2014
2014
Volume 8, Number 2, 2014 March
-
- Advanced Protocol to Prevent Man-in-the-middle Attack in SCADA System, Sangkyo Oh, Hyunji Chung, Sangjin Lee and Kyungho Lee (pp. 1-8).
- A Secure and Efficient Vehicle-to-Vehicle Communication Scheme using Bloom Filter in VANETs, Su-Hyun Kim and Im-Yeong Lee (pp. 9-24).
- Lightweight Attestation Scheme for Wireless Sensor Network, Shinsaku Kiyomoto and Yutaka Miyake (pp. 25-40).
- Authorization of Cryptographic Module in Operational Environments, Hee Bong Choi, Hyuk Joong Yoon, Haeng Seok Ko and Il Jun Kim (pp. 41-48).
- Fault Diagnosis of Subsea Blowout Preventer Based on Artificial Neural Networks, Zengkai Liu, Yonghong Liu, Baoping Cai, Dawei Zhang and Junlei Li (pp. 49-58).
- Parallel Architecture for High-Speed Block Cipher, HIGHT, Je-Hoon Lee and Duk-Gyu Lim (pp. 59-66).
- A Smart-driver Based Method for Preventing SQL Injection Attacks, Zhongding Dong, Yun Liu, Guixun Luo and Sumeng Diao (pp. 67-76).
- A Study on Web Service Analysis and Bio-information based Web Service Security Mechanism, Seong-Hoon Lee (pp. 77-86).
- Detecting an Anomalous Traffic Attack Area based on Entropy Distribution and Mahalanobis Distance, Dolgormaa Bayarjargal and Gihwan Cho (pp. 87-94).
- Dynamic Control-limit Policy of Condition based Maintenance for the Hydroelectricity Generating Unit, Xinbo Qian and Yonggang Wu (pp. 95-106).
- Concept Design and Case Studies of Testbed based on Cloud Computing for Security Research, ByungRae Cha, SuJeong Sim and JongWon Kim (pp. 107-114).
- Secure USB Design Using Unallocated Arbitrary Area, Jae Hong Youn and Yoo-Kang Ji (pp. 115-124).
- Domain Specific Language for Detecting Intrusion Signatures with Genetic Search, Kanin Chotvorrarak and Yachai Limpiyakorn (pp. 125-138).
- An Embedded Encryption Protocol for Healthcare Networks Security, Ndibanje Bruce, Won Tae Jang and Hoon Jae Lee (pp. 139-144).
- A Practical Decision-Making Model for Security Products Preference, SungJin Kim, JunYoung Son, SeungHun Nam and ChaeHo Lim (pp. 145-156).
- Suspicious Transaction Detection for Anti-Money Laundering, Xingrong Luo (pp. 157-166).
- User Resistance of Mobile Banking in China: Focus on Perceived Risk, Shuang Cheng, Sang-Joon Lee and Kyeong-Rak Lee (pp. 167-172).
- The Study of Privacy Security in Mobile Traffic Control Environment, Byeong-Choon, Lee and Seung-Jung, Shin (pp. 173-182).
- Multi-Agent Distributed Intrusion Detection System Model Based on BP Neural Network, ZhaiShuang-can, Hu Chen-junand Zhang Wei-ming (pp. 183-192).
- Secure Streaming Media Data Management Protocol, Jeong-Min Do and You-Jin Song (pp. 193-202).
- User Behavior Research of Information Security Technology Based on TAM, Wang Cheng and Wang Shi-bo (pp. 203-210).
- Block Shuffling Approach for Contents Protection, Gwanggil Jeon (pp. 211-220).
- Review of How to Construct a Fully Homomorphic Encryption Scheme, ChenZhi-gang, WangJian, ChenLiqun and SongXin-xia (pp. 221-230).
- A Small-time Scale Netflow-based Anomaly Traffic Detecting Method Using MapReduce, Wang Jin-Song, Zhang Long, Shi Kai and Zhang Hong-hao (pp. 231-242).
- Implementation of ARIA Cryptographic Modules based on ARM9 Devices, Okyeon Yi, Seunghwan Yun, Myungseo Park and HaengGwon Song (pp. 243-250).
- Based on WDM of Disk Immunity Systems, Peng Hai-Yun and Zhou Wen-Gang (pp. 251-260).
- An Experimental CPA attack for Arduino Cryptographic Module and Analysis in Software-based CPA Countermeasures, Young Jin Kang, Tae Yong Kim, Jung Bok Jo and Hoon Jae Lee (pp. 261-270).
- Online Banking Security Analysis based on STRIDE Threat Model, Tong Xin and Ban Xiaofang (pp. 271-282).
- A Study on Security Technique of Cloud Data Processing in Electronic Commerce, Wei Dai, XuefangZhang and PengHu (pp. 283-290).
- Design of Safe Internal Network with the Use of Active Tracking System, Hyung-Kyu Choi and Seung-Jung Shin (pp. 291-300).
- Reversible Data Hiding Scheme for BTC-compressed Images Based on Histogram Shifting, Chun-Chi Lo, Yu-Chen Hu, Wu-Lin Chen and Chang-Ming Wu (pp. 301-314).
- Moving Objects Representation for Object Based Surveillance Video Retrieval System, Jianping Han, Tian Tan, Longfei Chen and Daxing Zhang (pp. 315-322).
- An Efficient and Privacy-Preserving Semantic Multi-Keyword Ranked Search over Encrypted Cloud Data, Li Chen, Xingming Sun, Zhihua Xiaand Qi Liu (pp. 323-332).
- A Study on Surveillance System of Object’s Abnormal Behavior by Blob Composition Analysis, Young-Bin Shim, Hwa-Jin Park and Yong-Ik Yoon (pp. 333-340).
- A Design Approach for Wireless Communication Security in Bluetooth Network, Bijoy Kumar Mandal, Debnath Bhattacharyya and Tai-hoon Kim (pp. 341-352).
- Design of the New Efficient Decripting Machine, that can be Applied to the Wireless Sensor Network, Based on the GF(2n) Field Theory and the Modified RSA Algorithm, Hyeong-Keon An (pp. 353-362).
- An Efficient Identity-based Signcryption from Lattice, Xiufeng Zhao and Xiang Wang (pp. 363-374).
- Conflict Analysis between Task Iteration and Design Capabilities in Collaborative Product Development, Tao Yang, Yu Yang and Cheng Meng Xue (pp. 375-386).
- A Novel Personalized TTP-free Location Privacy Preserving Method, Nianhua Yang, Yuru Cao, Qing Liu and Jiming Zheng (pp. 387-398).