2016
2016
Volume 10, Number 12, 2016 December
-
- Research on Access Control and Encryption Transmission of 6LoWPAN, Fan Tongrang, He Bingchao, Zhao Wenbin, Huang Xin, Yu Tao (pp. 1-12).
- A Novel Technique for Detection & Isolation of Blackhole Attack, Shivani Vijan and Sandeep Kumar Arora (pp. 13-20).
- Design and Implementation of Inter-core Communication of Embedded Multiprocessor Based on Shared Memory, Yang Nie, Lili Jing, Pengyu Zhao (pp. (21-30).
- Real-time Evaluation Mechanism Based on Double Evidence Classification of User Behavior, Jiale Zhang, Guiling Zhang and Xiufang Zhang (pp. 31-42).
- Meter-HES Mutual Authentication in the Smart Grid AMI Environment, Seung-hwan Ju, Young-in Park, Sang-gyoo Sim, Myung-chul Lim, Sung-hyu Han, Hee-suk Seo (pp. (43-52).
- Research on a structure of the Multimedia list Oriented Network Intrusion Detection System, Xu Zhao, Jin Jiang and Max Stinnett (pp. 53-68).
- Design of a Secure Biometric Authentication Framework Using PKI and FIDO in Fintech Environments, Jae Jung Kim and Seng Phil Hong (pp. 69-80).
- An Efficient Public Auditing Scheme for Multi-Cloud Storage, Haiyang Yu, Yongquan Cai, Shanshan Kong, Fei Xue and Ditta Allah (pp. 81-96).
- Semi-quantum Key Distribution Protocol Based on Bell States, Ting Wang, Dongning Zhao, Zhiwei Sun, Weixin Xie (pp. 97-110.
- A New Ultra Lightweight Encryption Design for Security at Node Level, Gaurav Bansod (pp. 111-128).
- Security Detection of Building Structure Based on Sparse Encoding Deep Learning Algorithm, Zheng Li (pp. 129-140).
- Research on Information Security Audit Base on Semantic Web Ontology and Improve Vector Space Model, Zhanjiang Wang, Shuoning Wang, Ling Wang (pp. (141-152).
- Role Performance Trust-Based Access Control for Protecting Sensitive Attributes, Mohd Rafiz Salji, Nur Izura Udzir, Mohd Izuan Hafez Ninggal, Nor Fazlida Mohd Sani, Hamidah Ibrahim (pp. 153-172).
- An Anomaly Detection Algorithm based on Online Learning Lagrangian SVM for Cloud Computing Environment, GuiPing Wang, Ren Li, XiaoYi Yuan (pp. 173-188).
- Effect of Easy Transaction, Consumer Interests, and Systems Security Level Measures against Fraud Online Shopping in Lazada, Meiliyah Ariani, Zulhawati (pp. 189-206).
- Research on Coupling Coordination Degree of Security Emergency Management in Coal Mine, Gang He, Yanna Zhu, Guisheng Zhang, Guotong Qiao (pp. 207-218).
- An Intrusion Prevention Technology Based on Dynamic Random Password Authentication in Wireless Sensor Networks, Xiaolong Xu, Zhonghe Gao, Lijuan Han (pp. 219-228).
- The Secure IEEE 11073:20601 Protocol and Agent Structure for Protecting PHD, Doyoung Chung, Gaeil An, Sokjoon Lee, Byungho Chung (pp. 229-240).
- A New Kind of Image Encryption Algorithm based on Improvement Bit Plane, Honge Ren, Xiyan Xu, Jian Zhang, Yali Chen (pp. 241-250).
- Static Anomaly Detection Framework for Android-based Mobile Phones, Xiaobo Ji, Fan Zeng, Bangxian Ye (pp. 251-260).
- Java Implementation of a Cloud-based SIM Secure Element NFC Payment Protocol, Pardis Pourghomi, Şadi Evren Şeker, Gheorghita Ghinea, Wassim Masri (pp. 261-282).
- Research on Trust-Based Access Control in The Internet of Things, Xiao-hui Cheng, Meng Hu, Tong Wang, Yun Deng (pp. 283-288).
- Copy Detection Technique with Enhanced Efficiency by using Substring Comparison Algorithm, U. Nanaji, N. Thirupathi Rao, Ch. Raj Kumar, Debnath Bhattacharyya, Hye-jin Kim (pp. 289-298).
- Voice Playback Detection based on Long-window Scale-factors, Yanan Chen, Rangding Wang, Diqun Yan, Chao Jin (pp. 299-310).
- Cryptanalysis of a Multiple Server Smart Card based Authentication Scheme, Kwang Cheul Shin (pp. 311-322).
- Time-Varying Neural Networks for Dynamical Systems Modeling with Application to Image Compression, Ying Kong, Hui-juan Lu (pp. 323-334).
- A Multi-attribute Keyword Retrieval Mechanism for Encrypted Cloud Data, Yunfa Li, Mingyi Li, Yangyang Shen (pp. 335-346).
- Network Security Prediction Method Based on Kalman Filtering Fusion Decision Entropy Theory, Liang Huang, Xinhao Chen, Xinsheng Lai (pp. 347-358).
- Computer Network Vulnerability Assessment and Safety Evaluation Application based on Bayesian Theory, Xianyou Zhu (pp. 359-368).
- A Survey of Unconstrained Face Recognition Algorithm and Its Applications, Ranbeer Tyagi, Geetam Singh Tomar, Namkyun Baik (pp. 369-376).
- GABP Neural Network Algorithm Applied in Evaluation of Computer Network Security, Xiaochun He, JunJun Feng, Ruchun Jia (pp. 377-388).
- A Multi Dimension Service Trust Model in Social Network, Leiyue Yao, Qianglai Xie (pp. 389-398).
- A Secure Ownership Transfer Protocol Supporting Face to Face Transactions for RFID Tag, Lyu Xin-mei, Zhang Tao (pp. 399-408).
- The Impacts of Smartphone Addiction and Technostress on Customer Satisfaction and Loyalty, DaeEop Kim and Jae-Ik Shin (pp. 409-418).