2016
2016
Volume 10, Number 10, 2016 October
-
- Anti-PUE Attack Base on Fractal Dimension in Spectrum Sensing, Xu Jie and Fu Shuang (pp. 1-12).
- Evaluation of the Effectiveness of NFC-based Anti-Theft Security System for Motorbike, Taeseok Jin (pp. 13-20).
- Double Validation Multi Level Proxy Blind Signature Scheme Key Management, Wang Jin-feng (pp. 21-28).
- Application of Non-certificate Multi-level Proxy Digital Signature Scheme in Online Banking Transaction, Lin Zhu (pp. 29-36).
- An Analytic Study of Cyber Security Strategies of Japan, Kyoungsik Min and Seung-Woan Chai (pp. 37-46).
- A Fuzzy Relative Ratio Method for Construction Safety Management Performance Evaluation, Laijun Luo, Hui Zhou (pp. 47-56.
- A Study on the Intention of Public Institution Managers and Procurement Business Bidding Managers to Use the e-Procurement System, Kil-hwan Shin, Choon Yeul Lee and Woon-heok Ko (pp. 57-66).
- A General Encryption Algorithm for Different Format Videos, Hao Li, Cheng Yang, Jiayin Tian and Jianbo Liu (pp. 67-76).
- Implementation of Multi-level Network Security Management System based Middleware Strategy, Yunliang Zou (pp. 77-88).
- Mobile Security and its Application, Jun Hou Chan and Jer Lang Hong (pp. 89-106).
- Network Information Security Research Based on the Grey Matter Element Analysis Method, Qingji Tian (pp. 107-118).
- Security Analysis and Improvement of the TNC IF-T Protocol Binding for Tunneled EAP Methods, Yuelei Xiao (pp. 119-134).
- Experimental Analysis using Robust Key Exchange Authentication Scheme in Mobile Ad-hoc Environments, Cheol-seung Lee (pp. 135-146).
- RFID Tag Ownership Transfer Protocol of Multi-owner with Different Weights Based on Lagrange Algorithm, Gan Yong, Yang Zong-qin, He Lei and Du Chao (pp. 147-154).
- An X-ray Inspection System for Illegal Object Classification based on Computer Vision, Yu Wang, Xiaomin Yang, Wei Wu, Bingshan Su and Gwanggil Jeon (pp. 155-168).
- Sensitive Data Hiding Scheme for Internet of Things using Function Call Obfuscation Techniques, Jeongmi Shin and Yeonseung Ryu (pp. 169-180).
- An Improved Zero-knowledge Identification Scheme based on Quasi-Dyadic Codes, Mu Han, Xiaolin Feng and Shidian Ma (pp. 181-190).
- Image Watermarking Scheme Based on DWT-DCT and SSVD, Zhi Zhang, Chengyou Wang and Xiao Zhou (pp. 191-206).
- Analysis and Comparison of Regulations for National Cybersecurity, Dea-woo Park (pp. 207-214).
- A Secure and Efficient Multi-Factor Mutual Certificateless Authentication with Key Agreement Protocol for Mobile Client-Server Environment on ECC without the third-party, Liling Cao and Wancheng Ge (pp. 215-226).
- Study on Displacement-based Design Method for Structures with Buckling Restrained Brace: Security and Seismic Design, Changhao Zhang, Wei Wang and Jianhu Feng (pp. 227-236).
- Enhanced User Authentication Method Using USB Device Information, Jin-Hae Lee, Seon-Joo Kim, Jin-Woo Lee, Jin-Mook Kim and In-June Jo (pp. 237-248).
- A Dynamic Semi Parametric Panel Spatial Lag Model for Brain Drain and Economic Stability Based on the Security Perspective, Shengming Chen, Yabin Zhang and Azhong Ye (pp. 24-260).
- Design and Evaluation of Novel Effective Montgomery Modular Multiplication Architecture, Maryam Moayedi and Abdalhossein Rezai (pp. 261-270).
- Reducing Computations in Chang et. al.,’s on-line Electronic Check, Zhili Zhou, Ching-Nung Yang and Chih-Fei Chen (pp. 271-288).
- False Information Diffusion in Public Crisis on Interpersonal Network and Intervention Strategies, Zhu Xiaoxia, Hao Jiajia and Hu Haiju (pp. 289-302).
- Fine-Grained Access Control for Cloud Data Sharing by Secure and Efficient Attribute-Revocable Ciphertext-Policy Attribute-Based Encryption, Nyamsuren Vaanchig, Wei Chen and Zhiguang Qin (pp. 303-320).
- Detection and Performance Analysis of Wormhole Attack in MANET using DELPHI Technique, Sandeep Kumar Arora and Ayushree (pp. 321-330).
- Study on Cybersecurity of Hybrid, Multi-hop, Wireless Network, Li Li and Hu Zhiyu (pp. 331-340).
- The Data Processing Approach for Preserving Personal Data in FinTech-Driven Paradigm, Kyongjin Kim and Sengphil Hong (pp. 341-350).