2014
2014
Volume 8, Number 4, 2014 July
-
- A Key Distribution Scheme for WSN Based on Deployment Knowledge and Dual-Key Pools, Lin You and Younan Yuan (pp. 1-16).
- Issues toward Networks Architecture Security for LTE and LTE-A Networks, Jin Wang, Zhongqi Zhang, Yongjun Ren, Bin Li and Jeong-Uk Kim (pp. 17-24).
- Protecting Seaport Communication System by Steganography Based Procedures, Yair Wiseman (pp. 25-36).
- Research on Distinguish the Accounting Information Distortion Based on the Principle Components-logistic Regression Model, Zhenjie Li (pp. 37-50).
- A Study of Key management Protocol for Secure Communication In Personal Cloud Environment, ByungWook Jin and Keun-Wang Lee (pp. 51-58).
- Attacks and Threats on the U-Healthcare Application with Mobile Agent, Jung Tae Kim (pp. 59-66).
- A Composite Intelligent Method for Spam Filtering, Jun Liu, Shuyu Chen, Kai Liu and Yong Zhou (pp. 67-76).
- Quantum chaotic image encryption with one time running key, Cao Guanghui, Zhou Jun, Zhang Yizhi, Jiang Yueling and Zhang Xing (pp. 77-88).
- A Block Encryption Scheme for Secure Still Visual Data based on One-Way Coupled Map Lattice, Alaa Zaghloul, Tiejun Zhang, Handan Hou, Mohamed Amin, Ahmed A. Abd El-Latif and Mohamed S. Abd El-Wahab (pp. 89-100).
- Approaches for testing and evaluation of XACML Policies, Izzat M Alsmadi (pp. 101-112).
- A Sticker-Based Model Using DNA Computing for Generating Real Random Numbers, Saman Hedayatpour, Nazri Kama and Suriayati Chuprat (pp. 113-122).
- End-to-End Authentication Protocols for Personal/Portable Devices over Cognitive Radio Networks, Hyunsung Kim (pp. 123-138).
- Advanced Mobile Security System Operated by Bioelectrical Sensor, Kalanyu Zintus-art, Duk Shin, Natsue Yoshimura, Hiroyuki Kambara and Yasuharu Koike (pp. 139-150).
- Cryptanalysis and Improvement of a Password-Based Authenticated Three-Party Key Exchange Protocol, Youngsook Lee (pp. 151-160).
- Cryptanalysis of A Multi-use CCA-secure Proxy Re-encryption Scheme, Yi Cai and Deyu Qi (pp. 161-170).
- Optimizing the computing of pairing with Miller’s algorithm, Siham Ezzouak, Mohammed El Amrani and Abdelmalek Azizi (pp. 171-182).
- High Payload and Secure Steganography method Based on Block Partitioning and Integer Wavelet Transform, Seyyed Amin Seyyedi and Nick Ivanov (pp. 183-194).
- Predicting Terroristic Attacks in Urban Environments: An Internet-of-Things Approach, Stavros Petris, Christos Georgoulis, John Soldatos, Ilaria Giordani, Raul Sormani and Divna Djordjevic (pp. 195-218).
- Securing Bluetooth Communication with Hybrid Pairing Protocol, J. T. Lalis, B. D. Gerardo and Y. Byun (pp. 219-228).
- Study on Enhancing Vulnerability Evaluations for BYOD Security, Kyong-jin Kim and Seng-phil Hong (pp. 229-238).
- Research and Implementation of an Integrity Video Watermarking Authentication Algorithm, Guochuan Shi, Guanyu Chen, Binhao Shi, Jiangwei Li and Kai Shu (pp. 239-246).
- A Study on the Improvements of Information Security Management System for Environment Education Institutes, Chulki Jeong and Sungjin Ahn (pp. 247-252).
- Robust online filter recommended algorithm based on attack profile, Gao Feng (pp. 253-264).
- Iris Feature Extraction based on Haar Wavelet Transform, Zhu Wen Yao, Zhou jun, Wu Yu Feng and Wang Ming Jun (pp. 265-272).
- Shilling attack detection algorithm based on Genetic optimization, Tao Li (pp. 273-286).
- Secure DRM Scheme Supporting Dynamic Authorization Using Attribute-Based Encryption, Fu Jingyi, Ma Zhaofeng, Huang Qinlong and Yang Yixian (pp. 287-296).
- Survey on reversible data hiding techniques, M. Manju and V. Kavitha (pp. 297-306).
- Privacy Preserving Three-party Authenticated Key Agreement Protocol using Smart Cards, Suyeon Park and Hee-Joo Park (pp. 307-320).
- Research on the Security based on Utility Theory in Cloud Computing Environment, Jie Hui Ju, Zhong You Wang, Wen Juan Li, Wei Zheng Bao and Ya Wang (pp. 321-328).
- Defending Against sybil-attacks in Peer-to-Peer Networks, Xu Xiang, Lu Huijuan and Chen Lianna (pp. 329-340).
- A Study on Behavioral Intention of Sharp (#) Mail Potential Users Focused on Non-Repudiation Function, Kil-Hwan Shin and Choon Yeul Lee (pp. 341-352).
- Preventive Maintenance Model Analysis Based on Condition, Hongsheng Su (pp. 353-366).