1 | -- | 16 | José Luis Hernández Ramos, Antonio J. Jara, Leandro Marín, Antonio F. Skarmeta. Distributed Capability-based Access Control for the Internet of Things |
17 | -- | 27 | Hyungdong Kim, YongJe Choi, Dooho Choi, JaeCheol Ha. A New Exponentiation Algorithm Resistant to Combined Side Channel Attack |
28 | -- | 37 | Junho Choi, Chang Choi, Byeongkyu Ko, Dongjin Choi, PanKoo Kim. Detecting Web based DDoS Attack using MapReduce operations in Cloud Computing Environment |
38 | -- | 51 | Kunwar Singh, C. Pandu Rangan, A. K. Banerjee. Lattice Based Identity Based Proxy Re-Encryption Scheme |
52 | -- | 62 | Marieta Georgieva Ivanova, Christian W. Probst, René Rydhof Hansen, Florian Kammüller. Externalizing Behaviour for Analysing System Models |
63 | -- | 71 | Hwan-taek Lee, Minkyu Park, Seong Je Cho. Detection and prevention of LeNa Malware on Android |
72 | -- | 80 | Ho Seok Kang, Sung-Ryul Kim. A New Logging-based IP Traceback Approach using Data Mining Techniques |
81 | -- | 93 | Shigeyoshi Shima, Ayako Komatsu. Guidelines for the Prevention of Internal Improprieties in Japanese Organization |
94 | -- | 105 | Hyejoo Lee, Changho Seo, Sang Uk Shin. DRM Cloud Architecture and Service Scenario for Content Protection |
106 | -- | 115 | Jun Ye, Xiaofeng Chen 0001, Jianfeng Ma. Constructing Verifiable Random Number in Finite Field |
116 | -- | 123 | Yonglin Zhou, Qing-Shan Li, Qidi Miao, Kangbin Yim. DGA-Based Botnet Detection Using DNS Traffic |
124 | -- | 135 | Guowei Wu, Zuosong Liu, Lin Yao, Zhenzhen Xu, Wei Wang 0077. A Fuzzy-based Trust Management in WSNs |
136 | -- | 145 | Jaein Kim, YoungJun Lee, Kyungroul Lee, Taeyoung Jung, Dmitry Volokhov, Kangbin Yim. Vulnerability to Flash Controller for Secure USB Drives |