2015
2015
Volume 9, Number 8, 2015 August
-
- Secure Similarity Search over Encrypted Cloud Images, Yi Zhu, Xingming Sun, Zhihua Xia and Naixue Xiong (pp. 1-14).
- Tangramrine: A Novel Graphical Recognition and Cued-recall based Password System, Steven Altamirano, Jesú s Zanelli, Juan M. Gutiérrez Cárdenas and Daniela Bringas (pp. 15-22).
- Safeness Discussions on TRBAC and GTRBAC Model and an Improved Temporal Role-Based Access Control Model, Meng Liu and Xuan Wang (pp. 23-34).
- Personalized Context-aware Recommendation Approach for Web Services, Zhang Xue-Jie, Wang Zhi-Jianand Zhang Wei-Jiang (pp. 35-44).
- Security and Usability Improvement on a Digital Door Lock System based on Internet of Things, Ilkyu Ha (pp. 45-54).
- Rocket Safety Control Intelligent Decision System, Li Ya, Zhang Jian-xun and Xiao Zhao-hui (pp. 55-66).
- An In-depth Analysis of Various Steganography Techniques, Sangeeta Dhall, Bharat Bhushan and Shailender Gupta (pp. 67-94).
- ABE based Access Control with Authenticated Dynamic Policy Updating in Clouds, Liang-Ao Zhang, Xingming Sun, Zhihua Xia and Qiuju Ji (pp. 95-110).
- A Novel Ant Colony Optimization Algorithm for QoS-Based Multicast Trusted Routing in Wireless Ad Hoc Networks, Hui Xia, Xiu-qing Lu and Zhen-kuan Pan (pp. 111-126).
- Design and Development of a Command-line Tool for Portable Executable File Analysis and Malware Detection in IoT Devices, June Ho Yang and Yeonseung Ryu (pp. 127-136).
- Probabilistic Load Flow Calculation Method of Containing Wind Farm Considering Grid Configuration Uncertainties, Hongsheng Su and Yan Yan (pp. 137-152).
- A Study on Optimized Watermarking Scheme for MPEG-4 Contents Services on Mobile Device, Dae-Jea Cho (pp. 153-164).
- Enhance Safety of Telecare Medicine Information System With A RFID-based Authentication Scheme, He Jialiang, Xu Zhiqiang and Xu Xiaoke (pp. 165-174).
- An Improved Cyclic Feature Spectrum Detection Algorithm in CR Systems, Guicai Yu, Chengzhi Long and Mantian Xiang (pp. 175-186).
- A Study on the Development of the Emergent System Recovery in an Effective Way from Hacking Attacks or Security Incidents, Jeongbeom Kim (pp. 187-194).
- Sensitive-resisting Relation Social Network Privacy Protection Model, Han Yan (pp. 195-204).
- A Dependency analysis for Information Security and Risk Management, B. Chaitanya Krishna, Kodukula Subrahmanyam and Tai-hoon Kim (pp. 205-209).
- An Improved HB+ Protocol and its Application to EPC Global Class-1 Gen-2 Tags, Zhicai Shi, Jian Dai, Fei Wu, Yongxiang Xia, Yihan Wang and Changzhi Wang (pp. 210-220).
- An API Calls Monitoring-based Method for Effectively Detecting Malicious Repackaged Applications, Wenhao Fan, Yuan’an Liu and Bihua Tang (pp. 221-230).
- A Study on Audit Information Systems Improved Model based on Public Internal Audit Paradigm Shift, Jong-Suk Park, Young-Chul Oh, Jae-Gon Yoo, Yongtae Shin and Jong-Bae Kim (pp. 231-242).
- Construction Scheme of NSFC Open Access Library, Jianjun Li, Minshe Zhang, Dong Li, Wei Zhang and Jin Wang (pp. 243-252).
- Prototype Design of Mobile Micro-payment to Enhance Security by 2 Factor Authentication, Byung-Rae Cha, Sang-Hun Lee, Soo-Bong Park, Gun-Ki Lee and Yoo-Kang Ji (pp. 253-260).
- Quantitative Analysis Methodology of Non-deterministic Causal Relationship in Risk Analysis, Dewang Ren and Wei Zheng (pp. 261-274).
- A Hybrid approach for Camera-Model Detection, Shang Gao (pp. 275-282).
- Extraction Security Indexing Value to use Story-Telling and Attribute-Based Encryption Scheme considering on Big Data Environment, You-jin Song and Jang-mook Kang (pp. 283-292).
- Fundamental Two-Party Quantum Secret Sharing Protocol without Quantum Entanglement, Jun-Cheol Jeon (pp. 293-302).
- Impact Evaluation of Distributed Denial of Service Attacks using NS2, Raghav Vadehra, Nitika Chowdhary and Jyoteesh Malhotra (pp. 303-316).
- Study on Fuzzy Catastrophe Risk Model Based on Fuzzy Theory, Xiaoxia Zhu (pp. 317-322).
- Multi-domain Security Authentication Protocol for Hybrid Cloud, Zhang Qikun, Zhang Lei, Gan Yong, Duan zhaolei and Zheng Jun (pp. 323-336).
- A Study on a Secure Profile Model for Home Network in Cyber-Physical System, Hoon Ko, Libor Mesicek and Kitae Bae, Goreti Marreiros, Haengkon Kim, Hyun Yoe and Carlos Ramos (pp. 337-346).
- Printed Document Authentication Using Two-Dimensional (2D) Barcodes and Image Processing Techniques, Mohammed AL-Gawda, Zou Beijiand Nurudeen Mohammed (pp. 347-366).
- Enhanced User Authentication Scheme for Wireless Sensor Networks, Hee-Joo Park (pp. 367-374).
- Research on Factors Affecting Employees Security Behavior Based on Structural Equation Model, Yanna Zhu, Gang He, Xianfei Zhu, Guotong Qiao, Guisheng Zhang and Lianwei Heng (pp. 375-384).
- Evolution Mechanism of Information Industry Ecological Security, Xiaolan Guan, Menggang Li and Shugang Zhang (pp. 385-396).
- Leveraging Certificate-less Public Key Cryptosystem for Node ID Assignment in Structured P2P Systems, Dengqi Yang, Jian Yang and Benhui Chen (pp. 397-408).
- A Seamless Constraint Model of Multi-Scale Representation of Geographical Information, Di Chen, Han Yue and Xinyan Zhu (pp. 409-416).
- Timing-reliable Design of High-speed TigerSHARC 201 Link Transceiver, Peng Wang, Ke Gong, You-chao Tu, Xiao-li Zhang and Xin-wu Chen (pp. 417-426).
- Heuristic Grid Resource Scheduling Algorithm based on Group of Task and Secondary Distribution, Zhongping Zhang, Yupeng Feng, Shan Zhang and Ying Sun (pp. 427-438).
- The Dynamic Replication Mechanism of HDFS Hot File based on Cloud Storage, Mingyong Li, Yan Ma and Meilian Chen (pp. 439-448).