2013
2013
Volume 7, Number 6, 2013 November
-
- An Encryption Based Black Hole Detection Mechanism in Mobile Ad Hoc Networks, Firoz Ahmed, Hoon Oh (pp. 1-10).
- Designated-Verifier Provable Data Possession in Public Cloud Storage, Yongjun Ren, Jiang Xu, Jin Wang, Jeong-Uk Ki (pp. 11-20).
- A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services, Changsoo Lee, Daewon Jung, Keunwang Lee (pp. 21-30).
- A Research on Security Awareness and Countermeasures for the Single Server, Hyuk-Jin Son, Seungdo Jeong (pp. 31-42).
- A High Speed Block Cipher Algorithm, Bac Do Thi, Minh Nguyen Hieu (pp. 43-54).
- Remote Viewing Image Mosaic based on Fuzzy Cellular Automata Corner Detection in Substation, Li Jing (pp. 55-66).
- Data Security Monitoring Platform in Cloud for Enterprise, Geng Yushui and Pang Shunpeng (pp. 67-78).
- Streaming Video Service Model using Secure Steganographic Method, Yunjung Lee (pp. 79-88).
- Context-Aware Information-Based Access Restriction Scheme for Cloud Data, Seul-Ki Choi, Jin Kwak (pp. 89-96).
- Research of Data Security Model in Cloud Computing Platform for SMEs, Tao Sun, Xinjun Wang (pp. 97-108).
- A Method for Individualized Privacy Preservation, Song Yang, Li Lijie, Zhang Jianpei, Yang Jing (pp. 109-116).
- Research of Methods of Theory and Application about Moving Object Detection, Yong Qin, Junhua Han, Meng Wei, Hao Luo, Wenting Fan (pp. 117-126).
- A Novel Card-based Information Security Game Development on SNS, Woo-Taek Lim, Moon-Bo Yang, Seong Baeg Kim (pp. 127-136).
- Development of Information Security Contents for Learning Hacking Principles, Ji Yeon Hong, Ik Jun Kang, Seong Baeg Kim, Chan Jung Park (pp. 137-146).
- Research on the Crash Safety of the Car Bumper Base on the Different Standards, Q. H. Ma, C. Y. Zhang, S. Y. Han, Z. T. Qin (pp. 147-154).
- Enhanced Smartcard based Multi-Server Authentication Scheme, Hee-Joo Park, Chonggun Kim (pp. 155-164).
- Study on an Algorithm for Generating the Multiple Watermark Information using 2D Barcode, Jizhe Cui, Jongweon Kim (pp. 165-172).
- Design and Implementation of Underground Mining Safety Production Management System, Jun Luo (pp. 173-180).
- Improving Mobile Device Classification using Security Events for Preventing Wireless Intrusion, Hyeokchan Kwon, Sin-Hyo Kim (pp. 181-190).
- Piracy Tracking System of the BitTorrent, Jungjae Lee, Jongweon Kim (pp. 191-198).
- Research on an Authentication Algorithm for an Electronic Attendance System in the Constructing of a Smart Campus, Jin Kim, Seung-Kook Cheong (pp. 199-208).
- Grayscale Image Tamper Detection and Recovery Based on Vector Quantization, Jun-Chou Chuang, Yu-Chen Hu, Chun-Chi Lo, Wu-Lin Chen (pp. 209-228).
- Design and Analysis of Fast Image Encryption Algorithm based on Multiple Chaotic Systems in Real-time Security Car, Shuai Wang, Wei Sun, Yinan Guo, Haiqun Yang, Shuming Jiang (pp. 229-240).
- A Secure and Efficient Vehicle-to-Vehicle Communication based on Sensor Network, Su-Hyun Kim and Im-Yeong Lee (pp. 241-248).
- Analysis on the Attribute Binding based Enhanced User Authentication, Tae Kyung Kim, Jae Hoon Nah (pp. 249-258).
- Research on Data and Transaction Security of Enterprise E-Commerce Countermeasure, Yongyong Zhu (pp. 259-268).
- Some Explicit Formulae of NAF and its Left-to-Right, Dong-Guk Han, Okyeon Yi y, and Tsuyoshi Takagi (pp. 269-274).
- Analysis on Fraud Detection for Internet Service, Tae Kyung Kim, Hyung Jin Lim, Jae Hoon Nah (pp. 275-284).
- Steganography in Digital Images Using Maximum Difference of Neighboring Pixel Values, Gandharba Swain (pp. 285-294).
- An application of KPCA and SVM in the human face recognition, Feng Yue, Meng Qing Song, Yuan Hai Bo (pp. 295-302).
- Optimization of Face Recognition Algorithms for Smartphone Environment, Kanghun Jeong, Dongil Han and Hyeonjoon Moon (pp. 303-308).
- A Formally Verified Protocol for Secure Vertical Handovers in 4G Heterogeneous Networks, Naïm Qachri, Olivier Markowitch, Jean-Michel Dricot (pp. 309-326).
- A Study on User Access Control Method using Multi-Factor Authentication for EDMS, Keunwang Lee (pp. 327-334).
- Cryptanalysis and Improvements of an Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks, Zuowen Tan (pp. 335-344).
- Study of the Privacy Models in RFID Authentication Protocols, Jian Shen, Wenying Zheng, Jin Wang, Zhihua Xia, Zhangjie Fu (pp. 345-354).
- Performance and Information Security Evaluation with Firewalls, Thaier Hayajneh, Bassam J. Mohd , Awni Itradat, and Ahmad Nahar Quttoum (pp. 355-372).
- Protection Profile for Unidirectional Security Gateway between Networks, Hyun-Jung Lee, Dongho Won (pp. 373-384).
- Optimized Ciphertext-Policy Attribute-Based Encryption with Efficient Revocation, Yang Li, Jianming Zhu, Xiuli Wang, Yanmei Chai, Shuai Shao (pp. 385-394).