top of page

Volume 2 (2016)

Article No. 1 (DOI:10.22667/ReBiCTE.2016.03.31.001)
T4AI: A system for monitoring people based on improved wearable devices
Marina Pérez-Jiménez, Borja Bordel Sánchez, and Ramón Alcarria

Article No. 2 (DOI:10.22667/ReBiCTE.2016.07.15.002)
Hierarchical Privacy CAs for Cross-Border Transfer of Personal Data
Seira Hidano, Abdur Rahim Biswas, and Shinsaku Kiyomoto

Article No. 3 (DOI:10.22667/ReBiCTE.2016.07.15.003)
Secure Emergency Services Protocol over Vehicular Cloud Computing
Lewis Nkenyereye and Kyung Hyune Rhee
 
Article No. 4 (DOI:10.22667/ReBiCTE.2016.07.31.004)
Environmental Key based Smartphone Data Encryption
Kun-Lin Tsai, Fang-Yie Leu, Jung-Chun Liu, and Chia-Yin Ko

Article No. 5 (DOI:10.22667/ReBiCTE.2016.08.31.005)
Security Assessment Based on Attack Graphs and Open Standards for Computer Networks with
Mobile Components
Elena Doynikova and Igor Kotenko
 
Article No. 6 (DOI:10.22667/ReBiCTE.2016.08.31.006)
Privacy Preserving Task Force Communication in Hastily Formed Networks through ACT
Biji Nair, M. Sridevi, C. Mala, and Lakshmi Prabha S

Article No. 7 (DOI:10.22667/ReBiCTE.2016.08.31.007)

Clustering Microsoft Windows Executables based on TF-IDF and API Information
​Jonghwa Park, Gyoosik Kim, Youngsup Hwang, and Seong-je Cho

 

Article No. 8 (DOI:10.22667/ReBiCTE.2016.08.31.008)

Complex Event Processing for Object Tracking and Intrusion Detection in Internet of Things Environments
​Shang-Nan Yin, Ho-Seok Kang, and Sung-Ryul Kim

Article No. 9 (DOI:10.22667/ReBiCTE.2016.09.15.009)

Multidimensional and Hierarchical Anomaly Detection System of Web Attacks
Jiawei Li, Jianfeng Guan, and Zhongbai Jiang

Article No. 10 (DOI:10.22667/ReBiCTE.2016.09.15.010)

A Stateful Security Service Chaining for Mobile-Edge Computing
Guanwen Li, Huachun Zhou, Guanglei Li, Bohao Feng, and Taixin Li

Article No. 11 (DOI:10.22667/ReBiCTE.2016.09.15.011)

Efficient Attributes Proof on CNF Relation for eID System
Nan Guo, Wenwei Jiang, Jiayi Ouyang, Tianhan Gao, and Bin Zhang

 

Article No. 12 (DOI:10.22667/ReBiCTE.2016.09.15.012)

Mobile Code Packing Scheme Based on Multi-partitioned Bytecode Wrapping
Yongjin Park, Taeyong Park, Sung Tae Kim, and Jeong Hyun Yi
 

bottom of page