top of page

Volume 4 (2018)

Article No. 1 (DOI:10.22667/ReBiCTE.2018.05.15.001)
Implementation of an Open Data Visualization System Based on Disaster Information
Tomoyuki Ishida, Kentaro Koike, Noriki Uchida, Kaoru Sugita, and Yoshitaka Shibata

Article No. 2 (DOI:10.22667/ReBiCTE.2018.08.15.002)
Dynamic Analysis of Android Apps written with PhoneGap Cross-Platform Framework
Jaewoo Shim, Minjae Park, Seong-je Cho, Minkyu Park, and Sangchul Han

Article No. 3 (DOI:10.22667/ReBiCTE.2018.08.15.003)
Securely Controllable and Trustworthy Remote Erasure on Embedded Computing System
for Unmanned Aerial Vehicle

Sieun Kim, Taek-Young Youn, Daesun Choi, and Ki-Woong Park

Article No. 4 (DOI:10.22667/ReBiCTE.2018.08.15.004)
SVM based Traffic Classification for Mitigating HTTP Attack
V. Punitha and C. Mala

Article No. 5 (DOI:10.22667/ReBiCTE.2018.08.15.005)
Cryptanalysis of the Anonymous Authentication with Key Agreement Scheme
in Wireless Sensor Networks

Sooyeon Shin and Taekyoung Kwon

Article No. 6 (DOI:10.22667/ReBiCTE.2018.08.15.006)
Label-based Security Management Mechanism for Universal Identifier Network
Jianfeng Guan, Jinsuo Jia, and Mengxin Liu

Article No. 7 (DOI:10.22667/ReBiCTE.2018.08.15.007)
Internet of Drones (IoD): Threats, Vulnerability, and Security Perspectives
Gaurav Choudhary, Vishal Sharma, Takshi Gupta, Jiyoon Kim, and Ilsun You

Article No. 8 (DOI:10.22667/ReBiCTE.2018.08.15.008)
Control Channel Networks: A Fast Blockchain-Based Access Control in Peer-to-Peer Networks
Siwan Noh, Hynwoo Kim, Sang-Uk Shin, and Kyung-Hyune Rhee

Article No. 9 (DOI:10.22667/ReBiCTE.2018.09.15.009)

Authorized Wireless Charging System based on Double-Frequency-Hopping for Mobile Devices
Yangjae Lee, Dongmin Yang, Taek-Young Youn, and Ki-Woong Park

Article No. 10 (DOI:10.22667/ReBiCTE.2018.09.15.010)

Secure Communication in Cyber-Physical Systems
Igor Kotenko, Dmitry Levshun, Yannick Chevalier, and Andrey Chechulin

Article No. 11 (DOI:10.22667/ReBiCTE.2018.09.15.011)

Location privacy protection scheme based on
self-organizing cryptographic mix-zone in VANETs

Xin Xin, Tianhan Gao, and Xinyang Deng

Article No. 12 (DOI:10.22667/ReBiCTE.2018.10.15.012)

Tracing Link Flooding Attacks in MobilityFirst Networks
Zhaoxu Wang, Huachun Zhou, and Wei Quan

Article No. 13 (DOI:10.22667/ReBiCTE.2018.10.15.013)

Hierarchical Threshold Secret Image Sharing Scheme Based on
Birkhoff Interpolation and Matrix Projection

Zhenhua Tan, Danke Wu, Hong Li, Tianhan Gao, and Nan Guo

Article No. 14 (DOI:10.22667/ReBiCTE.2018.10.15.014)

Device to Device based Delay Tolerant Networks with
Group Priority for Disaster Information Systems

Noriki Uchida, Haruki Kuga, and Yoshitaka Shibata

 

Article No. 15 (DOI:10.22667/ReBiCTE.2018.11.15.015)

Weighted interest degree collaborative recommendation algorithm based on
association rules

Jiuzhi Lin, Zhaoxia Chang, and Jing Zhang

 

Article No. 16 (DOI:10.22667/ReBiCTE.2018.11.15.016)

Decentralized Event-Based Vehicular Social Networks and Case Study
Nan Guo, Cong Zhao, and Tianhan Gao

Article No. 17 (DOI:10.22667/ReBiCTE.2018.11.15.017)

An Optimization of Phi-function for Convex Polygons
Narendran Rajagopalan, Mala C., and Anit Nobert

Article No. 18 (DOI:10.22667/ReBiCTE.2018.12.15.018)

Securely outsourcing machine learning with multiple users
Ping Li, Hongyang Yan, Chong-Zhi Gao, Yu Wang, Liaoliang Jiang,
and Yuefang Huang

bottom of page