2014
2014
Volume 8, Number 3, 2014 May
-
- An Architecture Design for Wireless Authentication Security in Bluetooth Network, Bijoy Kumar Mandal, Debnath Bhattacharyya and Tai-hoon Kim (pp. 1-8).
- Privacy- Preserving Keyword-based Semantic Search over Encrypted Cloud Data, Xingming Sun, Yanling Zhu, Zhihua Xia and Lihong Chen (pp. 9-20).
- Secure Group Ownership Transfer Protocol for Tags in RFID System, Lei He, Yong Gan and Yi-feng Yin (pp. 21-30).
- A New Left-to-Right Scalar Multiplication Algorithm Using a New Recoding Technique, Abdalhossein Rezai and Parviz Keshavarzi (pp. 31-38).
- SSM: Secure Service Manager for the Internet of Things, Jiye Park and Namhi Kang (pp. 39-48).
- Cryptographic Analysis and Improvement of the Structured Multi-signature Scheme for P2P E-Services, Ji Yi Wu, Yuquan Zhang, Jun Zhang and Wen Juan Li (pp. 49-62).
- An Efficient Encryption Scheme using Elliptic Curve Cryptography (ECC) with Symmetric Algorithm for Healthcare System, Young Sil Lee, Esko Alasaarela and Hoon Jae Lee (pp. 63-70).
- Cloud-Computing-Based Risk Control System for Making Information Technology Outsourcing Secure, Ming Shao and Tao Gong (pp. 71-78).
- A Design of e-Healthcare Authentication Framework with QR Code, Non Thiranant and Hoon Jae Lee (pp. 79-86).
- A P2P Botnet Detection Method Used On-line Monitoring and Off-line Detection, Yuhui Fan and Ning Xu (pp. 87-96).
- Distributed Signing Protocol for Tamper-Resistant Module, Shinsaku Kiyomoto, Tsukasa Ishiguro and Yutaka Miyake (pp. 97-106).
- A Cooperative Intrusion Detection Model for Cloud Computing Networks, Shaohua Teng, Chaoyu Zheng, Haibin Zhu, Dongning Liu and Wei Zhang (pp. 107-118).
- Intelligent Risk Mapping and Assessment System, Sang-Young Lee (pp. 119-124).
- Based on the complex network of local routing strategy scale-free networks, Cao Fenglian and Wang Tao (pp. 125-136).
- Cryptanalysis of A MultSecurity control analysis of ICS, Dongkyun Seo, Young In You and Kyungho Lee (pp. 137-142).i-use CCA-secure Proxy Re-encryption Scheme, Yi Cai and Deyu Qi (pp. 161-170).
- Privacy Protection in E-commerce: Identity-based Anonymous Privacy Agent, Dan Guo (pp. 143-152).
- Research on e-commerce security based on risk management perspective, Wu Yanyan (pp. 153-162).
- Database Security Model in the Academic Information System, Ema Utami and Suwanto Raharjo (pp. 163-174).
- Cooperative Architecture for Secure M2M Communication in Distributed Sensor Networking, Sungmo Jung, Donghyun Kim and Seoksoo Kim (pp. 175-184).
- Sequence Composition Analysis of Noninterference in Cyber-Physical System with Petri Net, Jingming Wang, Huiqun Yu and Chunxia Leng (pp. 185-192).
- Modeling of Risk Factors in Determining Network Security Level, Martin Suhartana, Bens Pardamean and Benfano Soewito (pp. 193-208).
- Image Scrambling Algorithm based on Grouping Calculation, Lianyuan Jiang, Haohao Yuan, Jianbing Jiang, Yalan Zhang and Jian He (pp. 209-220).
- Privilege Management System in Cloud Computing using Oauth, Jeong-Kyung Moon, Hwang-Rae Kim and Jin-Mook Kim (pp. 221-234).
- Architecture Design and Cyber Security Evaluation of a Festival Management System Server, Han Seong Son and Soon Gohn Kim (pp. 235-240).
- Security System for Healthcare Data in Cloud Computing, Maya Louk, Hyotaek Lim and Hoon Jae Lee (pp. 241-248).
- Research on Intrusion Detection System Based on Clustering Fuzzy Support Vector Machine, Zhai Jinbiao (pp. 249-260).
- Defense-in-Depth Architecture of Server Systems for the Improvement of Cyber Security, Hanseong Son and Soongohn Kim (pp. 261-266).
- Customer Satisfaction Study of Disaster Recovery Based on IPA Model, En-lin Li (pp. 267-276).
- Study on Risk Identification and Prevention of Power Transformer Based on Sampling Inspection Theory, TianShu Bi, JinMeng Chen and Meng Sun (pp. 277-288).
- Risk Assessment of Power System under Typhoon Disaster, Hui Hou, Xiongkai He, Zheng-tian Li, Aihong Tang and Hua-liang Fang (pp. 289-296).
- Research on Application of Listed Company Financial Fraud Distinguish Based on Acceleration-convergent BP network algorithm, Zhenjie Li (pp. 297-308).
- Multi-cue Integration Object Tracking Based on Blocking, Lichuan Gu, Chengji Wang, Jinqin Zhong, Jianxiao Liu and Juan Wang (pp. 309-324).
- Comparison of E-payment of the B2C E-commerce in China from the Security and Trust Perspective, YingHua Zhang and RenXiang Wang (pp. 325-338).
- An Improved Wu-Manber Multiple Patterns Matching Algorithm for Mobile Internet Content Security Audit in a Chinese Environment, Zhenjiang Zhang, Xinlei Jin, Ziqi Hao and Xiaolan Guan (pp. 339-354).
- Optimization Study on Interval Number Judgment Matrix Weight Vector Based on Immune Evolution Algorithm, Jianming Sun and Jing Wu (pp. 356-362).
- Secure on Demand IP based Connection (SEDIC) for Virtual Private Networks(VPNs), Saadiah Yahya, Mohamed Sulaiman Sultan Suhaibuddeen, Zainab Abu Bakar and Ahmad Yusri Dak (pp. 363-376).
- Metadata Driven Efficient CRE based Cipher Key Generation and Distribution in Cloud Security, R. Anitha and Saswati Mukherjee (pp. 377-392).
- Improving the management of IDS alerts, Tu Hoang Nguyen, JiaWei Luo and Humphrey Waita Njogu (pp. 393-406).
- SWOT analysis of access control models, Ennahbaoui Mohammed and El Hajji Said (pp. 407-424).