2012
2012
Volume 6, Number 2, 2012 April
-
- A Technique for Secret Communication Using a New Block Cipher with Dynamic Steganography, Gandharba Swain and Saroj Kumar Lenka (pp. 1-12).
- An Approach to Map COBIT Processes to ISO/IEC 27001 Information Security Management Controls, Razieh Sheikhpour and Nasser Modiri (pp. 13-28).
- Distributed Computation of SBoxes with Strong Security Properties, Panayotis E. Nastou and Yannis C. Stamatiou (pp. 29-46).
- Face Features Based Biometric Watermarking of Digital Image Using Singular Value Decomposition for Fingerprinting, Vandana S Inamdar and Priti P Rege (pp. 47-60).
- A Privacy-Protecting Architecture for Recommendation Systems via the Suppression of Ratings, Javier Parra-Arnau, David Rebollo-Monedero and Jordi Forné (pp. 61-80).
- LSMPMON: Performance Evaluation Mechanism of LSM-based Secure OS, Toshihiro Yamauchi and Kenji Yamamoto (pp. 81-90).
- A Communication Protocol of RFID Systems in Internet of Things, HuiDan Gao,YaJun Guo, JianQun Cui, HengGeng Hao and Hui Shi (pp. 91-102).
- Cryptanalysis of Smart-Vercauteren and Gentry-Halevi’s Fully Homomorphic Encryption, Gu Chun-sheng and Gu Ji-xing (pp. 103-108).
- An Architecture of Document Control System for Blocking Information Leakage in Military Information System, Jung ho Eom, Nam uk Kim, Sung hwan Kim and Tai Myoung Chung (pp. 109-114).
- Distributed Group Key Management in Wireless Mesh Networks, Peng Xiao, Jingsha He and Yingfang Fu (pp. 115-120).
- Human Face Recognition Based on Improved D-LDA and Integrated BPNNs Algorithms, Wenkai Xu and Eung-Joo Lee (pp. 121-126).
- An Enhanced Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards, Wen-Chung Kuo, Kai Chain, Jiin-Chiou Cheng and Jar-Ferr Yang (pp. 127-132).
- Improving the Security Level in Direct Sequence Spread Spectrum using Dual Codes (DC-DSSS), Rahat Ullah and Shahid Latif (pp. 133-136).
- Security Test Methodology for an Agent of a Mobile Device, Keunwoo Rhee, Hawon Kim and Hac Yun Na (pp. 137-142).
- Efficient Password-based Two Factors Authentication in Cloud Computing, Ali A. Yassin, Hai Jin, Ayad Ibrahim, Weizhong Qiang and Deqing Zou (pp. 143-148).
- Jamming Attack Detection and Rate Adaptation Scheme for IEEE 802.11 Multi-hop Tactical Networks, Kwangsung Ju and Kwangsue Chung (pp. 149-154).
- A Study on Biometric Standards for Adaptation of the National Infrastructure, Yong-Nyuo Shin, Dong-Kyun Lim and Seung-Jung Shin (pp. 155-160).
- Watermarking for Multi-resolution Image Authentication, Piyu Tsai, Yu-Chen Hu, Hsiu-Lien Yeh and Wei-Kuan Shih (pp. 161-166).
- Immune Computation of Secure Embedded Linux Core against Viruses and Software Faults, Tao Gong and Changxing Du (pp. 167-172).
- Data Hiding on Text Using Big-5 Code, Jun-Chou Chuang and Yu-Chen Hu (pp. 173-178).
- An Efficient Black Hole Detection Method using an Encrypted Verification Message in Mobile Ad Hoc Networks, Firoz Ahmed, Seok Hoon Yoon and Hoon Oh (pp. 179-184).
- Minimal Information Loss for Privacy-Preserved eHealth Applications, Ya-Ling Chen, Bo-Chao Cheng, Hsueh-lin Chen, Chia-I Lin, Guo-Tan Liao, Bo-Yu Hou and Shih-Chun Hsu (pp. 185-190).
- SQL Injection Detection with Composite Kernel in Support Vector Machine, Yi Wang and Zhoujun Li (pp. 191-196).
- Histogram Rotation-Based Image Watermarking with Reversibility, Youngseok Lee and Jongweon Kim (pp. 197-202).
- An Improved Secure Dynamic ID Based Remote User Authentication Scheme for Multi-Server Environment, Cheng-Chi Lee, Yan-Ming Lai and Chun-Ta Li (pp. 203-210).
- A Study on Intelligent Video Security Surveillance System with Active Tracking Technology in Multiple Objects Environment, Juhyun Park, Jeonghun Choi, Myoungheum Park, Sukwon Hong and Hyomin Kim (pp. 211-216).
- Geometrically Invariant Image Watermarking Based on Feature Extraction and Zernike Transform, Xiao-Chen Yuan and Chi-Man Pun (pp. 217-222).
- Parallelization of Two Arithmetic Operations over Finite Field GF(2n), Yongnan Li and Limin Xiao (pp. 223-228).
- Automatic Analysis Method for SELinux Security Policy, Gaoshou Zhai and Tong Wu (pp. 229-234).
- A TWS3CDM based Marking Policy in DiffServ Networks, Byun-Gon Kim , Kwan-Woong Kim, Tae-Su Jang and Yong-Kab Kim (pp. 235-240).
- A Cloud-aided RSA Signature Scheme for Sealing and Storing the Digital Evidences in Computer Forensics, Chu-Hsing Lin, Chen-Yu Lee and Tang-Wei Wu (pp. 241-244).
- Implement Access Control Architecture to Enhance Security and Availability of Cloud Computing Systems, Xixu Fu, Kaijun Wu and XiZhang Gong (pp. 245-250).
- Development of FBG Sensor for Structure Deformation Measurement, Hyuntae Kim, Yumi Kim, Jingyu Do, Jangsik Park and Yunsik Yu (pp. 251-256).
- Secure File Delete in NAND-based Storage, Ilhoon Shin (pp. 257-260).
- Two-Factor User Authentication in Multi-Server Networks, Chun-Ta Li, Chi-Yao Weng and Chun-I Fan (pp. 261-268).
- An Improved MITM Attack Against NTRU, Zhijian Xiong, Jinshuang Wang, Yanbo Wang, Tao Zhang and Liang Chen (pp. 269-274).
- OPC Unified Architecture for Industrial Demand Response, Jian-ping Chou, Li-chao Chen, YingJun Zhang and Li-hu Pan (pp. 275-280).
- A Improved Channel Access Algorithm for IEEE 802.15.4 WPAN, Hyeopgeon Lee, Aran Kim, Kyounghwa Lee and Yongtae Shin (pp. 281-286).
- Collapse by Cascading Failures in Hybrid Attacked Regional Internet, Ye Xu and Zhuo Wang (pp. 287-292).
- High-precision Immune Computation for Secure Face Recognition, Tao Gong (pp. 293-298).
- A Secure Sharing Mechanism for Data Resources in Extended Virtual Machine System, Yunfa Li, Jian Wan, Rong Ouyang, Wei Zhang and Wanqing Li (pp. 299-306).
- Negative Authorization in Access Control for Cloud Computing, Xiaohui Li, Jingsha He and Ting Zhang (pp. 307-312).
- A Defeasible Description Logic Based Semantic Security Policy Conflict Detection Approach, Luokai Hu, Changchun Qiu and Yuda Shi (pp. 313-320).
- Optimized Discriminant Locality Preserving Projection of Gabor Feature for Biometric Recognition, Xi Chen and Jiashu Zhang (pp. 321-328).
- A Reputation Evaluation Technique for Web Services, Nianhua Yang, Xin Chen and Huiqun Yu (pp. 329-334).
- Secure ebXML Business Transaction Models Applying Web Service Security Standards, Dongkyoo Shin and Dongil Shin (pp. 335-340).
- A Semantic Rule-based Detection Scheme against Flooding Attacks on Cloud Environment, Chu-Hsing Lin, Chen-Yu Lee, Shin-Pin Lai and Wei-Shen Lai (pp. 341-346).
- Performance Analysis of Graph Laplacian Matrices in Detecting Protein Complexes, Dong Yun-yuan, Keith C.C. Chan, Liu Qi-jun and Wang Zheng-hua (pp. 347-352).
- Security Requirements of a Mobile Device Management System, Keunwoo Rhee, Woongryul Jeon and Dongho Won (pp. 353-358).
- An Action Based Access Control Model for Multi-level Security, Mang Su, Fenghua Li, Guozhen Shi and Li Li (pp. 359-366).
- The Design and Analysis of a Hardware-based Anomaly Detection Scheme, JinLong Piao and Seong Baeg Kim (pp. 367-372).
- A Novel Approach for SMS Security, Jongseok Choi and Howon Kim (pp. 373-378).
- An Efficient Wrapper-based Digital Rights Management, Wei-Chen Wu, Horng-Twu Liaw (pp. 379-384).
- Intrusion Trace Classification using Inter-element Dependency Models with k-Truncated Generalized Suffix Tree, Dae-Ki Kang and Pilsung Kang (pp. 385-390).
- Voucher Web Metering Using Identity Management Systems, Fahad Alarifi (pp. 391-396).
- Equivalent Key Recovery Attack to H2-MAC, Fahad Alarifi (pp. 397-402).
- A Novel Nonlinear Network Coding Signature Scheme Determined by the SIS problem, Yanqing Yao, Zhoujun Li and Hua Guo (pp. 403-408).
- SPA: Self-certified PKC-based Privacy-preserving Authentication Protocol for Vehicular Ad Hoc Networks, Jianhong Zhang, Yuanbo Cui, Zhipeng Chen (pp. 409-414).
- Efficient Virtual Machine Scheduling Exploiting VCPU Characteristics, Byung Ki Kim, Jin Kim and Young Woong Ko (pp. 415-420).
- Efficient Data Deduplication System Considering File Modification Pattern, Ho Min Jung, Sang Yong Park, Jeong Gun Lee and Young Woong Ko (pp. 421-426).
- Analysis of Urban Transit Environment for Video Analytics Application and Processing Scenarios, Kwang-Young Park and Goo-Man Park (pp. 427-430).
- Information Hiding Scheme with Reversibility Using Difference Segmentation and Histogram Adjustment, Yung-Chen Chou, Chun-Yi Huang and Yu-Chen Hu (pp. 431-436).
- Integrated Surveillance System and Field Test in Urban Transit System, Kwang-Young Park, Ji-Hye Jeon and Goo-Man Park (pp. 437-442).
- Model-driven Secure Development Lifecycle, Zhendong Ma, Christian Wagner, Arndt Bonitz, Thomas Bleier, Robert Woitsch and Markus Nichterl (pp. 443-448).
- Evaluation of Time Complexity Based on Max Average Distance for K-Means Clustering, ShinWon Lee and WonHee Lee (pp. 449-454).
- Construct a New ELGamal-type Public Key Cryptography over Finite Field, Zheng-jun Jing, Guo-ping Jiang and Chun-sheng Gu (pp. 455-462).
- The Characteristics of Smartwork Security Compare to Traditional Telework, Young-Jin Choi, JongHei Ra, DongIk Shin and Yong-Gyu Jung (pp. 463-468).
- Hidden Attribute Certificate-based Encryption Extensions Model, Li Yu, Zhao Yong, Gong Bei and Xin Si-yuan (pp. 469-474).