2012
2012
Volume 6, Number 4, 2012 October
-
- Multi-Layer Data Encryption Using Residue Number System in DNA Sequence, M. I. Youssef, A. Emam and M. Abd Elghany (pp. 1-12).
- A Technique for Secret Communication Using a New Block Cipher with Dynamic Steganography, Gandharba Swain and Saroj Kumar Lenka (pp. 13-24).
- Security Threats in Cloud Computing Environments, Kangchan Lee (pp. 25-32).
- Analysis of Operator Errors in Routing Policy Configurations, Sihyung Lee (pp. 33-52).
- Bank Web Sites Phishing Detection and Notification System Based on Semantic Web technologies, Faisal Alkhateeb, Ahmed M. Manasrah and Abed Al Raoof Bsoul (pp. 53-66).
- Enhancing Grid Security using Quantum Key Distribution, Muhammad Mubashir Khan and Jie Xu (pp. 67-76).
- Integration of Sound Signature Authentication System, Bagrudeen Bazeer Ahamed and Shanmugasundaram Hariharan (pp. 77-86).
- An Anti-Shoulder Surfing Mechanism and its Memorability Test, Lim Kah Seng, Norafida Ithnin and Hazinah Kutty Mammi (pp. 87-96).
- Modeling the Forensics Process, Sabah Al-Fedaghi and Bashayer Al-Babtain (pp. 97-108).
- Web Service Selection Using Quality Criteria and Trust Based Routing Protocol, Mahdi Bazarganigilani (pp. 109-118).
- Design and Analysis of a Non-deterministic Digital Signature Protocol, Odule, Tola John and Olatubosun Abiodun Kaka (pp. 119-130).
- The Risks Facing China’s Mining Companies – An Analysis from Global Perspective, Gu Chunyan (pp. 131-140).
- An Improved Secure Anonymous Protocol for Distributed Computer Networks, Kai Chain, Wen-Chung Kuo and Jiin-Chiou Cheng (pp. 141-150).
- Improvement of Convertible Authenticated Encryption Schemes and Its Multiple Recipients Version, Ting-Yi Chang, Chou-Chen Yang and Min-Shiang Hwang (pp. 151-162).
- A Stronger Formal Security Model of Three-party Authentication and Key Distribution Protocol for 802.11i, Tao Wenjun and Hu Bin (pp. 163-174).
- Modeling of Document Security Checkpoint for Preventing Leakage of Military Information, Jung ho Eom (pp. 175-182).
- Homomorphic Encryption to Preserve Location Privacy, Maede Ashouri-Talouki and Ahmad Baraani-Dastjerdi (pp. 183-190).
- Compliance Risk Assessment Measures of Financial Information Security using System Dynamics, Ae Chan Kim, Su Mi Lee and Dong Hoon Lee (pp. 191-200).
- Design and Implementation of a Compiler with Secure Coding Rules for Secure Mobile Applications, Yunsik Son and Seman Oh (pp. 201-206).
- Security Analysis of the Masking-Shuffling based Side Channel Attack Countermeasures, Jong-Won_Cho and Dong-Guk Han (pp. 207-214).
- Design of User Information Profiling for Consolidated Authentication in N-Screen Environment, Jae-jung Kim, Seng-phil Hong, Yu-jin Shin, Hyun-mi Jang and Jaehyoun Kim (pp. 215-222).