top of page

Volume 1 (2015)

 

Article No. 1 (DOI:10.22667/ReBiCTE.2015.01.15.001)

A Grid-based Approach to Location-Dependent Key Management in Wireless Sensor Networks

Jaewoo Choi, Jihyun Bang, Mirim Ahn, Leehyung Kim, and Taekyoung Kwon

 

Article No. 2 (DOI:10.22667/ReBiCTE.2015.01.15.002)

Secure Distribution Protocol for Restoring Information with Different Accesing Grants

Lidia Ogiela, Marek R. Ogiela, and Urszula Ogiela

 

Article No. 3 (DOI:10.22667/ReBiCTE.2015.01.15.003)

Harvesting Entropy from On-board Sensors of Constrained Devices for Hardening Security of
IoT Communication Mechanisms

Marcin P. Pawlowski, Antonio J. Jara, and Maciej J. Ogorzalek

 

Article No. 4 (DOI:10.22667/ReBiCTE.2015.01.15.004)

An Efficient Handover Authentication Scheme Based on HMAC for Proxy Mobile IPv6 Network

Tianhan Gao, Ling Tan, Peiyu Qiao, and Kangbin Yim

 

Article No. 5 (DOI:10.22667/ReBiCTE.2015.01.15.005)

Security Threats in Electronic Currency Exchange Protocols

Marek R. Ogiela and Piotr Sułkowski

 

Article No. 6 (DOI:10.22667/ReBiCTE.2015.01.15.006)

A Privacy Preserving V2I Service Access Management System for Vehicular Clouds

Youngho Park, Chul Sur,and Kyung-Hyune Rhee

 

Article No. 7 (DOI:10.22667/ReBiCTE.2015.01.15.007)

A Study of Compensation in Personal Identifiable Information Leakage

Tomohisa Ishikawa and Kouichi Sakurai

 

Article No. 8 (DOI:10.22667/ReBiCTE.2015.01.15.008)

Detection of Employees’ Carelessness Leading to Cause Insider Threats through Analyzing Email RDF Data

Sung-Min Kim, Young-Seok Son, and Young-Guk Ha

 

Article No. 9 (DOI:10.22667/ReBiCTE.2015.01.15.009)

Advanced Unknown Malicious Code Detection Model

Hyoungjun Kim, Jaehee Lee, Hyunsik Yoon, and Kyungho Lee

 

Article No. 10 (DOI:10.22667/ReBiCTE.2015.01.15.010)

Secure Virtual Keypad for Smartphones against Shoulder Surfing Attacks

Dongmin Choi, Cheolheon Baek, Jian Shen, and Ilyong Chung

 

Article No. 11 (DOI:10.22667/ReBiCTE.2015.01.15.011)

A Traffic Mitigation Method for DDoS Defense in Large Autonomous System

Ho-Seok Kang and Sung-Ryul Kim

 

Article No. 12 (DOI:10.22667/ReBiCTE.2015.01.15.012)

Study on Scenario-based Personnel Risk Analysis

Inhyun Cho, Jaehee Lee, and Kyungho Lee 

 

Article No. 13 (DOI:10.22667/ReBiCTE.2015.01.15.013)

Non-memorizing evolutionary authentication algorithm using the preference symbols for secondary authentication

KwangCheol Rim

 

Article No. 14 (DOI:10.22667/ReBiCTE.2015.01.15.014)

The Trusted Two-dimensional Code System based on Certificate-based Signature Scheme 

Tianhan Gao, Luoyin Feng, Yingnan Zhao, Shiyue Qin, and Quanqi Wang

 

Article No. 15 (DOI:10.22667/ReBiCTE.2015.01.15.015)

A Design of Access Control Model for Information Leak Detection based on Inference in Smart Device

Junho, Choi, Chang Choi, Htet Myet Lynn, Byeongkyu Ko, Ilsun You, and Pankoo Kim

 

Article No. 16 (DOI:10.22667/ReBiCTE.2015.01.15.016)

Query Recommending Scheme : Implementations and Evaluation

Hoen-min Lee, Taerim Lee, Kyung Hyune Rhee, Sang Uk Shin

 

Article No. 17 (DOI:10.22667/ReBiCTE.2015.01.15.017)

User Authorization Method based on Face Recognition for Auto Network Access in Home Network System

Hae-Min Moon, Jungsu Shin, JuHyun Shin, and Sung Bum Pan

 

Article No. 18 (DOI:10.22667/ReBiCTE.2015.01.15.018)

Robust Method for Hiding Binary Image into JPEG HDR Base Layer Image against Common Image Processing

Myung-Ho Lee, Oh-Jin Kwon, and Yong-Hwan Lee

 

Article No. 19 (DOI:10.22667/ReBiCTE.2015.01.15.019)

Protecting The Networks from Objectionable Contents

Chang-Yul Kim, Oh-Jin Kwon, Seokrim Choi, and Yong-Hwan Lee

 

Article No. 20 (DOI:10.22667/ReBiCTE.2015.08.31.020)

Design and Implementation of Low-power Nanoscale Cryptosystem for Group-centric secure information sharing

Valliyappan Valliyappan, Eugene B John, Ram Krishnan, and Sruthi Nanduru

bottom of page