+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
Volume 2, Issue 3/4, November 2012 (BibTex)
Information Leakage Prevention
in Emerging Technologies
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
Information Leakage Prevention
in Emerging Technologies
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
Guest Editorial: Information Leakage Prevention in Emerging Technologies (MIST 2012 Volume 2)
Kangbin Yim and Yoshiaki Hori
pp. 3-17 (DOI:10.22667/JISIS.2012.11.31.003)
Securing the "Bring Your Own Device" Policy
Alessandro Armando, Gabriele Costa, Alessio Merlo, and Luca Verderame
[abstract]
pp. 18-28 (DOI:10.22667/JISIS.2012.11.31.018)
Detecting Information Leakage via a HTTP Request Based on the Edit DistanceKazuki Chiba, Yoshiaki Hori, and Kouichi Sakurai
[abstract]
[abstract]
[abstract]
pp. 29-42 (DOI:10.22667/JISIS.2012.11.31.029)
An Android Security Extension to Protect Personal Information against Illegal Accesses and Privilege Escalation Attacks
Yeongung Park, Chanhee Lee, Jonghwa Kim, Seong-Je Cho, and Jongmoo Choi
[abstract]
pp. 43-53 (DOI:10.22667/JISIS.2012.11.31.043)
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System
Ho-Seok Kang and Sung-Ryul Kim
[abstract]
pp. 54-64 (DOI:10.22667/JISIS.2012.11.31.054)
A Design of Onto-ACM(Ontology based Access Control Model) in Cloud Computing Environments
Chang Choi, Junho Choi, Byeongkyu Ko, Kunseok Oh, and Pankoo Kim
[abstract]
pp. 65-76 (DOI:10.22667/JISIS.2012.11.31.065)
A Study on Design and Implementation of E-Discovery Service based on Cloud Computing
Taerim Lee, Hun Kim, Kyung Hyune Rhee, and Sang Uk Shin
[abstract]
pp. 77-92 (DOI:10.22667/JISIS.2012.11.31.077)
Efficient Certificateless Online/Offline Signature
S. Sharmila Deva Selvi, S. Sree Vivek, Vivek Krishna Pradhan, and C. Pandu Rangan
pp. 93-109 (DOI:10.22667/JOWUA.2012.11.31.093)
A Fault-Resistant AES Implementation Using Differential Characteristic of Input and Output
JeongSoo Park, KiSeok Bae, YongJe Choi, DooHo Choi, and JaeCheol Ha
[abstract]
pp. 110-117 (DOI:10.22667/JISIS.2012.11.31.110)
Short signature from factoring assumption in the standard model
Zhiwei Wang, Guozi Sun, and Danwei Chen
[abstract]
pp. 118-128 (DOI:10.22667/JISIS.2012.11.31.118)
Lattice Forward-Secure Identity Based Encryption Scheme
Kunwar Singh, C. Pandurangan, and A.K.Banerjee
[abstract]
pp. 129-133 (DOI:10.22667/JISIS.2012.11.31.129)
Strategic Information Splitting Using Biometric Patterns
Marek R. Ogiela, Lidia Ogiela, and Urszula Ogiela
[abstract]
pp. 134-147 (DOI:10.22667/JISIS.2012.11.31.134)
A Brief Survey on Rootkit Techniques in Malicious Codes
Sungkwan Kim, Junyoung Park, Kyungroul Lee, Ilsun You, and Kangbin Yim
pp. 148-153 (DOI:10.22667/JISIS.2012.11.31.148)
Personal Identification Based on Cognitive Analysis of Selected Medical Visualization
Marek R. Ogiela and Lidia Ogiela
[abstract]
[Goto Archives]