2013
2013
Volume 7, Number 3, 2013 May
-
- A DTSA (Detection Technique against a Sybil Attack) Protocol using SKC (Session Key based Certificate) on VANET, ByungKwan Lee, EunHee Jeong and Ina Jung (pp. 1-10).
- Probability-based Tamper Detection Scheme for BTC-compressed Images Based on Quantization Levels Modification, Yu-Chen Hu, Chun-Chi Lo, Chang-Ming Wu, Wu-Lin Chen and Chia-Hsien Wen (pp. 11-32).
- Multibiometrics Fusion for Identity Authentication: Dual Iris, Visible and Thermal Face Imagery, Ning Wang, Qiong Li, Ahmed A. Abd El-Latif, Jialiang Peng and Xiamu Niu (pp. 33-44).
- Substitutive Mutual Authentication between Mobile Base Stations in Tactical Networks, Yu-Jin Son, Taeshik Shon and Young-Bae Ko (pp. 45-54).
- Secure Cryptographic Scheme based on Modified Reed Muller Codes, Cheikh Thiecoumba Gueye and EL. Hadji Modou Mboup (pp. 55-64).
- A Multimodal Fusion Algorithm Based on FRR and FAR Using SVM, Yong Li, Meimei Shi, En Zhu, Jianping Yin, Jianmin Zhao (pp. 65-74).
- Single Sign-On Scheme using XML for Multimedia Device Control in Children’s Game Network based on OSGi service Platform, Dongkyoo Shin and Dongil Shin (pp. 75-84).
- Toward Trust-based Privacy Protection in Consumer Communication, Fei Xu, Jingsha He, Jing Xu and Yuqiang Zhang (pp. 85-98).
- Applying Basic-Elements and the Extension Theory to Alert-centric Event Correlation for Unified Network Security Management, Hui Xu, Chunzhi Wang, Hongwei Chen and Zhiwei Ye (pp. 99-110).
- Enhanced Security Communication System Using Digital Retrodirective Array Antenna, Junyeong Bok and Heung-Gyoon Ryu (pp. 111-120).
- Safety Properties based Scenario Generation for Model Checking Trampoline OS, Nahida Sultana Chowdhury and Yunja Choi (pp. 121-132).
- The Firewall Rule Authentication Method Based on 6to4 Tunnel, Li Zhou, Liangyi Gong and Xin Zou (pp. 133-142).
- An Improved Secure Dynamic ID-based Remote User Authentication Scheme with Key Agreement using Symmetric Cryptology, Mijin Kim, Junghyun Nam and Dongho Won (pp. 143-152).
- A Method of Threat Evaluation for Mobile Network, Wang Bailing, Li Shang, Qu Yun, Wang Xiaopeng and Liu Yang (pp. 153-162).
- A Watermarking for HTML Files Based on Multi-channel System, Yung-Chen Chou, Iuon-Chang Lin and Ping-Kun Hsu (pp. 163-174).
- Wireless Structural Health Monitoring System Using ZigBee Network and FBG Sensor, Hyuntae Kim, Jingyu Do and Jangsik Park (pp. 175-182).
- Hash-based RFID Mutual Authentication Protocol, Liu Yang, Peng Yu, Wang Bailing, Qu Yun, Bai Xuefeng, Yuan Xinling and Yin Zelong (pp. 183-194).
- Design and Implementation of a Network Attack Platform Based on Plug-in Technology, Li Gen, Wang Bailing, Liu Yang, Bai Xuefeng and Yuan Xinling (pp. 195-204).
- The Methodology of Security Management Cost Reduction using Security Level Lifecycle, Sung-Hwan Kim, Jung-Ho Eom and Tai-Myoung Chung (pp. 205-214).
- File Multi-analyses for Real-time Attack Source and Spread Site Trace, DaeHee Seo, SangWoo Lee, ByungDoo Kim, ByungGil Lee and JangMi Baek (pp. 215-222).
- FHGM: A Frequency Hopping Game Model with Communication Security Awareness for WSN, Chunlai Du, Jixiang Zhang, Jianshun Zhang, Li Ma and Xianxian Wang (pp. 223-234).
- Integrating Security Concerns into Software Development, Sabah Al-Fedaghi and Fajer Al-Kanderi (pp. 235-248).
- Towards Secure and Dynamic Password Based User Authentication Scheme in Hierarchical Wireless Sensor Networks, Chun-Ta Li, Chi-Yao Weng, Cheng-Chi Lee and Chin-Wen Lee (pp. 249-258).
- Can Friendship Be Counted on for Securing Wireless Ad Hoc Networks?, Lianggui Liu, Huiling Jia and Ting Shu (pp. 259-270).
- An Improvement of Sood, et al.’s Authentication Scheme using Smart Card, Kwang Cheul Shin and Jung Gil Cho (pp. 271-282).
- Research On Efficient Turbo Frequency Domain Equalization In STBC-MIMO System, Huang Wanqiu (pp. 283-292).
- An Innovative Two Factor Authentication Method: The QRLogin System, Soonduck Yoo, Seung-jung Shin and Dae-hyun Ryu (pp. 293-302).
- Analysis of Hash Functions and Cellular Automata Based Schemes, Jun-Cheol Jeon (pp. 303-316).
- A Robust Trust Management Scheme against the Malicious Nodes in Distributed P2P Network, Do-sik An, Byong-lae Ha and Gi-hwan Cho (pp. 317-326).
- A Secure Real Media Contents Management Model Based on Archetypes using Cloud Computing, You-Jin Song, Jang-Mook Kang and Jaedoo Huh (pp. 327-336).
- Security Augmenting Scheme for Bus Information System based on Smart Phone, Seungcheon Kim (pp. 337-346).
- Security in Graphical Authentication, Robert G. Rittenhouse, Junaid Ahsenali Chaudry and Malrey Lee (pp. 347-356).
- Eliminate Evading Analysis Tricks in Malware using Dynamic Slicing, Peidai Xie, Xicheng Lu, Yongjun Wang and Jinshu Su (pp. 357-366).
- Robust Video Watermarking Based on Temporal Modulation with Error Correcting Code, Sang-Woo Lee, Byung-Gil Lee and Dae-Hee Seo (pp. 367-376).
- Random Selection of Multiple Spreading Codes Enhances the Security of DSSS Transmission (RSMC-DSSS), Shahid Latif and Rahat Ullah (pp. 377-386).
- Page Mapping Scheme to Support Secure File Deletion for NAND-based Block Devices, Ilhoon Shin (pp. 387-394).
- Text Clustering using Semantic Features for Utilizing NFC Access Information, Sun Park, DaeKyu Kim and ByungRae Cha (pp. 395-404).
- A Comparative Study on Tangerine Detection, Counting and Yield Estimation Algorithm, Ulzii-Orshikh Dorj, Malrey Lee and Sangsub Han (pp. 405-412).
- Fault Localization Method of Software Defects based on Dependencies Analysis of Program Structure, Hui He, Lei Zhao, Qiao Li, Weizhe Zhang, Dongmin Gao and Yongtan Liu (pp. 413-422).