Research Briefs on
Information & Communication Technology Evolution
(ReBICTE)
ISSN: 2383-9201 (Online)
Volume 4 (2018)
Article No. 1 (DOI:10.22667/ReBiCTE.2018.05.15.001)
Implementation of an Open Data Visualization System Based on Disaster Information
Tomoyuki Ishida, Kentaro Koike, Noriki Uchida, Kaoru Sugita, and Yoshitaka Shibata
Article No. 2 (DOI:10.22667/ReBiCTE.2018.08.15.002)
Dynamic Analysis of Android Apps written with PhoneGap Cross-Platform Framework
Jaewoo Shim, Minjae Park, Seong-je Cho, Minkyu Park, and Sangchul Han
Article No. 3 (DOI:10.22667/ReBiCTE.2018.08.15.003)
Securely Controllable and Trustworthy Remote Erasure on Embedded Computing System
for Unmanned Aerial Vehicle
Sieun Kim, Taek-Young Youn, Daesun Choi, and Ki-Woong Park
Article No. 4 (DOI:10.22667/ReBiCTE.2018.08.15.004)
SVM based Traffic Classification for Mitigating HTTP Attack
V. Punitha and C. Mala
Article No. 5 (DOI:10.22667/ReBiCTE.2018.08.15.005)
Cryptanalysis of the Anonymous Authentication with Key Agreement Scheme
in Wireless Sensor Networks
Sooyeon Shin and Taekyoung Kwon
Article No. 6 (DOI:10.22667/ReBiCTE.2018.08.15.006)
Label-based Security Management Mechanism for Universal Identifier Network
Jianfeng Guan, Jinsuo Jia, and Mengxin Liu
Article No. 7 (DOI:10.22667/ReBiCTE.2018.08.15.007)
Internet of Drones (IoD): Threats, Vulnerability, and Security Perspectives
Gaurav Choudhary, Vishal Sharma, Takshi Gupta, Jiyoon Kim, and Ilsun You
Article No. 8 (DOI:10.22667/ReBiCTE.2018.08.15.008)
Control Channel Networks: A Fast Blockchain-Based Access Control in Peer-to-Peer Networks
Siwan Noh, Hynwoo Kim, Sang-Uk Shin, and Kyung-Hyune Rhee
Article No. 9 (DOI:10.22667/ReBiCTE.2018.09.15.009)
Authorized Wireless Charging System based on Double-Frequency-Hopping for Mobile Devices
Yangjae Lee, Dongmin Yang, Taek-Young Youn, and Ki-Woong Park
Article No. 10 (DOI:10.22667/ReBiCTE.2018.09.15.010)
Secure Communication in Cyber-Physical Systems
Igor Kotenko, Dmitry Levshun, Yannick Chevalier, and Andrey Chechulin
Article No. 11 (DOI:10.22667/ReBiCTE.2018.09.15.011)
Location privacy protection scheme based on
self-organizing cryptographic mix-zone in VANETs
Xin Xin, Tianhan Gao, and Xinyang Deng
Article No. 12 (DOI:10.22667/ReBiCTE.2018.10.15.012)
Tracing Link Flooding Attacks in MobilityFirst Networks
Zhaoxu Wang, Huachun Zhou, and Wei Quan
Article No. 13 (DOI:10.22667/ReBiCTE.2018.10.15.013)
Hierarchical Threshold Secret Image Sharing Scheme Based on
Birkhoff Interpolation and Matrix Projection
Zhenhua Tan, Danke Wu, Hong Li, Tianhan Gao, and Nan Guo
Article No. 14 (DOI:10.22667/ReBiCTE.2018.10.15.014)
Device to Device based Delay Tolerant Networks with
Group Priority for Disaster Information Systems
Noriki Uchida, Haruki Kuga, and Yoshitaka Shibata
Article No. 15 (DOI:10.22667/ReBiCTE.2018.11.15.015)
Weighted interest degree collaborative recommendation algorithm based on
association rules
Jiuzhi Lin, Zhaoxia Chang, and Jing Zhang
Article No. 16 (DOI:10.22667/ReBiCTE.2018.11.15.016)
Decentralized Event-Based Vehicular Social Networks and Case Study
Nan Guo, Cong Zhao, and Tianhan Gao
Article No. 17 (DOI:10.22667/ReBiCTE.2018.11.15.017)
An Optimization of Phi-function for Convex Polygons
Narendran Rajagopalan, Mala C., and Anit Nobert
Article No. 18 (DOI:10.22667/ReBiCTE.2018.12.15.018)
Securely outsourcing machine learning with multiple users
Ping Li, Hongyang Yan, Chong-Zhi Gao, Yu Wang, Liaoliang Jiang,
and Yuefang Huang