2015
2015
Volume 9, Number 7, 2015 July
-
- A Security Architecture in Cyber-Physical Systems: Security Theories, Analysis, Simulation and Application Fields, Tianbo Lu, Jiaxi Lin, Lingling Zhao, Yang Li and Yong Peng (pp. 1-16).
- An Effective Layered Load Balance Defensive Mechanism against DDoS Attacks in Cloud Computing Environment, N. Ch. S. N. Iyengar and Gopinath Ganapathy (pp. 17-36).
- Clean Development Mechanism and Its Risk Management Policy in Urban Infrastructure Construction, Zhou Jun, Zhang Hongwei and Liu Yingjia (pp. 37-48).
- Niederreiter Cascade Combination Cryptosystem Based on the Double Public Keys, Zhou Xue Guang, Li Zhong Yuan, Wang Hao Tian and Qv Cheng Qin (pp. 49-58).
- A Deformed Shape Detection Scheme Using Time Series Images, Hoejung Jung and Namgi Kim (pp. 59-68).
- Network Attack Defense Awareness based on Dynamic Game, Man Li and Jinjing Cao (pp. 69-78).
- Multimodal Biometric Recognition System for Cloud Robots, Shuqing Tian, Sung Gyu Im and Suk Gyu Lee (pp. 79-88).
- Dynamic Awareness Method for Network Threats based on Rough Vulnerability Relation Model, Jieyun Xu and Hongzhen Xu (pp. 89-98).
- Collaborative Filtering Recommendation Algorithm based on Trust Propagation, Miao Duan (pp. 99-108).
- Anomaly Recognition in Online Social Networks, Ashish Rawat, Gunjan Gugnani, Minakshi Shastri and Pardeep Kumar (pp. 109-118).
- Research on Mobile E-business Security Model based on WPKI Technology and its Application, Yongsheng Luo (pp. 119-128).
- E-Commerce Security in Rural Tourism based on Factor Analysis, Hui Song and Ling Wu (pp. 129-140).
- A Study on Effectiveness using Security Routing based on Mobile Ad-hoc Networks, Cheol-seung Lee (pp. 141-152).
- A Density-based Binary SVM Algorithm inthe Cloud Security, Mingyuan Yu, Shuhang Huang, Qing Yu, Yan Wang, and Jiaquan Gao (pp. 153-162).
- Cultivating and Assessing an Organizational Information Security Culture; an Empirical Study, Areej Al Hogail (pp. 163-178).
- The Study of Access Control Model Using XML, Huanming Zhang, Quanlong Guan and Weiqi Luo (pp. 179-188).
- A Novel Safe File Sharing Method Based on Cloud Storage Structure in DHT Networks, Zhongning Lu and Gaofeng Shen (pp. 189-200).
- Subsampling-Based Image Tamper Detection and Recovery Using Quick Response Code, Wen-Chuan Wu (pp. 201-216).
- Secret Sharing-Based Chaotic Image Encryption, Tiejun Zhang, Aya El-Fatyany, Li Li, Mohamed Amin, Ahmed A. Abd El -Latif (pp. 217-224).
- A Novel Fault Diagnosis Framework Based on Reliability Analysis and Arithmetic Circuit, Rongxing Duan, Du Chen and Jinghui Fan (pp. 225-240).
- A Comparison of the 3DES and AES Encryption Standards, Noura Aleisa (pp. 241-246).
- Load Spectrum and Fatigue Life Computer Analysis of Prestressed Concrete Bridges, Xin Qin, Dou Yuanming and Chen Wan (pp. 247-266).
- SSTL Based Power Efficient Implementation of DES Security Algorithm on 28nm FPGA, Bishwajeet Pandey, Vandana Thind, Simran Kaur Sandhu, Tamanna Walia and Sumit Sharma (pp. 267-274).
- An Efficient Secure DV-Hop Localization for Wireless Sensor Network, Xiaole Liu, Rui Yang and Qingmin Cui (pp. 275-284).
- Quantum Authentication Protocol for Classical Messages Based on Bell states and Hash Function, Xiangjun Xin, Xiaolin Hua, Jianpo Song and Fagen Li (pp. 285-292).
- Wormhole Attack in Mobile Ad-hoc Network: A Survey, Akansha Shrivastava and Rajni Dubey (pp. 293-298).
- Researching Indistinguishability of the Polymorphism Time Stamp Watermarking, Yifeng Yin, Heyu Wen and Kunpeng Fan (pp. 299-306).
- NSPK Protocol Security Model Checking System Builder, Wang Yan and Liu Ying (pp. 307-316).
- A Hybrid Attribute based RBAC Model, Ting Cai, Jian Zheng and Xing Du (pp. 317-328).
- Cryptanalysis of a Certificateless Ring Signcryption Scheme, Hongzhen Du and Qiaoyan Wen (pp. 329-336).
- Security Authentication Method of Terminal Trusted Access in Smart Grid, Yufeng Wang, Lie Wu and Yun Yang (pp. 337-346).
- Security Threats Recognition and Countermeasures on Smart Battlefield Environment based on IoT, Jung ho Eom (pp. 347-356).