2015
2015
Volume 9, Number 1, 2015 January
-
-
- Phishing Sites and Prevention Measures, Zhou Fuan (pp. 1-10).
- An Enhanced Trust Management Framework for MANET using Fuzzy Prediction Mechanism, V. Hemamalini, G. Zayaraz and V. Vijayalakshmi (pp. 11-24).
- Improved Tent Map and Its Applications in Image Encryption, Xuefeng Liao (pp. 25-34).
- A High-security RFID Grouping Proof Protocol, Ping Huang and Haibing Mu (pp. 35-44).
- Proposal: A Design of E-learning User Authentication System, Byeong Ho Kang and Hyejin Kim (pp. 45-50).
- Implementation: Mobile Face Identity Authentication System on Android Platforms, Pinjie Ye, Mengmeng Yu and Minghui Wu (pp. 51-60).
- Steganalysis using Regional Correlation and Second-order Markov Features, Su Jinyang, Zeng Xianting and Wang Lei (pp. 69-76).
- New Arbitrated Quantum Signature Scheme without Entangled State, Jiang Guan Xiong and Zhang Jun (pp. 77-88).
- FPGA Implementation of Watermarking Scheme Using XSG, Korrapati Rajitha, Usha Rani.Nelakuditi, Venkata Naresh Mandhala and Tai-hoon Kim (pp. 89-96).
- Cross-access Method for Team Confidential Document Based on Offline Key Management, Haoli Luan, Cunxu Wang, Zhenliu Zhou and Zheng Yang (pp. 97-108).
- Analysis Method based on Rough Attack-defense Bayes Game Model, Kai Zhang (pp. 109-118).
- Security Challenges for Building Knowledge-Based Economy in Nigeria, L. J. Muhammad, Abdullahi Garba Ali and Ibrahim Sani Iliya (pp. 119-124).
- A Secure Data Transmission Scheme Based on Information Hiding in Wireless Sensor Networks, Baowei Wang, Hongwei Qian, Xingming Sun, Jian Shen and Xiaoyu Xie (pp. 125-138).
- A Simple Security Architecture for Mobile Office, Seungcheon Kim and Hoon Jin (pp. 139-146).
- Comment on New Construction of Efficient Certificateless Aggregate Signatures, Yulei Zhang and Caifen Wang (pp. 147-154).
- A Systematic Review of Studies on Cyber Physical System Security, Peiyuan Dong, Yue Han, Xiaobo Gu1 and Feng Xie (pp. 155-164).
- Feed Forward Networks in Color Extended Visual Cryptography to Generate Meaningful Shares, J. Ida Christy and V. Seenivasagam (pp. 165-178).
- Universally Composable Attribute-based Group Key Exchange, Hui Xie, Yongjie Yan and Sihui Shu (pp. 179-190).
- A (n,t,n) Verifiable Multi-secret Sharing Scheme with Secure Secret Reconstruction, Li Meng, Qu Shaoyun, Xun Tiantian and Yu Jia (pp. 191-204).
- SBISurban-Secure Urban Bus Information System based on Smart Devices, Donghyuk Park and Hyunsung Kim (pp. 205-220).
- On the Security and Robustness with Fingerprint Watermarking Signal via Compressed Sensing, Huimin Zhao and Yanmei Fang (pp. 221-236).
- Hiding Messages using Musical Notes: A Fuzzy Logic Approach, Chandan Kumar, Sandip Dutta and Soubhik Chakraborty (pp. 237-248).
- Privacy Protection for LBS in Mobile Environments: Progresses, Issues and Challenges, Julong Pan, Zhengwei Zuo, Zhanyi Xu and Qun Jin (pp. 249-258).
- A New (n, n)-threshold Reversible Secret Image Sharing Using Histogram Shifting, Gil-Je Lee, Dae-Soo Kim and Kee-Young Yoo (pp. 259-270).
- A Unified Authentication Scheme Based on Analytic Mechanism, Yong Xu, Yejuan Cheng and Chang Xiao (pp. 271-282).
- An Effective Approach of Distortion-Resistant Video Watermarking for Piracy Deterrence, Nilesh Kumar Dubey and Shishir Kumar (pp. 283-294).
- A Novel Preserving Client Privacy and Designate Verifier Auditing Scheme for Cloud Storage, Jiang Xu, Wenliang Chen, Sai Ji, Yongjun Ren, Jin Wang (pp. 295-304).
- Watermarking Scheme of MPEG-4 LASeR Object for Mobile Device, Dae-Jea Cho (pp. 305-312).
- Towards Attacks and Defenses of Anonymous Communication Systems, Tianbo Lu, Puxin Yao, Lingling Zhao, Yang Li, Feng Xie and Yamei Xia (pp. 313-328).
- SMS Spam Filterinig Using Keyword Frequency Ratio, Sin-Eon Kima, Jung-Tae Job and Sang-Hyun Choic (pp. 329-336).
- A Novel Method of Protection of Monitor Link, Guo Hong-tao (pp. 337-346).
- Research on Safety Distance Mathematical Model of Pro-Active Head Restraint in Rear-end Collision Avoidance System, Xiaoqin Yin and Mingxia Wang (pp. 347-356).
- Network Threat Analysis based on Vulnerability Relation Model, Zhihong Wang (pp. 357-368).
- Efficient Methods to Trigger Adversarial Behaviors from Malware during Virtual Execution in SandBox, Jung-Uk Joo, Incheol Shin, Minsoo Kim (pp. 369-376).
- Arbitrated Proxy Signature Scheme Based on Quantum Cryptography, Wang Xiuqing and Zhang Jun (pp. 377-386).
- Security on Dynamic ID-based Authentication Schemes, Jingxuan Zhai, Tianjie Cao, Xiuqing Chen and Shi Huang (pp. 387-396).
- An Improved Biometric-based Multi-server Authentication Scheme Using Smart Card, Khanjan Ch. Baruah, Subhasish Banerjee, Manash P. Dutta and Chandan T. Bhunia (pp. 397-408).
- Joint Fingerprinting/Encryption for Medical Image Security, Conghuan Ye, Zenggang Xiong, Yaoming Ding, Xueming Zhang, Guangwei Wang and Fang Xu (pp. 409-418).
-