Published: 2015-01-15

Articles

A Grid-based Approach to Location-Dependent Key Management in Wireless Sensor Networks

Jaewoo Choi (, Korea, Republic of)
Jihyun Bang (, Korea, Republic of)
Mirim Ahn (, Korea, Republic of)
Leehyung Kim (, Korea, Republic of)
Taekyoung Kwon (, Korea, Republic of)
DOI https://doi.org/10.56801/rebicte.v1i.2
PDF

Page 1-12

PDF

Page 13-20

PDF

Page 21-34

An Efficient Handover Authentication Scheme Based on HMAC for Proxy Mobile IPv6 Network

Tianhan Gao (, China)
Ling Tan (, China)
Peiyu Qiao (, China)
Kangbin Yim (, Korea, Republic of)
DOI https://doi.org/10.56801/rebicte.v1i.5
PDF

Page 35-42

PDF

Page 43-50

A Privacy Preserving V2I Service Access Management System for Vehicular Clouds

Youngho Park (, Korea, Republic of)
Chul Sur (, Korea, Republic of)
Kyung-Hyune Rhee (, Korea, Republic of)
DOI https://doi.org/10.56801/rebicte.v1i.7
PDF

Page 51-61

Detection of Employees’ Carelessness Leading to Cause Insider Threats through Analyzing Email RDF Data

Sung-Min Kim (, Korea, Republic of)
Young-Seok Son (, Korea, Republic of)
Young-Guk Ha (, Korea, Republic of)
DOI https://doi.org/10.56801/rebicte.v1i.9
PDF

Page 72-81

Advanced Unknown Malicious Code Detection Model

Hyoungjun Kim (, Korea, Republic of)
Jaehee Lee (, Korea, Republic of)
Hyunsik Yoon (, Korea, Republic of)
Kyungho Lee (, Korea, Republic of)
DOI https://doi.org/10.56801/rebicte.v1i.10
PDF

Page 82-92

Secure Virtual Keypad for Smartphones against Shoulder Surfing Attacks

Dongmin Choi (, Korea, Republic of)
Cheolheon Baek (, Korea, Republic of)
Jian Shen (, China)
Ilyong Chung (, Korea, Republic of)
DOI https://doi.org/10.56801/rebicte.v1i.11
PDF

Page 93-101

A Traffic Mitigation Method for DDoS Defense in Large Autonomous System

Ho-Seok Kang (, Korea, Republic of)
Sung-Ryul Kim (, Korea, Republic of)
DOI https://doi.org/10.56801/rebicte.v1i.13
PDF

Page 102-109

Study on Scenario-based Personnel Risk Analysis

Inhyun Cho (, Korea, Republic of)
Jaehee Lee (, Korea, Republic of)
Kyungho Lee (, Korea, Republic of)
DOI https://doi.org/10.56801/rebicte.v1i.16
PDF

Page 110-123

The Trusted Two-dimensional Code System based on Certificate-based Signature Scheme

Tianhan Gao (, China)
Luoyin Feng (, China)
Yingnan Zhao (, China)
Shiyue Qin (, China)
Quanqi Wang (, China)
DOI https://doi.org/10.56801/rebicte.v1i.18
PDF

Page 135-144

A Design of Access Control Model for Information Leak Detection based on Inference in Smart Device

Junho, Choi (, Korea, Republic of)
Chang Choi (, Korea, Republic of)
Htet Myet Lynn (, Korea, Republic of)
Byeongkyu Ko (, Korea, Republic of)
Ilsun You (, Korea, Republic of)
Pankoo Kim (, Korea, Republic of)
DOI https://doi.org/10.56801/rebicte.v1i.19
PDF

Page 145-154

Query Recommending Scheme : Implementations and Evaluation

Hoen-min Lee (, Korea, Republic of)
Taerim Lee (, Korea, Republic of)
Kyung Hyune Rhee (, Korea, Republic of)
Sang Uk Shin (, Korea, Republic of)
DOI https://doi.org/10.56801/rebicte.v1i.20
PDF

Page 155-169

User Authorization Method based on Face Recognition for Auto Network Access in Home Network System

Hae-Min Moon (, Korea, Republic of)
Jungsu Shin (, Korea, Republic of)
JuHyun Shin (, Korea, Republic of)
Sung Bum Pan (, Korea, Republic of)
DOI https://doi.org/10.56801/rebicte.v1i.21
PDF

Page 170-182

Robust Method for Hiding Binary Image into JPEG HDR Base Layer Image against Common Image Processing

Myung-Ho Lee (, Korea, Republic of)
Oh-Jin Kwon (, Korea, Republic of)
Yong-Hwan Lee (, Korea, Republic of)
DOI https://doi.org/10.56801/rebicte.v1i.22
PDF

Page 183-197

Protecting The Networks from Objectionable Contents

Chang-Yul Kim (, Korea, Republic of)
Oh-Jin Kwon (, Korea, Republic of)
Seokrim Choi (, Korea, Republic of)
Yong-Hwan Lee (, Korea, Republic of)
DOI https://doi.org/10.56801/rebicte.v1i.23
PDF

Page 198-207

Design and Implementation of Low-power Nanoscale Cryptosystem for Group-centric secure information sharing

Valliyappan Valliyappan (, United States)
Eugene B John (, United States)
Ram Krishnan (, United States)
Sruthi Nanduru (, United States)
DOI https://doi.org/10.56801/rebicte.v1i.24
PDF

Page 208-218