2016
2016
Volume 10, Number 6, 2016 June
-
- F-Crowds: An Anonymity Scheme for P2P File-Sharing, Tianbo Lu, Xinyuan Zhang, Xiaofeng Du and Yang Li (pp. 1-12).
- A First Step Towards Security for Internet of Small Things, Namhi Kang (pp. 13-22).
- Ecological Security Evaluation of Zhalong Wetland Nature Reserve based Composite Index Evaluation Method, Yuqi Wang, Dongke Lv and Zhenglin Sun (pp. 23-28).
- User Identity Authentication Based on the Combination of Mouse and Keyboard Behavior, Haitao Tang and Wang Mantao (pp. 29-36).
- User Revocation Mechanism for Service Oriented Wireless Adhoc Networks, Reddi Prasadu, M. Jeevan Babu, Sk. Mohammed Gouse, Debnath Bhattacharyya and Tai-hoon Kim (pp. 37-46).
- Research for Classification Method of Battery Based on State of Health, Yu Zhilong and Li Ran (pp. 47-54).
- More Reliable Approach for Detecting Data Alterations in Communication Networks, Vikas Dhawan, Gurjot Singh Gaba (pp. 55-64).
- Research on the Network Marketing Channel Strategy in Sports Life: an Empirical Analysis based on College Students, Yadong Ren (pp. 65-74).
- A Detection Framework of Malicious Code Based on Multi-Classifiers Ensemble, Chao Dai, Jianmin Pang, Feng Yue, Pingfei Cui, Di Sun and Liang Zhu (pp. 75-86).
- A Study on Responding to DDoS Architecture in Smart Phone Environment, Mi-Ran Han, Young-Chul Oh and Jong-Bae Kim (pp. 87-98).
- Research on an Improved RFID Anti-collision Algorithm in the Internet of Things, Jiangang Jin (pp. 99-106).
- Shellix: An Efficient Approach for Shellcode Detection, Mo Chen, Changzhen Hu, Donghai Tian, Xin Wang, Yuan Liu and Ning Li (pp. 107-122).
- A Study on Control Item of ISMS in the Financial Industry, Yong-Sik Kim, Gyoocheol Lee, Yongtae Shin, Younglak Choi, Jin-Ho Park and Jong-Bae Kim (pp. 123-134).
- An Automatic Identification Authentic Work Anti-counterfeiting Algorithm Based on DWT-DCT, Yue Zhang and Jingbing Li (pp. 135-144).
- Adaption of Integrated Secure Guide for Secure Software Development Lifecycle, Ki-Hyun Lee, Young. B Park (pp. 145-154).
- A Target-Oriented Path Generation Method based on Concolic Testing, Zhang Xuzhou, Gong Yunzhan, Wang Yawen and Xing Ying (pp. 155-170).
- Research on Digital Watermark Algorithm based on Compression Perception, Junkai Zhang (pp. 171-180).
- Forensic Analysis of MERS Smishing Hacking Attacks and Prevention, Soon-ho Moon, Dea-woo Park (pp. 181-192).
- The Research of Network Security Based on Cognitive Radio, Ruihui Mu and Junwei Li (pp. 193-204).
- The Research based on SSL and WPKI of Mobile E-commerce, Jijun Xing (pp. 205-214).
- On Resolving Key Escrow Problem in HIBE and HIBS, Jian-Wu Zheng, Jing Zhao and Xin-Ping Guan (pp. 215-228).
- EEE-GSM: End-to-End Encryption Scheme over GSM System, Mohammed Ramadan, Guohong Du, Fagen Li, Chun Xiang Xu (pp. 229-240).
- Simulation Analysis of Stereo Garage Control Algorithm based on ADRC, Yongde Zhang, Tongning Shi, Lei Wang, Jingguo He and Daifu Tian (pp. 241-248).
- Research on Probabilistic Model based Services Composition Compatibility Focusing on Structural Behaviors Modeling, Honghao Gao, Yucong Duan and Yonghua Zhu (pp. 249-260).
- A Study on Vulnerability Assessment Technique of People-Oriented Security through Pattern Analysis, Choon Park and Dae-Sik Ko (pp. 261-268).
- Banknote Image Defect Recognition Method Based on Convolution Neural Network, Wang Ke, Wang Huiqin, Shu Yue, Mao Li and Qiu Fengyan (pp. 269-280).
- Analysis on Influence Domain of Control Flow Modification in Regression Testing based on FCP, Mingjue Hu, Yongmin Mu and Aiping Xu (pp. 281-294).
- A Research Survey of Ring Signature Scheme and Implementation Issues, F. A. Alahmari, Turki. A. Alqarni and Jayaprakash Kar (pp. 295-304).
- An Intelligent Application Platform for Campus Life Based on Mobile Internet, Guanlin Chen, Peng Niu and Hui Yao (pp. 305-314).
- A Novel Face Template Protection Algorithm Based on the Fusion of Chaos Theory and RSA Encryption, Liu Yunan, Zhao Fudong, Xu Yanli and Cao Yu (pp. 315-330).
- Cryptographic Encapsulation in the New ENC-DNSSEC Protocol, Kaouthar Chetioui, Ghizlane Orhanou and Said El Hajji (pp. 331-340).
- Analyzing the Impact of the Internet on Higher Education, Renjie Zhou, Dongchen Xia, Yuyu Yin, Jilin Zhang, Wei Zhang and Jin Feng (pp. 341-350).
- An Analysis Modeling Architecture for Supporting Physical Layer Security of Wireless Networks under Hardware Impairments, Kyusung Shim, Nhu Tri Do and Beongku An (pp. 351-362).
- Research on Security Assessment of Highway Slope Protection by using NURBS modeling: an Ecological Perspective, Hongxiu Liu and Bohang Sun (pp. 363-374).