2014
2014
Volume 8, Number 1, 2014 January
-
- An Improved Reconstruction methods of Compressive Sensing Data Recovery in Wireless Sensor Networks, Sai Ji, Liping Huang, Jin Wang, Jian Shen and Jeong-Uk Kim (pp. 1-8).
- Influence of HRM Practices on Privacy Policy Compliance Intention: A Study among Bank Employees in Korea, Youngkeun Choi and Taejong (pp. 9-18).
- Modeling and Analysis of SMER Constraints Violation in IRBAC 2000 Model Based on Colored Petri Nets, Meng Liu and Xuan Wang (pp. 19-32).
- Efficient Data Memory Usages of 3GPP Authentication and Key Agreement Protocol, Minha Park, Yeog Kim and Okyeon Yi (pp. 33-44).
- A TPSAC Model and Its Application to Mechanical Cloud Simulation, Changyu Liu, Shoubin Dong, Huiling Li, Bin Lu and Alex Hauptmann (pp. 45-56).
- An Improved Dominant Point Feature for Online Signature Verification, Darma Putra, Yogi Pratama, Oka Sudana and Adi Purnawan (pp. 57-70).
- Development of Object-Oriented Analysis and Design Methodology for Secure Web Applications, Kyung-Soo Joo and Jung-Woong Woo (pp. 71-80).
- Freshness Consideration of Hierarchical Key Agreement Protocol in WSNs, Sung-Woon Lee and Hyunsung Kim (pp. 81-92).
- A Novel Approach to Design the Fast Pedestrian Detection for Video Surveillance System, Shuoping Wang, Zhike Han, Li Zhu and Qi Chen (pp. 93-102).
- Securing E-Governance Services through Biometrics, Madhavi Gudavalli, D. Srinivasa Kumar and S. Viswanadha Raju (pp. 103-112).
- A Study on the Integrated Security System based Real-time Network Packet Deep Inspection, Chang-Su Moon and Sun-Hyung Kim (pp. 113-122).
- A Reliable File Protection System Based on Transparent Encryption, Jun Liu, ShuYu Chen, MingWei Lin and Han Liu (pp. 123-132).
- Sensitive Semantics-Aware Personality Cloaking on Road-Network Environment, Min Li, Zhiguang Qin and Cong Wang (pp. 133-146).
- Secured Session Key Agreement Protocol for Iris Cryptosystem Using Customized Elliptic Curve Cryptography, Usha. S and Kuppuswami. S (pp. 147-158).
- Towards an Efficient and Secure Online Digital Rights Management Scheme in Cloud Computing, Huang Qinlong, Ma Zhaofeng, Fu Jingyi, Yang Yixian and Niu Xinxin (pp. 159-168).
- Security Assessment for Key Management in Mobile Ad Hoc Networks, Reham Abdellatif Abouhogail (pp. 169-182).
- Evading Anti-debugging Techniques with Binary Substitution, JaeKeun Lee, BooJoong Kang and Eul Gyu Im (pp. 183-192).
- Knowledge Based Secure Data Streaming in Virtual Environment, Anand R and S. Saraswathi (pp. 193-200).
- A Study of Security Requirement Demand Survey Analysis on Manufacturing Industry, Hangbae Chang (pp. 201-212).
- Fault Diagnosis Research of Submarine Casing Cutting Robot for Abandoned Oil Wellhead, Xiaojie Tian, Yonghong Liu, Yunwei Zhang, Rongju Lin and Yuanyuan Xi (pp. 213-224).
- Study on Accurate Calculating the Risk of the SCADA, Young In You and Kyuong Ho Lee (pp. 225-230).
- Android Mobile Application System Call Event Pattern Analysis for Determination of Malicious Attack, You Joung Ham, Daeyeol Moon, Hyung-Woo Lee, Jae Deok Lim and Jeong Nyeo Kim (pp. 231-246).
- A survey of Cyber Attack Detection Strategies, Jamal Raiyn (pp. 247-256).
- Secure Data Management Scheme using One-Time Trapdoor on Cloud Storage Environment, Sun-Ho Lee and Im-Yeong Lee (pp. 257-272).
- Performance of Converged Secure Socket Layer and CMVP Cryptographic Modules, Okyeon Yi, Seunghwan Yun, Myungseo Park, Nuri Hwang, Taeyean Kwon and Chaewon Yun (pp. 273-282).
- Crowdsourcing Fraud Detection Algorithm Based on Ebbinghaus Forgetting Curve, Li Peng, Yu Xiao-yang, Liu Yang and Zhang Ting-ting (pp. 283-290).
- Risk Prediction of Malicious Code-Infected Websites by Mining Vulnerability Features, Taek Lee, Dohoon Kim, Hyunchoel Jeong and Hoh Peter In (pp. 291-294).
- The Design and Implementation of Collaboration Service Integration Platform Based on Context-Aware Role Based Access Model, Shu-Ping Lu, Kuei-Kai Shao, Yu-Nung Chao, Kuo-Shu Luo and Chi-Hua Chen (pp. 295-306).
- New Construction of Even-variable Rotation Symmetric Boolean Functions with Optimum Algebraic Immunity, Yindong Chen, Hongyan Xiang and Ya-nan Zhang (pp. 307-318).
- Dynamic Multi-keyword Top-k Ranked Search over Encrypted Cloud Data, Xingming Sun, Xinhui Wang, Zhihua Xia, Zhangjie Fu and Tao Li (pp. 319-332).
- A Study on the Optimization Method for the Rule Checker in the Secure Coding, JaeHyun Kim and YangSun Lee (pp. 333-342).
- Efficient Image Scrambling based on any Chaotic Map, Cao Guanghui, Hu Kai and Zhou Jun (pp. 343-354).
- Comparison of Secure Development Frameworks for Korean e-Government Systems, Dongsu Seo (pp. 355-362).
- Network Security Situation Assessment Ecurity Based on the Associated Diffusion Analysis, Dongsu Seo (pp. 363-372).
- Security Vulnerabilities Tests Generation from SysML and Event-B Models for EMV Cards, Noura Ouerdi, Mostafa Azizi, M’Hammed Ziane, Abdelmalek Azizi, Jean-louis Lanet and Aymerick Savary (pp. 373-388).
- Lossless Data Hiding Technique using Reversible Function, Sang-Ho Shin and Jun-Cheol Jeon (pp. 389-400).
- Sinkhole Vulnerabilities in Wireless Sensor Networks, Junaid Ahsenali Chaudhry, Usman Tariq, Mohammed Arif Amin and Robert G. Rittenhouse (pp. 401-410).
- New Construction of Efficient Certificateless Aggregate Signatures, He Liu, Sijia Wang, Mangui Liang and Yongqian Chen (pp. 411-422).
- How to Formally Model Features of Network Security Protocols, Gyesik Lee (pp. 423-432).