Published: 2018-01-15

Articles

Implementation of an Open Data Visualization System Based on Disaster Information

Tomoyuki Ishida (, Japan)
Kentaro Koike (, Japan)
Noriki Uchida (, Japan)
Kaoru Sugita (, Japan)
Yoshitaka Shibata (, Japan)
DOI https://doi.org/10.56801/rebicte.v4i.61
PDF

Page 1-17

Dynamic Analysis of Android Apps written with PhoneGap Cross-Platform Framework

Jaewoo Shim (, Korea, Republic of)
Minjae Park (, Korea, Republic of)
Seong-je Cho (, Korea, Republic of)
Minkyu Park (, Korea, Republic of)
Sangchul Han (, Korea, Republic of)
DOI https://doi.org/10.56801/rebicte.v4i.62
PDF

Page 18-27

Securely Controllable and Trustworthy Remote Erasure on Embedded Computing System for Unmanned Aerial Vehicle

Sieun Kim (, Korea, Republic of)
Taek-Young Youn (, Korea, Republic of)
Daesun Choi (, Korea, Republic of)
Ki-Woong Park (, Korea, Republic of)
DOI https://doi.org/10.56801/rebicte.v4i.63
PDF

Page 28-36

PDF

Page 53-63

Internet of Drones (IoD): Threats, Vulnerability, and Security Perspectives

Gaurav Choudhary (, Korea, Republic of)
Vishal Sharma (, Korea, Republic of)
Takshi Gupta (, Korea, Republic of)
Jiyoon Kim (, Korea, Republic of)
Ilsun You (, Korea, Republic of)
DOI https://doi.org/10.56801/rebicte.v4i.67
PDF

Page 64-77

Control Channel Networks: A Fast Blockchain-Based Access Control in Peer-to-Peer Networks

Siwan Noh (, Korea, Republic of)
Hynwoo Kim (, Korea, Republic of)
Sang-Uk Shin (, Korea, Republic of)
Kyung-Hyune Rhee (, Korea, Republic of)
DOI https://doi.org/10.56801/rebicte.v4i.68
PDF

Page 78-85

Authorized Wireless Charging System based on Double-Frequency-Hopping for Mobile Devices

Yangjae Lee (, Korea, Republic of)
Dongmin Yang (, Korea, Republic of)
Taek-Young Youn (, Korea, Republic of)
Ki-Woong Park (, Korea, Republic of)
DOI https://doi.org/10.56801/rebicte.v4i.69
PDF

Page 86-97

Secure Communication in Cyber-Physical Systems

Igor Kotenko (, Russian Federation)
Dmitry Levshun (, Russian Federation)
Yannick Chevalier (, Russian Federation)
Andrey Chechulin (, Russian Federation)
DOI https://doi.org/10.56801/rebicte.v4i.70
PDF

Page 98-106

Tracing Link Flooding Attacks in MobilityFirst Networks

Zhaoxu Wang (, China)
Huachun Zhou (, China)
Wei Quan (, China)
DOI https://doi.org/10.56801/rebicte.v4i.72
PDF

Page 114-124

Hierarchical Threshold Secret Image Sharing Scheme Based on Birkhoff Interpolation and Matrix Projection

Zhenhua Tan (, China)
Danke Wu (, China)
Hong Li (, China)
Tianhan Gao (, China)
Nan Guo (, China)
DOI https://doi.org/10.56801/rebicte.v4i.73
PDF

Page 125-133

PDF

Page 150-157

An Optimization of Phi-function for Convex Polygons

Narendran Rajagopalan (, India)
Mala C. (, India)
Anit Nobert (, India)
DOI https://doi.org/10.56801/rebicte.v4i.77
PDF

Page 158-165

Securely outsourcing machine learning with multiple users

Ping Li (, China)
Hongyang Yan (, China)
Chong-Zhi Gao (, China)
Yu Wang (, China)
Liaoliang Jiang (, China)
Yuefang Huang (, China)
DOI https://doi.org/10.56801/rebicte.v4i.78
PDF

Page 166-172