2016
2016
Volume 10, Number 9, 2016 September
-
- High-speed Encryption & Decryption System Based on SM4 Algorithm, Lv Qian, Li Li and Cao Yan-yan (pp. 1-8).
- Memory Saving Architecture of Number Theoretic Transform for Lattice Cryptography, Sangook Moon (pp. 9-18).
- Detecting Fraudulent Financial Information of a Company Using Hidden Markov Model, Ruicheng Yang, Ailing Zuo and Qing Shen (pp. 19-28).
- Personalized Trusted Service Recommendation Method based on Social Work, Du Ruizhong, Pei Zhi and Tian Junfeng (pp. 29-38).
- Mobile Botnet Detection Model based on Retrospective Pattern Recognition, Meisam Eslahi, Moslem Yousefi, Maryam Var Naseri, Y. M. Yussof, N. M. Tahir and H. Hashim (pp. 39-44).
- Implementation of Bad Information Filtering System Based on SVM Algorithm, Xiao-Lan Xie and Zhen Long (pp. 45-54).
- NoSQL Injection: Data Security on Web Vulnerability, Hemn B. Abdalla, Guoquang Li, Jinzhao Lin and Mustafa A. Alazeez (pp. 55-64).
- Sorting Research of Ocean Engineering Enterprise Informatization Projects based on Risk Assessment, Yuqi Wang, Dongke Lv and Zhenglin Sun (pp. 65-76).
- Evaluation Model of Cloud Storage Security Level with the Fusion Analytic Hierarchy Process, Cheng Cheng and Zhuo Enyi (pp. 77-86).
- Chi-Square Statistical based Technique for Intrusion Detection, Sheenam and Abhinav Bhandari (pp. 87-98).
- Location Fingerprint Positioning Technology using Bat Algorithm, Song Lixin, Zhou Chuanbin and Pei Heng (pp. 99-108).
- Fast Hardware Implementations of Inversions in Small Finite Fields for Special Irreducible Polynomials on FPGAs, Haibo Yi, Weijian Li and Zhe Nie (pp. 109-120).
- Wormhole Detection Algorithm: To Detect Wormhole Attacks Efficiently in Wireless Networks, R. Regan, E. Dhivyadarsani, B. Nandhini and A. Priya (pp. 121-128).
- E-commerce Supply Chain Security and Influencing Factors of Logistics Industry Development based on VAR Model, Fang Wang and Qian Li (pp. 129-140).
- Dynamic Security Policy Enforcement on Android, Matúš Vančo and Lukáš Aron (pp. 141-148).
- Mechanisms of E-business Security and Enterprise Employee Voice Behavior Impacts on Team Creativity: A Cognitive Perspective, Shaozhong Yu, Le Zhang and Jinzhao Deng (pp. 149-164).
- Identifying and Analyzing Security Risks in Android Application Components, Ming Zhang (pp. 165-174).
- Blind Audio Watermarking Technique Based on Two Dimensional Cellular Automata, Hazem Hiary, Abdel Latif Abu Dalhoum, Alia Madain, Alfonso Ortega and Manuel Alfonseca (pp. 175-184).
- RFID Tag Dynamic Ownership Transfer Protocol based on Lagrange of Multi-owner with Different Weights, Gan Yong, Yang Zong-qin, He Lei, Du Chao (pp. 185-192).
- A Provably-Correct Micro-Dalvik Bytecode Verifier, Jiang Nan, He Yanxiang, Zhang Xiaotong, Liu Rui and Shen Yunfei (pp. 193-210).
- MANET: Securing AODV Based on a Combined Immune Theories Algorithm (CITA), Anass Khannous, Fatiha Elouaai, Anass Rghioui and Mohammed Bouhorma (pp. 211-228).
- The Evaluation Analysis of Computer Network Information Security based on FAHP, Qian Wu (pp. 229-242).
- Simulation and Analysis for Error from Satellite Capture Segment Anti-spoofing, Liu You-ming, Feng Qi and LIiTing-jun (pp. 243-256).
- A Secure Content Delivery Service in CPS Environments, Jin-Mook Kim, Jeong-Kyung Moon and You-Jin Song (pp. 257-264).
- An Image Spatial Domain Steganography Algorithm with High Payload, Commendable Perceptual Quality and High Statistical Un-detectability, Hao Huang and Zhiping Zhou (pp. 265-274).
- Lightweight Key Distribution Protocol for Streaming Media DRM, Hao Li, Tang Xuyue, Jiayin Tian, Jianbo Liu and Cheng Yang (pp. 275-284).
- TEAM: Virtual Synchronized File-based Transparent and Privacy-Enhanced Storage System, Hye-Lim Jeong and Ki-Woong Park (pp. 285-294).
- User Behaviour Profiling in Cloud using One Class SVM: A Review, Vijaya Lakshmi Paruchuri, S. Suresh Babu, P S V S Sridhar, Debnath Bhattacharyya and Hye-Jin Kim (pp. 295-300).
- Research on Network Security Situation Prediction Based on Markov Game Theory”, Wang Yong (pp. 301-308).
- Coverless Multi-keywords Information Hiding Method Based on Text, Zhili Zhou, Yan Mu, Ching-Nung Yang and Ningsheng Zhao (pp. 309-320).
- Parallel Encryption Method on Brain Wave for a Person Authentication, Jung-Sook Kim and Jang-Young Chung (pp. 320-330).
- Study on Security Risk Propagation of Immune Mechanism under Complex Network Background, Lu Cailin (pp. 331-342).