Research Briefs on
Information & Communication Technology Evolution
(ReBICTE)
ISSN: 2383-9201 (Online)
Volume 1 (2015)
Article No. 1 (DOI:10.22667/ReBiCTE.2015.01.15.001)
A Grid-based Approach to Location-Dependent Key Management in Wireless Sensor Networks
Jaewoo Choi, Jihyun Bang, Mirim Ahn, Leehyung Kim, and Taekyoung Kwon
Article No. 2 (DOI:10.22667/ReBiCTE.2015.01.15.002)
Secure Distribution Protocol for Restoring Information with Different Accesing Grants
Lidia Ogiela, Marek R. Ogiela, and Urszula Ogiela
Article No. 3 (DOI:10.22667/ReBiCTE.2015.01.15.003)
Harvesting Entropy from On-board Sensors of Constrained Devices for Hardening Security of
IoT Communication Mechanisms
Marcin P. Pawlowski, Antonio J. Jara, and Maciej J. Ogorzalek
Article No. 4 (DOI:10.22667/ReBiCTE.2015.01.15.004)
An Efficient Handover Authentication Scheme Based on HMAC for Proxy Mobile IPv6 Network
Tianhan Gao, Ling Tan, Peiyu Qiao, and Kangbin Yim
Article No. 5 (DOI:10.22667/ReBiCTE.2015.01.15.005)
Security Threats in Electronic Currency Exchange Protocols
Marek R. Ogiela and Piotr Sułkowski
Article No. 6 (DOI:10.22667/ReBiCTE.2015.01.15.006)
A Privacy Preserving V2I Service Access Management System for Vehicular Clouds
Youngho Park, Chul Sur,and Kyung-Hyune Rhee
Article No. 7 (DOI:10.22667/ReBiCTE.2015.01.15.007)
A Study of Compensation in Personal Identifiable Information Leakage
Tomohisa Ishikawa and Kouichi Sakurai
Article No. 8 (DOI:10.22667/ReBiCTE.2015.01.15.008)
Detection of Employees’ Carelessness Leading to Cause Insider Threats through Analyzing Email RDF Data
Sung-Min Kim, Young-Seok Son, and Young-Guk Ha
Article No. 9 (DOI:10.22667/ReBiCTE.2015.01.15.009)
Advanced Unknown Malicious Code Detection Model
Hyoungjun Kim, Jaehee Lee, Hyunsik Yoon, and Kyungho Lee
Article No. 10 (DOI:10.22667/ReBiCTE.2015.01.15.010)
Secure Virtual Keypad for Smartphones against Shoulder Surfing Attacks
Dongmin Choi, Cheolheon Baek, Jian Shen, and Ilyong Chung
Article No. 11 (DOI:10.22667/ReBiCTE.2015.01.15.011)
A Traffic Mitigation Method for DDoS Defense in Large Autonomous System
Ho-Seok Kang and Sung-Ryul Kim
Article No. 12 (DOI:10.22667/ReBiCTE.2015.01.15.012)
Study on Scenario-based Personnel Risk Analysis
Inhyun Cho, Jaehee Lee, and Kyungho Lee
Article No. 13 (DOI:10.22667/ReBiCTE.2015.01.15.013)
Non-memorizing evolutionary authentication algorithm using the preference symbols for secondary authentication
KwangCheol Rim
Article No. 14 (DOI:10.22667/ReBiCTE.2015.01.15.014)
The Trusted Two-dimensional Code System based on Certificate-based Signature Scheme
Tianhan Gao, Luoyin Feng, Yingnan Zhao, Shiyue Qin, and Quanqi Wang
Article No. 15 (DOI:10.22667/ReBiCTE.2015.01.15.015)
A Design of Access Control Model for Information Leak Detection based on Inference in Smart Device
Junho, Choi, Chang Choi, Htet Myet Lynn, Byeongkyu Ko, Ilsun You, and Pankoo Kim
Article No. 16 (DOI:10.22667/ReBiCTE.2015.01.15.016)
Query Recommending Scheme : Implementations and Evaluation
Hoen-min Lee, Taerim Lee, Kyung Hyune Rhee, Sang Uk Shin
Article No. 17 (DOI:10.22667/ReBiCTE.2015.01.15.017)
User Authorization Method based on Face Recognition for Auto Network Access in Home Network System
Hae-Min Moon, Jungsu Shin, JuHyun Shin, and Sung Bum Pan
Article No. 18 (DOI:10.22667/ReBiCTE.2015.01.15.018)
Robust Method for Hiding Binary Image into JPEG HDR Base Layer Image against Common Image Processing
Myung-Ho Lee, Oh-Jin Kwon, and Yong-Hwan Lee
Article No. 19 (DOI:10.22667/ReBiCTE.2015.01.15.019)
Protecting The Networks from Objectionable Contents
Chang-Yul Kim, Oh-Jin Kwon, Seokrim Choi, and Yong-Hwan Lee
Article No. 20 (DOI:10.22667/ReBiCTE.2015.08.31.020)
Design and Implementation of Low-power Nanoscale Cryptosystem for Group-centric secure information sharing
Valliyappan Valliyappan, Eugene B John, Ram Krishnan, and Sruthi Nanduru