2015
2015
Volume 9, Number 6, 2015 June
-
- On the Building Countermeasures of Content Bank Based on Digital Content Industry, Han Ping, Tao Zhong and Liu Xiao-lu (pp. 1-10).
- Securing Embedded Systems from Power Analysis Attack, Deevi Radha Rani, S. Venkateswarlu, Venkata Naresh Mandhala and Tai-hoon Kim (pp. 11-18).
- Epidemic Model based Security Analysis of Firefly Clock Synchronization in Wireless Sensor Networks, Zhiling Tang and Simin Li (pp. 19-34).
- Design of Distributed Pharmaceutical Retail Management System Based on Advanced Encryption Standard Algorithm, Jingjing Yang, Yuanqiang Wang and Xiao Zhang (pp. 35-42).
- Energy Efficient, Integrity Preserving and Secure Data Aggregation Technique for Wireless Sensor Network, Shrijana Pradhan and Kalpana Sharma (pp. 43-52).
- Fast Authentication Method for Wireless Local Area Network, Guo Hong-tao (pp. 53-60).
- Hybrid Homomorphic Encryption Method for Protecting the Privacy of Banking Data in the Cloud, Maha Tebaa, Karim Zkik and Said El Hajji (pp. 61-70).
- Minutiae-based Triangular Acreage Fingerprint Match Method, Gang Wang, Dan Zhao and Xiaoyu Sun (pp. 71-78).
- Design and Implementation about Secure Smart Electricity Meter Sealing Based on RF Tag, Zhenliu Zhou (pp. 79-88).
- Reliable and Secure Routing ADHOC Algorithm Based on Collaborative Monitor Nodes in VANETS, SunYuezhongyi (pp. 89-100).
- Research on Application of Hierarchical Trust Mechanism in Internet of Things, Deng Xian-Rui, Mu Jingqin and Wei Ping (pp. 101-114).
- An Improved User-Participating Authentication Scheme, Huang Shi, Tianjie Cao and Gao Caiyun (pp. 115-124).
- EEG-based Safety Driving Performance Estimation and Alertness Using Support Vector Machine, Wenbao Jiang, Qijing Li and Wenliang Chen (pp. 125-134).
- An Efficient Key Predistribution Protocol for Wireless Sensor Networks via Combinatorial Design, Jianmin Zhang, Xuerui Wang and Jian Li (pp. 135-146).
- A Chebyshev-Map Based One-Way Authentication and Key Agreement Scheme for Multi-Server Environment, Zengyu Cai, Yuan Feng, Junsong Zhang, Yong Gan and Qikun Zhang (pp. 147-156).
- Image Encryption Research based on Key Extracted from Iris Feature, RuiYun Xie, MingFei Wang and BenZhai Hai (pp. 157-166).
- Extract Function Clone Genealogies across Multiple Versions, Tu Ying, Zhang Li-ping, Wang Chun-Hui and Liu Dong-sheng (pp. 167-182).
- New Approach to Monitoring Internet Access along with Usage of Bandwidth Using Intrusion Detection System, D. Rajagopal, K. Thilakavalli and K. Syed Ali Fathima (pp. 183-194).
- Comparing the Performance of the Ad Hoc Network under Attacks on Different Routing Protocol, Haiyan Liu and Zhanlei Shang (pp. 195-208).
- Research on the Authentication of Radio Frequency Identification based on the Hash function, Bai Zhi and He Yi-Gang (pp. 209-216).
- A Study on the Development of Next Generation Intelligent Integrated Security Management Model using Big Data Technology, JeongBeom Kim (pp. 217-226).
- Anomaly-based Intrusion Detection using Multiclass-SVM with Parameters Optimized by PSO, Gui Ping Wang, Shu Yu Chen and Jun Liu (pp. 227-242).
- Wearable Device in Security, Jo Sung-Gu (pp. 243-250).
- A Half-Dynamic Classification Method on Obfuscated Malicious JavaScript Detection, Zhaolin Fang, Renhuan Zhu, Weihui Zhang and Bo Chen (pp. 251-262).
- Cohort Selection of Specific User Using Max-Min-Centroid-Cluster (MMCC) Method to Enhance the Performance of a Biometric System, Jogendra Garain, Ravi Kant Kumar, Goutam Sanyal and Dakshina Ranjan Kisku (pp. 263-270).
- Thermal aware Internet of Things Enable Energy Efficient Encoder Design for Security on FPGA, Deepa Singh, Kanika Garg, Ravneet Singh, Bishwajeet Pandey, Kartik Kalia and Hasmatullah Noori (pp. 271-278).
- An Adaptive Multi-Layer Block Data-Hiding Algorithm that uses Edge Areas of Gray-Scale Images, Tuan Duc Nguyen, Somjit Arch-int and Ngamnij Arch-int (pp. 279-298).
- Secure and Trusted Environment as a Strategy to Maintain the Integrity and Authenticity of Digital Evidence, Yudi Prayudi and Tri K Priyambodo (pp. 299-314).
- A Novel Authentication Scheme for Lossy Compressed Images, Mona A. M. Fouad and Ahmed Mokhtar A. Mansour (pp. 315-328).
- Research on Robust Adaptive and Efficient Control System: A Theoretical Approach, Fengling Yin and Bingquan Huo (pp. 329-340).