2016
2016
Volume 10, Number 7, 2016 July
-
- Grey Relative Evaluation of Airport Apron Safety Risk based on THEIL Index, Shi Li and Luo Fan (pp. 1-10).
- Design of Low Power and Secure Implementation of SBox and Inverse-SBox for AES, Divya Sharma, Ankur Bhardwaj, Harshita Prasad, Jyoti Kandpal, Abhay Saxena, Kumar Shashi Kant and Gaurav Verma (pp. 11-24).
- Towards a Comprehensive Analysis of Crowds Anonymity System, Tianbo Lu, Xinyuan Zhang, Xiaofeng Du and Yang Li (pp. 25-40).
- Robust Anomaly Detection Using Supervised Relevance Neural Gas with Discriminant Analysis, Jia Weifeng and Chen Weijun (pp. 51-50).
- A Steganographic Method for Images by ‘Skip Position’, P. Anusha and Debnath Bhattacharyya (pp. 51-58).
- Reversible Data-hiding Algorithm in Encrypted Image for Security Application in Cloud Computing, Zhang Jing (pp. 59-70).
- Effects of Internet Users’ Perception Regarding the Risks and Benefits of the Internet on Cyberspace Trust, Wookjoon Sung and Dongwook Kim (pp. 71-82).
- An Image Steganography Algorithm based on the Quantitative Features of Higher Order Local Model, Hao Huang and Zhiping Zhou (pp. 83-92).
- Parallel Joint Fingerprinting and Encryption for Social Multimedia Sharing Based on Game of Life, Conghuan Ye, Zenggang Xiong, Yaoming Ding, Xuemin Zhang, Guangwei Wang, Fang Xu and Kaibing Zhang (pp. 93-102).
- Certificateless Public Key Cryptography: A Research Survey, Jacob Sayid, Isaac Sayid and Jayaprakash Kar (pp. 103-118).
- A Key Management and Cross-layer Routing Scheme for Wireless Sensor Networks, Fengjun Shang, Xiaolin Deng, Yongkui Zhou (pp. 119-134).
- Cloud Computing Education Laboratory Safety Research, Zheng Li (pp. 135-146).
- An Evaluation of Dynamic Java Bytecode Software Watermarking Algorithms, Krishan Kumar, Viney Kehar and Prabhpreet Kaur (pp. 147-156).
- Intelligent Data Mining Algorithm Application in Enterprise Financial Management Strategy Optimization: A E-commerce Perspective, Lili Jia (pp. 157-168).
- Cube Theory and k-error Linear Complexity Profile, Jianqin Zhou, Wanquan Liu, Xifeng Wang (pp. 169-184).
- Research on Network Intrusion Detection Method based on Regular Expression Matching, Yi Wang (pp. 185-194).
- An Algorithm of Eyelashes Detection for Iris Recognition, Wenyao Zhu, Zemao Zhao and Yufeng Wu (pp. 195-202).
- A Study on the Web Services Vulnerability Assessment Plan, Sang-Wook Cha, Jong-Suk Park, Jangyoun Cho, Kyeong-seok Han and Jong-Bae Kim (pp. 203-212).
- A Fusion Model for Securities Analysts’ Stock Rating Information Based on the Evidential Reasoning Algorithm under Two-dimensional Progressive Recognition Framework, Weidong Zhu, Yiling Wang, Yong Wu and Yibo Sun (pp. 213-228).
- Mobile Internet Tourism Information Security Research, Shan Xue (pp. 229-238).
- Research on Weak Fault Detection Algorithm Chaotic Neural Network, Zhu Yuan Zhong (pp. 239-248).
- Novel Intrusion Detection Method based on Triangular Matrix Factorization, Qi Yingchun and Niu Ling (pp. 249-258).
- Securing Android In-app Billing Service against Automated Attacks, Heeyoul Kim and Sang-won Kim (pp. 259-268).
- Research on Stock Price Prediction Model based on GA Optimized SVM Parameters, Liang bang-long, Lin jie and Yuan Guanghui (pp. 269-280).
- Research on Data Mining Model of Intelligent Transportation Based on Granular Computing, Xiao-Lan Xie and Xiao-Feng Gu (pp. 282-286).
- Effective Signcryption Approach for Secure Convention for Multilayer Consensus using ECC, Gautam Kumar and Hemraj Saini (pp. 287-306).
- Research on Text Proofreading Method for Judgment Document, Xu Yabin and Ji Xuan (pp. 307-318).
- Sentiment polarity Analysis on Microblogging Hot Topic, Xu Yabin and Zhang Guanglei (pp. 319-332).
- A New Authentication Solution for Prevention of Some Typical Attacks in Ad Hoc Network, Haiyan Liu and Kongjun Bao (pp. 333-344).
- Research and Implementation of Sobel Edge Detection Using Model-Based Design, Erhu Xie (pp. 345-354).
- Threshold Delegation Scheme Based on Multi-Proxy Re-Encryption, You-Jin Song (pp. 355-362).
- Web Spam Detection Based On Link Diversity and Content Features, Xu Gongwen, Li Xiaomei, Zhang Zhijun and Xu Li’Na (pp. 363-372).
- Strategies for Improving the Electronic Information Industry Security based on IOII, Kun Zhang and Zhenji Zhang (pp. 373-382).
- Research on Security Evaluation of Modern Information Service Industry in China, Li Menggang and Chen Fenfei (pp. 383-392).
- QR Code Steganography for Multiple Image and Text Hiding using Improved RSA-3DWT Algorithm, Shweta Sharma and Vikas Sejwar (pp. 393-406).