2015
2015
Volume 9, Number 12, 2015 December
-
- Technique for Intrusion Detection based on Minkowsky Distance Negative Selection Algorithm, Niu Ling, Feng Gao-feng and Peng Hai-yun (pp. 1-10).
- Development of a Cloud Computing Interoperability-Based Service Certification, Kangchan Lee, Chulwoo Park and Hee-Dong Yang (pp. 11-20).
- Finite Server Queuing Model with Change-Point and Imperfect Debugging for Software Reliability Assessment, Zhang Nan (pp. 21-28).
- A Parallel Method of Deep Packet Inspection based on Message-Passing Interface, Jia-xing Qu, Guo-yin Zhang, Xi-zhong Wang, Jia-hui Liu and Da-hua Song (pp. 29-34).
- Out-of-band Authentication Using Image-Based One Time Password in the Cloud Environment, Abderrahim Abdellaoui, Younes Idrissi Khamlichi and Habiba Chaoui (pp. 35-46).
- ICP Registration Technology based on the Coordinate System Direction Fit, Heqiang Tian, Peng Yang, Chunjian Su and Zhiqiang Dong (pp. 47-56).
- A Study on the Dos Prevention System for SPT-based Sync Flooding Protection, Keun-Heui Kim, Young-Mo Kang, Mi-Ran Han, and Jong-Bae Kim (pp. 57-66).
- Research on Robustness Tracking of Maneuvering Target for Bionic Robot, Wang Peng, Wu Jian, Zhang Yuan, Li Jixiang and Zhang Pen (pp. 67-76).
- Enhanced Security Certificateless Key Agreement Scheme Design, Tianwei Che, Yuchen Zhang, Jianfeng Ma and Na L (pp. 77-84).
- Hybrid Lightweight and Robust Encryption Design for Security in IoT, Abhijit Patil, Gaurav Bansod and Narayan Pisharoty (pp. 85-98).
- Risk Assessment of Power System Security based on a Hybrid Optimization GP Method, Xiaobin Wu, Hui Li and Xiaolu Chen (pp. 99-114).
- An Algorithm of Clustering by Density Peaks Using in Anomaly Detection, Chunyong Yin, Sun Zhang, Zhichao Yin and Jin Wang (pp. 115-128).
- Enhanced Biometric-based User Authentication Protocol Using Non-tamper Resistant Smart Cards, Minsu Park and Hyunsung Kim (pp. 129-136).
- Research on the Error Detection Technology of Complex Parts based on Improved Bee Colony Algorithm, Jianghua Ge, Huihui Zhang, Yaping Wang, Xiulin Sui and Yongguo Sun (pp. 137-148).
- Face Recognition and Template Protection with Shielding Function, Abayomi Jegede, Nur Izura Udzir, Azizol Abdullah and Ramlan Mahmod (pp. 149-164).
- Cryptanalysis and Improvement of RFID Ownership Transfer Protocol, Xiuqing Chen, Qiang Zhao, Tianjie Cao and Jingxuan Zha (pp. 165-174).
- Toward Anomaly Detection in IaaS Cloud Computing Platforms, Mingwei Lin, Zhiqiang Yao, Fei Gao and Yang Li (pp. 175-188).
- Preserving Location Privacy in Location Based Services against Sybil Attacks, Amit Kumar Tyagi and N. Sreenath (pp. 189-210).
- Inter-domain Alliance Authentication Protocol Based on Blind Signature, Zhang Jie, Zhang Qi-kun, Gan Yong, Yin Yifeng and Tan Yu-an (pp. 211-220).
- Experimental Analysis and Review of “Increased Capacity of Information Hiding”, Aqsa Rashid and Muhammad Khurrum Rahim (pp. 221-230).
- Road Network-based Location Privacy Protection, Chen Wen (pp. 231-236).
- Multiparty Access Control of Ciphertext Sharing in Cloud-Based Online Social Networks, Huang Qinlong, Ma Zhaofeng, Yang Yixian and Niu Xinxin (pp. 237-250).
- A New Remote User Authentication Scheme based on Graphical Password using Smart Card, Khanjan Ch. Baruah, Subhasish Banerjee, Manash P. Dutta and Chandan T. Bhunia (pp. 251-258).
- A Robust Information Hiding Scheme for Protecting Digital Content in DWT-CS Domain, Huimin Zhao, Jun Cai and Li Zhu (pp. 259-268).
- Frequency Tracking of Power Grid based on Phase Difference and UKF, Xiaobing Zhang, Wei Dong and Shichao Jiang (pp. 269-278).
- An Efficient Image Cryptographic Algorithm based on Frequency Domain using Haar Wavelet Transform, Kalyani Mali, Shouvik Chakraborty, Arindrajit Seal, and Mousomi Roy (pp. 279-288).
- Research on Transaction Security Mechanism of Mobile Commerce in Mobile Internet based on MAS, Jiang Wei-Jin, Xu Yu-Sheng, Guo Hong and Zhang Lian-Mei (pp. 289-302).
- Reliability Analysis of Unrepairable Systems with Uncertain Lifetimes, Ying Liu, Xiaozhong Li and Congcong Xiong (pp. 303-312).
- Encryption of Query in DNS Message, Kaouthar Chetioui, Ghizlane Orhanou and Said El Hajji (pp. 313-322).
- An Approach Converting XMI to SMV, Rongshang Chen, Jinyu Kai, Ming Xu and Lei Xia (pp. 323-330).
- A Robust Data Embedding Method for MPEG Layer III Audio Steganography, Mohsen Bazyar and Rubita Sudirman (pp. 331-342).
- Numerical Simulating Long-Distance Emergency Rescue System for Belt Fire in Coal Mine, Shao Hao, Jiang Shuguang, Wu Zhengyan, Zhang Weiqingand Wang Ka (pp. 343-360).
- Cross-Domain Authorization Management Model for Multi-Levels Hybrid Cloud Computing, Li Na, Dong Yun-Wei, Che Tian-Wei, Wang Chao,Gao Yang and Zhang Yu-Chen (pp. 361-372).
- Performance Comparison of Keccak, Skein, Grøstl, Blake and JH: SHA-3 Final Round Candidate Algorithms on ARM Cortex A8 Processor, Rajeev Sobti and G. Geetha (pp. 373-384).
- Review of Security Research on Address Resolution Protocols, Song Guangjia and Ji Zhenzhou (pp. 385-404).
- Research on Non-interactive Construction based on Fuzzy Conditional Proxy Re-encryption, Chunpeng Ge, Jiandong Wang and Liming F (pp. 405-418).
- Public Key Generation and Encryption Mechanism Using the Elliptic Curve in Smart Phones, Seung-Ho Shin and Hee-Ju Eun (pp. 419-428).
- Research on the Consumer Rights Protection in Online Shopping: a Empirical Analysis based on Consumer Credit Law, Shuangjun Xu (pp. 429-438).
- Peer Effect in Spreading Network of Fake Information in Public Crisis, Xiaoxia Zhu, Mengmeng Liu and Haiju Hu (pp. 439-446).