2013
2013
Volume 7, Number 2, 2013 March
-
- A Novel Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion, Zhiyong Li, Junmin Liu and Weicheng Tao (pp. 1-14).
- TCLOUD: A Multi – Factor Access Control Framework for Cloud Computing, Sultan Ullah, Zheng Xuefeng and Zhou Feng (pp. 15-26).
- E-LPG: Energy Efficient Location Privacy Scheme Against Global Attackers in Sensor Networks, Sejun Song, Hyungbae Park and Baek-Young Choi (pp. 27-46).
- Cryptanalysis of Server-Aided Password-Based Authenticated Key Exchange Protocols, Junghyun Nam, Kim-Kwang Raymond Choo, Juryon Paik and Dongho Won (pp. 47-58).
- An Empirical Study of Metric-Based Methods to Detect Obfuscated Code, Corrado Aaron Visaggio, Giuseppe Antonio Pagin and Gerardo Canfora (pp. 59-74).
- A Faster Cryptanalytic Time-Memory Tradeoff, Jung Woo Kim, Jungjoo Seo, Jin Hong and Kunsoo Park (pp. 75-88).
- X-Policy: Knowledge-based Veri?cation Tool for Dynamic Access Control Policies, Hasan Qunoo and Mark Ryan (pp. 89-104).
- Study on A Secure Remote User Authentication Scheme Using Smart Cards, Jin Qiuyan, Kwangwoo Lee and Dongho Won (pp. 105-116).
- Classification of Symmetric Key Management Schemes for Wireless Sensor Networks, Suman Bala, Gaurav Sharma and Anil K. Verma (pp. 117-138).
- On the Security of H2-MAC, Fanbao Liu, Tao Xie and Changxiang Shen (pp. 139-148).
- A New NUI Method for Hand Tracking and Gesture Recognition Based on User Experience, Wenkai Xu and Eung-Joo Lee (pp. 149-158).
- Efficient and Non-Interactive Hierarchical Key Agreement in WSNs, Hyunsung Kim (pp. 159-170).
- An Empirical Analysis on Development Effects of Diabetic Prevention Information System, Seong-Ran Lee (pp. 171-178).
- Cryptography: A New Approach of Classical Hill Cipher, M. Nordin A. Rahman, A. F. A. Abidin, Mohd Kamir Yusof, N. S. M. Usop (pp. 179-190).
- Face Recognition via Local Directional Pattern, Dong-Ju Kim, Sang-Heon Lee and Myoung-Kyu Sohn (pp. 191-200).