This paper has been removed because it was withdrawn by the Authors. - Hybrid Intrusion Detection System Using K-means and J-48, Manvir Singh and Jatinder Singh Bal (pp. 11-22).
- Research on Defensive Strategy Selection in Network Security, Hong Li (pp. 23-34).
- Research on Data Security Mechanism among Cloud Services based on Software Define Network, Zhao Wenbin, Fan Tongrang and Wang Hongsheng (pp. 35-44).
- 128 Bit Hash of Variable Length in Short Message Service Security, Robbi Rahim (pp. 45-58).
- User Identity Resolution Across Multi-Social Media, Zhibo Wang, Zhongyuan Li, Jiawen Sun, Qi Yin, Lu Gao and Xiaohui Cui (pp. 59-70).
- A Defensive Mechanism based on PCA to Defend Denial-of-Service Attack, P. Rajesh Kanna, K. Sindhanaiselvan and M. K. Vijaymeena (pp. 71-82).
- Analyzing the Resilience of the Employee Network in Joint-equity Commercial Banks, Shuliang Lv, Chuanchao Huang and Lanying Du (83-92).
- Network Security Situation Prediction System Based on Neural Network and Big Data, Bowen Zhu, Yonghong Chen, Yiqiao Cai, Hui Tian and Tian Wang (pp. 93-108).
- A Classification Scheme for Cybersecurity Models, Issa Atoum and Ahmed Otoom (pp. 109-120).
- The Homomorphic Encryption Method for Cloud Computing Storage Security, Jun Wu and Jing Chen (pp. 121-134).
- Greedy Modes of Data Integrity Attacks on Industrial Control Systems: A Case Study of Tennessee Eastman Process, Weize Li, Lun Xie, Yu Rong and Zhiliang Wang (pp. 135-148).
- Video Authentication against Set of Temporal Tampering, Manish K Thakur, Vikas Saxena and J P Gupta (pp. 149-164).
- Boomerang Analysis Method Based on Block Cipher, Fan Aiwan and Yang Zhaofeng (pp. 165-178).
- Anonymous Authentication with Centralize Access Control of Data Storage in Cloud, Linawati, I Gede Totok Suryawan and Made Sudarma (pp. 179-192).
- Analysis on Mechanism of Vegetation Slope Protection based on Security Perspective, Du Guangqian and Wang Shijie (pp. 193-202).
- Multi-step Attack-oriented Assessment of Network Security Situation, Zhang Hengwei, Yang Haopu, Wang Jindong and Li Tao (pp. 203-218).
- Enhancing the Security of AES Algorithm using Quantum Three-Pass Protocol, Rajeev Kumar Gupta, R. K. Pateriya , Ankita Patil (pp. 219-232).
- A Study on Global Piracy Attacks’ Trends and Characteristics Based on Data Analysis, Zhongming Xiao, Zhongzhou Fan and Liangkun Xu (pp. 233-244).
- Enhancement of Cloud Authorization System Using Predicate Logic, Sandeep Saxena, Gautam Sanyal and Shashank Srivastava (pp. 245-256).
- A Robust and Secure Block-SVD based Embedding of Encrypted Watermark in Digital Images using RDWT, Sachin Gaur, Vinay Kumar Srivastava (pp. 257-270).
- An BAN Logic Analysis Method Based on Yahalom Protocol, Ying Zhou, Lei Yu, Shaoming Pan, Zhibo Wang, Ying Zheng and Min Li (pp. 1-10).