2015
2015
Volume 9, Number 3, 2015 March
-
-
IPSec Security Policy Research Based on Formal Description in VPN, Qi Hong-zhuo and Luo Zhi-yong (pp. 1-6).
The paper was removed because it was withdrawn by the Authors. - Studying Security Weaknesses of Android System, Jae-Kyung Park and Sang-Yong Choi (pp. 7-12).
- Robust Analysis of Network based Recommendation Algorithms against Shilling Attacks, Fuguo Zhang (pp. 13-24).
- Towards a Framework for Assuring Cyber Physical System Security, Tianbo Lu, Jinyang Zhao, Lingling Zhao, Yang Li and Xiaoyan Zhang (pp. 25-40).
- Data Outsourcing based on Secure Association Rule Mining Processes, V. Sujatha, Debnath Bhattacharyya, P. Silpa Chaitanya and Tai-hoon Kim (pp. 41-48).
- An Improved Evaluation Index System for the Host Information Security Evaluation System, Yuyi Ou, Jinbiao Xie and Jie Ling (pp. 49-62).
- Accurate and Diverse Recommendations Based on Communities of Interest and Trustable Neighbors, Qihua Liu (pp. 63-76).
- A study of issues about Accredited Certification methods in Korea, Seung-Woan Chai, Kyoung-Sik Min and Jeong-Hyun Lee (pp. 77-84).
- A New Bionic Architecture of Information System Security Based on Data Envelopment Analysis, Jianrong Yao and Minxue Wei (pp. 85-98).
- Efficient Iris Recognition Method for Large Scale Database, Chang-Soo Choi, Jeong-Man Seo and Heeman Lee (pp. 99-112).
- Research on Privacy Protection Approach for Cloud Computing Environments, Xiaohui Li, Hongxing Liang and Dan Jia (pp. 113-120).
- Securing Cloud Emails Using Two Factor Authentication Based On Password/Apps In Cloud Computing, Kayigana Virgile and Huiqun Yu (pp. 121-130).
- Research on Iris Localization Algorithm based on the Active Contour Model, Chongke Wang and Zhengben Zhang (pp. 131-138).
- A Survey on Detection and Prevention of Cross-Site Scripting Attack, V. Nithya, S. Lakshmana Pandian and C. Malarvizhi (pp. 139-152).
- An Iris Localization Algorithm based on Morphological Processing, Kun Yu, Zeyu Xu and Lixin Xu (pp. 153-162).
- An Investigation on Image Secret Sharing, Saman Salehi and Mohammad Ali Balafar (pp. 163-190).
- Efficient Zero-Knowledge Proofs of Knowledge of Double Discrete Logarithm, Bin Lian, Gongliang Chen and Jianhua Li (pp. 191-208).
- A Virtual-Internetworking-Stack (VIS) Approach to Achieve a Flexible, Proprietary Security Model by Augmentation of the Transport Layer under the Collaborative Framework of Sine Wave Encryption Technique and Generation of Color QR Codes, Soham Sengupta and Parthapratim Sarkar (pp. 208-254).
- Research on Security Transmission of Perceptual Hash Values Based on ECC and Digital Watermarking, Zhang Qiuyu, Xing Pengfei, Liu Yangwei, Zhang Qianyun and Huang Yibo (pp. 255-266).
- Quantum Secure Communication Protocol Based on Single-photon”, (pp. 267-274).
- Adaptive Robust Video Watermarking Scheme based on Dual Transform Domains and Holography, DaYou Jiang, De Li and Jong Weon Kim (pp. 275-284).
- A Cross-domain Authentication Method for Cloud Computing, Chen Xu and Jingsha He (pp. 285-292).
- On the Comparison of Malware Detection Methods Using Data Mining with Two Feature Sets, Sathaporn Srakaew Warot Piyanuntcharatsr and Suchitra Adulkasem (pp. 293-318).
- Monoecism Algorithm in the Application of E-commerce Information Security, Qingjie Zhang, Jianming Zhu, Xiaoxu Wang and Yapan Li (pp. 319-334).
- The Analysis of Android Malware Behaviors, Fan Yuhui and Xu Ning (pp. 335-346).
- Analysis of Perusal Confirmation of Sharp Mail, Hankyu Joo (pp. 347-352).
- On the Existence of Subliminal Channel in Instant Messaging Systems, Lingyun Xiang, Yuhua Xie, Gang Luo and Weizheng Wang (pp. 352-362).
- The Research of Data Security Mechanism Based on Cloud Computing, Changyou Guo and Xuefeng Zheng (pp. 363-370).
- Iterative Learning Identification for Single Image Information Hiding, Ying Kong and Hui-Juan Lu (pp. 371-382).
- Network Security Threat Situation Evaluation Based on Fusion Decision and Spread Analysis, Xiangdong Cai (pp. 383-388).
-