2015
2015
Volume 9, Number 5, 2015 May
-
- Security Model for Sensitive Information Systems and Its Applications in Sensor Networks, Tianbo Lu, Xiaobo Guo, Lingling Zhao, Yang Li, Peng Lin and Binxing Fang (pp. 1-18).
- Mobile Agent Security Using ID-Based Agreement Protocol and Binary Serialization, Hind Idrissi, El Mamoun Souidi and Arnaud Revel (pp. 19-30).
- Service Dynamic Trust Evaluation Model based on Bayesian Network in Distributed Computing Environment, Libin Wang, Xiangjun Li, Xinquan Yan, Song Qing and Yuanlu Chen (pp. 31-42).
- Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment, LI Feng-Quan (pp. 43-54).
- The RC7 Encryption Algorithm, Rashmi, Vicky Chawla and Rajni Sehgal Renuka Nagpal (pp. 55-60).
- Secure Data Sanitization for Android Device Users, Na Huang, Jingsha He and Bin Zhao (pp. 61-68).
- Intrusion Detection System: A Review, Sanjay Sharma and R. K. Gupta (pp. 69-76).
- A Proxy-Based Data Security Solution in Mobile Cloud, Xiaojun Yu and Qiaoyan Wen (pp. 77-84).
- A Secure and Fault Tolerant Platform for Mobile Agent Systems, Rajdeep Bhanot1 and Rahul Hans (pp. 85-94).
- Research on Trustiness of Software Behavior Based on Cross-References, Wei Liu, Linlin Ci and Liping Liu (pp. 95-104).
- An Eyelid Detection Algorithm for the Iris Recognition, Pengfei Cai and Chongke Wang (pp. 105-112).
- Implementation of Privacy-Enhanced SMS Provider on the Android Platform, Min-woo Park, Jung ho Eom and Tai-Myoung Chung (pp. 113-122).
- A Multi-dimensional Evidence-based Trust Evaluation Model and Algorithm, Wenbao Jiang, Qijing Li and Wenliang Chen (pp. 123-132).
- Research on Encryption Key Extraction From Iris Feature, Wei Hao and Yong Wei (pp. 133-140).
- Desktop Computer Virtualization for Improvement Security, Power Consumption and Cost by SBC (Server Based Computer), Lee Yong Hui, Kim Hwan Seok and Kim Baek Ki (pp. 141-152).
- The Research and Application of Multi-Firewall Technology in Enterprise Network Security, Jing Li (pp. 153-162).
- Security Assessment by Google Hacking Automation Tools for the Web Sites of Korea and the USA Universities, Mi Young Bae and Hankyu Lim (pp. 163-174).
- Face Recognition Algorithm Based on Improved BP Neural Network, Li Yong-Qiang (pp. 175-184).
- Exploiting User Behavior Changes in Privacy Disclosure by Modified Clustering Technique, Hongchen Wu, Xinjun Wang, Zhaohui Peng and Qingzhong Li (pp. 185-194).
- Efficient Database Encryption Scheme for Database-as-a-Service Environment, Hankyu Joo (pp. 195-204).
- A Hybrid Malicious Code Detection Method based on Deep Learning, Yuancheng Li, Rong Ma and Runhai Jiao (pp. 205-216).
- Privacy-preserving Attribute Matchmaking in Proximity-based Mobile Social Networks, Solomon Sarpong and Chunxiang Xu (pp. 217-230).
- Evaluating the Cooperation Risk between Rural Tourism and Third-Party Network Platform by Using Confirmatory Factor Analysis, Hui Song (pp. 231-242).
- Image Steganography via Fully Exploiting Modification Direction, Xuejing Niu, Meng Ma, Rui Tang and Zhaoxia Yins (pp. 243-254).
- An Improved Anonymous Remote user Authentication Scheme with Key Agreement based on Dynamic Identity, Yajuan Shi, Han Shen, Yuanyuan Zhang and Jianhua Chen (pp. 255-268).
- User Authentication System using Visual Communication, Byung-Hun Oh, Kyung-Won Chang and Kwang-Seok Hong (pp. 269-278).
- Research for Two-way Real-name Authentication Unified Platform of C2C E-commerce Based on DNS, Xiaotang Li (pp. 279-288).
- The Research on Influence Factors of the Servitization of the Equipment Manufacturing Industry under the Global Value Chain (GVC) Perspective, Xiaowei Xu Xueyuan Wang and Rui Zhang (pp. 289-296).
- Development of Human Identification System Based on Simple Finger-Vein Pattern-Matching Method for Embedded Environments, Kuk Won Ko, Jiyeon Lee, Mehrdad Ahmadi and Sangjoon Lee (pp. 297-306).
- Study on Fault Prediction of Equipments Based on Extension Theory, Ti-chun Wang, Xiao-yi Chen, Shi-sheng Zhong and Yong-jian Zhang (pp. 307-318).
- Homomorphic Encryption for Cluster in Cloud, N. Vamshinath, K. Ruth Ramya, Sai Krishna, P. Gopi Bhaskar, Geofrey L. Mwaseba and Tai-hoon Kim (pp. 319-324).
- A Monitoring Algorithm Based on IP Address Statistics in DCS Isolation Device, Yongguang Ma and Zhiyu Ye (pp. 325-334).
- Complex Background Palm Segmentation using SVM, Gao Peng and Li Liang (pp. 335-344).
- A Bitmap based Data Encryption Scheme in Cloud Computing, Min Yoon, Miyoung Jang, Young-Sung Shin and Jae-Woo Chang (pp. 345-360).