2015
2015
Volume 9, Number 9, 2015 September
-
- Prison Identification Technology Research Based on Iris Image Recognition, Lv Hanfei and Jiang Congfeng (pp. 1-8).
- A Study on Service Architecture for Secure Authentication System, Sung Jin Kim, Myung Chul Ma, Hyeon-Kyung Lee and Jong-Bae Kim (pp. 9-20).
- Public Data Auditing with Constrained Auditing Number for Cloud Storage, Guangyang Yang, Hui Xia, Wenting Shen, Xiuxiu Jiang and Jia Yu (pp. 21-32).
- Malicious URL Detection Algorithm based on BM Pattern Matching, Fuqiang Yu (pp. 33-44).
- Design of a Robust Normal Distribution Sampler for Ring-Learning-With-Errors Cryptographic Scheme, Sangook Moon (pp. 45-54).
- Research on Dynamic Trust Computing Method Based on Multi-Dimensional Evidence, Shi DeJia, Jiang WeiJin and Zhang Lian Mei (pp. 55-64).
- A Novel SINS/CNS Integrated Navigation Algorithm used in a Ballistic Missile, Lihua Yang, Baolin Li and Lei Ge (pp. 65-76).
- A Case Study on Converged Security with Event Correlation of Physical and Information Security, Koohong Kang and Jinoh Kim (pp. 77-94).
- Technique for Intrusion Detection based on Cutting-based Real-valued Negative Selection, Niu Ling, Feng Gao Feng and Ma Jing (pp. 95-104).
- An Ethical Approach of Block Based Image Encryption Using Chaotic Map, Kamlesh Gupta, Ranu Gupta, Rohit Agrawaland Saba Khan (pp. 105-122).
- Detection and Prevention to Network Worm Virus Based on Segmentation Algorithm, Yuqi Tang (pp. 123-130).
- Faithful Quantum Secure Communication with Authentication based on Bell States and Classical XOR Resisting Collective Noise, Tao Fang and Min Li (pp. 131-140).
- Comparative Analysis of Offline Signature Verification System, Deepti Yadav and Ranbeer Tyagi (pp. 141-150).
- An Improved ID-based Proxy Signature Scheme with Message Recovery, Caixue Zhou (pp. 151-164).
- Fast Three-Input Multipliers over Small Composite Fields for Multivariate Public Key Cryptography, Haibo Yi and Weijian Li (pp. 165-178).
- Ice Disaster Prevention Measure Optimization Model, Hui Hou, Yuan-sheng Li, Joe Dong, Ning Lu and Ai-hong Tang (pp. 179-188).
- Fault Analysis in Software with the Data Interaction of Classes, Yan Xiaobo and Wang Yichen (pp. 189-196).
- Chaotic Theory based Defensive Mechanism against Distributed Denial of Service Attack in Cloud Computing Environment, N. Ch. S. N. Iyengar and Gopinath Ganapathy (pp. 197-212).
- A New Method of Fingerprints Singular Points Detection, Zhang Zhe, Liang Yuanyuan and Liu Xiangjiao (pp. 213-224).
- Evaluating Performance of Intrusion Detection System using Support Vector Machines: Review, Leila Mohammadpour, Mehdi Hussain, Alihossein Aryanfar, Vahid Maleki Raee and Fahad Sattar (pp. 225-242).
- A Novel Architecture for Cognitive Internet of Things, Mingchuan Zhang, Yong Qiu, Ruijuang Zheng, Xiuling Bai, Wangyang Wei and Qingtao Wu (pp. 243-252).
- Quantum Public-key Cryptosystem without Quantum Channels between Any Two Users using Non-orthogonal States, Xiaoyu Li and Yuwen Chen (pp. 253-264).
- Two Way Authentication in MITM Attack to Enhance Security of E-commerce Transactions, Rupali Savita and Unmukh Datta (pp. 265-274).
- Research on Intrusion Detection Algorithm of User Data based on Cloud Computing, Zhang Hongdong and Song Yuli (pp. 275-284).
- A Kind of Encryption Method of QR Code based on ECA State Ring, Yu Guang, Shi Yunbo and Che Chang (pp. 285-294).
- A Genetic Algorithm Approach for Breaking of Simplified Data Encryption Standard, Farah Al Adwan, Mohammad Al Shraideh and Mohammed Rasol Saleem Al Saidat (pp. 295-304).
- Digital Watermark of 3D CAD Product Model, Xiaoqing Feng, Yanan Liu and Lincong Fang (pp. 305-320).
- Intrusion Detection System based on Hidden Conditional Random Fields, Jun Luo and Zenghui Gao (pp. 321-336).
- Collusion-Resistant Identity-Based Proxy Re-Encryption Without Random Oracles, Jun Jie Qiu, Jung Bok Jo and Hoon Jae Lee (pp. 337-344).
- Information Industry Security: An Ecological Point of View, Menggang Li and Xiaolan Guan (pp. 345-358).
- Network Intrusion Detection System Model Based On Artificial Immune, Zhang Yanbin (pp. 359-370).
- Cyber Attack Detection System based on Improved Support Vector Machine, Shailendra Singh and Sanjay Silakari (pp. 371-387).
- Non-deterministic K-anonymity Algorithm Based Untrusted Third Party for Location Privacy Protection in LBS, Jinying Jia and Fengli Zhang (pp. 387-400).
- Research on Operation Performance of Women Oriented Cross-country Teaching in College: an Empirical Analysis Based on Multimedia Computer, Luo Hong, Long Xiaodong, Tao Ganchen, Long Jianjun, Wan Shaoyong and Chen Yuanping (pp. 401-412).