All Stories

  1. Hierarchical multichannel-based integrated smart metering infrastructure
  2. The ADS-B Protection Method for Next-Generation Air Traffic Management System
  3. Forensic Artifacts in Network Surveillance Systems
  4. Secure Filesystem for Trusted Virtual Domain in Mobile Device
  5. Functional Considerations in Military-Grade Security Platform Using a Mobile Hypervisor
  6. Protection Method for Data Communication between ADS-B Sensor and Next-Generation Air Traffic Control Systems
  7. Hybrid app security protocol for high speed mobile communication
  8. Small target detection using morphology and modified Gaussian distance function
  9. Topic Map Based Ontology Model for SaaS Application in Cloud Computing
  10. Single authentication through in convergence space using collaborative smart cameras
  11. Automated and coupled services of advanced smart surveillance systems toward green IT: tracking, retrieval and digital evidence
  12. Flight Protection Data via Dynamic Sensor Networks
  13. Medical Image Segmentation for Mobile Electronic Patient Charts Using Numerical Modeling of IoT
  14. A Based on Single Image Authentication System in Aviation Security
  15. Trajectory Calculation Based on Position and Speed for Effective Air Traffic Flow Management
  16. Improvement of Lung Segmentation Using Volume Data and Linear Equation
  17. Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing
  18. A Based on Identity Surveillance System in Aviation Security
  19. A new proposal for a digital evidence container for security convergence
  20. Hybrid security protocol for wireless body area networks
  21. For Aviation Security Using Surveillance System
  22. Efficient scheme of verifying integrity of application binaries in embedded operating systems
  23. Anonymous Access Control Framework Based on Group Signature
  24. Intelligent systems for future generation communications
  25. Cryptanalysis of block-wise stream ciphers suitable for the protection of multimedia and ubiquitous systems
  26. Fuzzy-Based Filtering Solution Selection Method For Dynamic Sensor Networks1
  27. Convolutive Noise Filtering in Power Analysis on Smartcards Using the Cepstrum
  28. Editorial: Special Issue on “Security and Multimodality in Pervasive Environments”
  29. Authentication and ID-Based Key Management Protocol in Pervasive Environment
  30. Security technologies based on a home gateway for making smart homes secure
  31. Anonymous Authentication System Using Group Signature
  32. Intelligent dynamic workflow support for a ubiquitous Web service-based manufacturing environment
  33. Device Authentication/Authorization Protocol for Home Network in Next Generation Security
  34. Intelligent Pervasive Network Authentication: S/Key Based Device Authentication
  35. Security policy specification for home network
  36. The Mechanism and Requirements for Detecting the Cross-Service Attack
  37. A Proposal of Security Framework for Wireless Body Area Network
  38. The Traceback Method about DoS Attack in Open Grid Computing Environment
  39. Admissible Bilinear Map Based Key Management Technology in Heterogeneous Mobile Networks
  40. A study on secure RFID mutual authentication scheme in pervasive computing environment
  41. RHS-US: Real-Time Hash-Chain Scheme Decreasing Pre-Calculation Mechanism for Ubiquitous Services
  42. Mobile Network Service Using Ticket Issuance in the AAA System
  43. Smart Environment Authentication: Multi-domain Authentication, Authorization, Security Policy for Pervasive Network
  44. U-multimedia framework: a secure and intelligent multimedia service framework based on context information in U-home
  45. The Home Device Authentication System Construction for Pervasive Home Network
  46. Discrete radio communication model for energy efficient data dissemination in wireless sensor networks
  47. Intelligent Security for Inter-space Surveillance Applications
  48. Home Device Authentication Method Based on PKI
  49. A Hybrid Intelligent Multimedia Service Framework in Next Generation Home Network Environment
  50. PIS-CC RBAC: Patient Information Service based on CC-RBAC in Next Generation Hospital considering Ubiquitous Intelligent Environment
  51. User Authentication for Multi Domain in Home Network Environments
  52. Authentication for Ubiquitous Multi Domain in Pervasive Computing Using PMI
  53. Broadcast Encryption Using Efficient Key Distribution and Renewal for Ubiquitous Environments
  54. Authentication for Single/Multi Domain in Ubiquitous Computing Using Attribute Certification
  55. A Centralized-Abstraction and Replicated-View Architecture Running on Ubiquitous Networks for Collaborative Multimedia Distance Education Services
  56. User-Oriented Multimedia Service Using Smart Sensor Agent Module in the Intelligent Home
  57. A Study on Efficient Key Distribution and Renewal in Broadcast Encryption
  58. A study on contents distribution using electronic cash system
  59. The Illegal Copy Protection Using Hidden Agent
  60. Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile
  61. Security Technologies Based on Home Gateway for Making Smart Home Secure
  62. Time Stamp Protocol for Smart Environment Services
  63. RHDP-Scheme for RFID’s Efficiency Improvement on the Ubiquitous Computing
  64. Security Framework for Home Network: Authentication, Authorization, and Security Policy