1 | -- | 2 | Kangbin Yim, Yoshiaki Hori. Information Leakage Prevention in Emerging Technologies (MIST 2012 Volume 2) |
3 | -- | 17 | Alessandro Armando, Gabriele Costa, Alessio Merlo, Luca Verderame. Securing the "Bring Your Own Device" Policy |
18 | -- | 28 | Kazuki Chiba, Yoshiaki Hori, Kouichi Sakurai. Detecting Information Leakage via a HTTP Request Based on the Edit Distance |
29 | -- | 42 | Yeongung Park, Chanhee Lee, Jonghwa Kim, Seong Je Cho, Jongmoo Choi. An Android Security Extension to Protect Personal Information against Illegal Accesses and Privilege Escalation Attacks |
43 | -- | 53 | Ho Seok Kang, Sung-Ryul Kim. Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System |
54 | -- | 64 | Chang Choi, Junho Choi, Byeongkyu Ko, Kunseok Oh, PanKoo Kim. A Design of Onto-ACM(Ontology based Access Control Model) in Cloud Computing Environments |
65 | -- | 76 | Taerim Lee, Hun Kim, Kyung Hyune Rhee, Sang Uk Shin. A Study on Design and Implementation of E-Discovery Service based on Cloud Computing |
77 | -- | 92 | S. Sharmila Deva Selvi, S. Sree Vivek, Vivek Krishna Pradhan, C. Pandu Rangan. Efficient Certificateless Online/Offline Signature |
93 | -- | 109 | Jeong-Soo Park 0002, KiSeok Bae, YongJe Choi, Dooho Choi, JaeCheol Ha. A Fault-Resistant AES Implementation Using Differential Characteristic of Input and Output |
110 | -- | 117 | Zhiwei Wang, Guozi Sun, Danwei Chen. Short signature from factoring assumption in the standard model |
118 | -- | 128 | Kunwar Singh, C. Pandurangan, A. K. Banerjee. Lattice Forward-Secure Identity Based Encryption Scheme |
129 | -- | 133 | Marek R. Ogiela, Lidia Ogiela, Urszula Ogiela. Strategic Information Splitting Using Biometric Patterns |
134 | -- | 147 | Sungkwan Kim, Junyoung Park, Kyungroul Lee, Ilsun You, Kangbin Yim. A Brief Survey on Rootkit Techniques in Malicious Codes |
148 | -- | 153 | Marek R. Ogiela, Lidia Ogiela. Personal Identification Based on Cognitive Analysis of Selected Medical Visualization |