Table of Contents - SERSC

Table of Contents - SERSC

International Journal of Security and Its Application Vol.11, No.1 (2017) Table of Contents An BAN Logic Analysis Method Based on Yahalom Protocol 1...

130KB Sizes 0 Downloads 2 Views

Recommend Documents

Table of Contents - SERSC
1. Yayan Ma, Baoyun Wang. A Study on the Big Data Log Analysis for Security. 13. Kyung-Sik Jeon, Se-Jeong Park, Sam-Hyun

Table of Contents Table of Contents - American College of Chest
Paul H Sammut, MBBCh, FCCP. Chair, Council of NetWorks. Jay I Peters, MD, FCCP. Secretary. Paul A Markowski, CAE ..... M

Table of Contents - NACCAS
Chandler Bing – Owner. NACCAS School of Beauty. Monica Geller – Director of Compliance. NACCAS School of Beauty. Rac

Table of Contents - La84
Selected Canadian Newspapers and the 1968 Mexico City Massacre .......... 10. SYMPOSIUM PAPERS ... WANDA WAKEFIELD. What

Table of Contents - MahaDBT
12. 4.2 -...............................................................................................................

Table of contents
This ring retains the three wedge segments/parts together during operation (Figure 7). Table 2: Specifications TT 18/44

Table of Contents - MILNEWS.ca
May 3, 2007 - courageous," said Houle, who won five Stanley Cups. "This is an honour to be here," said Aquilini, who own

Table of Contents - Cymatics
18 kickin' electro tips | Felix Da Housecat | MusicRadar · 18 pro remixing tips | 18 pro remixing tips | MusicRadar · 20

Table of Contents
the Middle East as Sacred Geography. 119. Daniel Martin Varisco. 6 The River's Edge: The Steppes of the Oxus and the. Bo

Table of Contents
(Nestlé Crunch®) 119. Citty Cat. (Kit Kat®) 125 ... JaPaN. Black Sesame Ice Cream. 132. Daifuku Mochi 130. Mochi Ice

International Journal of Security and Its Application Vol.11, No.1 (2017)

Table of Contents An BAN Logic Analysis Method Based on Yahalom Protocol

1

Ying Zhou, Lei Yu, Shaoming Pan, Zhibo Wang, Ying Zheng and Min Li This paper has been removed because it was withdrawn by the Authors.

Hybrid Intrusion Detection System Using K-means and J-48

11

Manvir Singh and Jatinder Singh Bal

Research on Defensive Strategy Selection in Network Security

23 Hong Li

Research on Data Security Mechanism among Cloud Services based on Software Define Network 35 Zhao Wenbin, Fan Tongrang and Wang Hongsheng

128 Bit Hash of Variable Length in Short Message Service Security

45

Robbi Rahim

User Identity Resolution Across Multi-Social Media

59

Zhibo Wang, Zhongyuan Li, Jiawen Sun, Qi Yin, Lu Gao and Xiaohui Cui

A Defensive Mechanism based on PCA to Defend Denial-of-Service Attack 71 P. Rajesh Kanna, K. Sindhanaiselvan and M. K. Vijaymeena

xi

International Journal of Security and Its Application Vol.11, No.1 (2017)

Analyzing the Resilience of the Employee Network in Joint-equity Commercial Banks 83 Shuliang Lv, Chuanchao Huang and Lanying Du

Network Security Situation Prediction System Based on Neural Network and Big Data 93 Bowen Zhu, Yonghong Chen, Yiqiao Cai, Hui Tian and Tian Wang

A Classification Scheme for Cybersecurity Models

109

Issa Atoum and Ahmed Otoom

The Homomorphic Encryption Method for Cloud Computing Storage Security 121 Jun Wu and Jing Chen

Greedy Modes of Data Integrity Attacks on Industrial Control Systems: A Case Study of Tennessee Eastman Process 135 Weize Li, Lun Xie, Yu Rong and Zhiliang Wang

Video Authentication against Set of Temporal Tampering

149

Manish K Thakur, Vikas Saxena and J P Gupta

Boomerang Analysis Method Based on Block Cipher

165

Fan Aiwan and Yang Zhaofeng

Anonymous Authentication with Centralize Access Control of Data Storage in Cloud 179 Linawati, I Gede Totok Suryawan and Made Sudarma

xii

International Journal of Security and Its Application Vol.11, No.1 (2017)

Analysis on Mechanism of Vegetation Slope Protection based on Security Perspective 193 Du Guangqian and Wang Shijie

Multi-step Attack-oriented Assessment of Network Security Situation

203

Zhang Hengwei, Yang Haopu, Wang Jindong and Li Tao

Enhancing the Security of AES Algorithm using Quantum Three-Pass Protocol 219 Rajeev Kumar Gupta, R. K. Pateriya , Ankita Patil

A Study on Global Piracy Attacks’ Trends and Characteristics Based on Data Analysis 233 Zhongming Xiao, Zhongzhou Fan and Liangkun Xu

Enhancement of Cloud Authorization System Using Predicate Logic

245

Sandeep Saxena, Goutam Sanyal and Shashank Srivastava

A Robust and Secure Block-SVD based Embedding of Encrypted Watermark in Digital Images using RDWT 257 Sachin Gaur, Vinay Kumar Srivastava

xiii

International Journal of Security and Its Application Vol.11, No.1 (2017)

xiv