2014
2014
Volume 8, Number 6, 2014 November
-
- Privacy-preserving Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Dynamic Update, Xingming Sun, Lu Zhou, Zhangjie Fu, and Jin Wang (pp. 1-16).
- P_PAKA: Privacy Preserving Authenticated Key Agreement Protocol in Smart Grid, Hyunsung Kim (pp. 17-24).
- Block-Based Scheme for Database Integrity Verification, Lancine Camara, Junyi Li, Li Renfa, Faustin Kagorora, Damien Hanyurwimfura (pp. 25-40).
- Analysis of Typical Secure Routing Protocols in WSN, Jingsha He, Bo Zhou and Ruohong Liu (pp. 41-50).
- Implementation of Biometric Techniques in Social Networking Sites, Shilpi Sharma, J. S. Sodhi (pp. 51-60).
- A Novel Image Encryption Scheme based on the LSM Chaotic System, Congxu Zhu, Yuping Hu, Xinran Zhou (pp. 61-70).
- The Design of Robust Authentication Mechanism using User’s Biometrics Signals, Jung ho Eom (pp. 71-80).
- A Hierarchical Information System Risk Evaluation Method Based on Asset Dependence Chain, Xin Tong, Xiaofang Ban (pp. 81-88).
- A Zero-watermarking Scheme based on LPM and Holographic, De Li, LuYan Qiao, JongWeon Kim (pp. 89-100).
- Honeypot-based Signature Generation for Polymorphic Worms, Sounak Paul, Bimal Kumar Mishra (pp. 101-114).
- Shilling Attack Detection Algorithm based on Non-random-missing Mechanism, Man Li (pp. 115-126).
- An Improved Bilateral Remote User Authentication Scheme that Preserves User Anonymity using Symmetric Cryptology, Jung Gil Cho and Won Whoi Huh (pp. 127-136).
- The Design of Fingerprint Identification System based on Improved Binarization Algorithm, Zhu Heng-jun, Guo Ying, Zhang Nan-nan, Liang Hong (pp. 137-146).
- Study on Financial-sector Information Security Level Assessment and Improvement Anticipation Model, Young-Rai Park, Yoon-Chul Choy, Won-Sung Shon (pp. 147-160).
- The Network Attack Model based on Hierarchical Expanded Stochastic Petri Net, Yongfu Zhou (pp. 161-172).
- A Difference Expansion Based Reversible Data Hiding Algorithm Using Edge-Oriented Prediction, Wen-Chao Yang, Ling-Hwei Chen and Chang-Hsing Lee (pp. 173-184).
- The Construction Research of Security Computer Network System Based on the Distributed Intrusion Detection Technology, Xin Huang, Rongze Wan (pp. 185-196).
- Batch Auditing for Multi-client Dynamic Data in Multi-cloud Storage, Xin Liu and Yujia Jiang (pp. 197-210).
- Steganography Technique for JPEG2000 Compressed Images Using Histogram in Wavelet Domain, Geeta Kasana, Kulbir Singh, Satvinder Singh Bhatia (pp. 211-224).
- A Strong Lightweight Authentication Protocol for Low-cost RFID Systems, Zhicai Shi, Josef Pieprzyk, Christophe Doche, Yongxiang Xia, Yu Zhang, Jian Dai (pp. 225-234).
- Still Images Watermarking Signature, Gwanggil Jeon (pp. 235-244).
- A Novel Approach towards Detection of Spoofed Manufacturer Identity under the Collaborative Frameworks of Mobile Computing and Product Specific QR Codes, Soham Sengupta, Partha Pratim Sarkar (pp. 245-260).
- Quantum Cryptanalysis of Multivariate Permutation Problem, Guodong Sun, Shenghui Su, Maozhi Xu (pp. 261-272).
- Improved Life of Watchdog Nodes in Ad hoc Networks, Anitha M and Dr. Rhymend Uthariaraj V (pp. 273-284).
- A Network Intrusion Detection Model Based on K-means Algorithm and Information Entropy, Gao Meng, Li Dan, Wang Ni-hong, Liu Li-chen (pp. 285-294).
- A Secret Sharing Scheme Based on AES, Jie Cui, Lei Chen, Yiming Zhang, Zhiqiang Xie, Hong Zhong (pp. 295-302).
- A New Factor State Space Model for SCADA Network Attack and Defense, Li Yang, Ling Wang, Xinyu Geng, Xiedong Cao (pp. 303-314).
- A Survey of Digital Image Watermarking Optimization based on Nature Inspired Algorithms NIAs, Jumana Waleed, Huang Dong Jun, Thekra Abbas, Saad Hameed and Hiyam Hatem (pp. 315-334).
- Construction and reduction methods of vulnerability index system In power SCADA, Yuancheng Li, Shengnan Chu (pp. 335-352).
- Research on Intrusion Event Sequence Correlation Method for Privacy Protection, Duan Xueying (pp. 353-364).
- Improved Fully Homomorphic Encryption over the Integers with Shorter Public Keys, Can Xiang, Chun-ming Tang (pp. 365-374).
- A Security Assessment Framework and Selection Method for Outsourcing Cloud Service, Xiaochen Liu, Chunhe Xia, Jiajin Cao, Jinghua Gao, Zhao Wei (pp. 375-388).
- An Access Authentication Scheme Based on 2-HIBS in Proxy Mobile IPv6 Network, Tianhan Gao (pp. 389-396).
- OOAP: A Novel Authorization Protocol for Access to Sensitive Data in Trusted Cloud Computing Platforms, Dongjun Luo, Xiaoyun Wu, Xinwei Zheng and Yuping Hu (pp. 397-404).
- A Recent Review of MP3 Based Steganography Methods, Mohsen Bazyar and Rubita Sudirman (pp. 405-414).