+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

Volume 2, Issue 3/4, November 2012 (BibTex)
Information Leakage Prevention
in Emerging Technologies

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

pp. 1-2  
Guest Editorial: Information Leakage Prevention in Emerging Technologies (MIST 2012 Volume 2)
Kangbin Yim and Yoshiaki Hori
[pdf]

pp. 3-17
Securing the "Bring Your Own Device" Policy                                                          
Alessandro Armando, Gabriele Costa, Alessio Merlo, and Luca Verderame

pp. 18-28
Detecting Information Leakage via a HTTP Request Based on the Edit Distance
Kazuki Chiba, Yoshiaki Hori, and Kouichi Sakurai

pp. 29-42
An Android Security Extension to Protect Personal Information against Illegal Accesses and Privilege Escalation Attacks
Yeongung Park, Chanhee Lee, Jonghwa Kim, Seong-Je Cho, and Jongmoo Choi

pp. 43-53
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System
Ho-Seok Kang and Sung-Ryul Kim

pp. 54-64
A Design of Onto-ACM(Ontology based Access Control Model) in Cloud Computing Environments
Chang Choi, Junho Choi, Byeongkyu Ko, Kunseok Oh, and Pankoo Kim

pp. 65-76
A Study on Design and Implementation of E-Discovery Service based on Cloud Computing
Taerim Lee, Hun Kim, Kyung Hyune Rhee, and Sang Uk Shin

pp. 77-92
Efficient Certificateless Online/Offline Signature
S. Sharmila Deva Selvi, S. Sree Vivek, Vivek Krishna Pradhan, and C. Pandu Rangan
[abstract][pdf]

pp. 93-109
A Fault-Resistant AES Implementation Using Differential Characteristic of Input and Output
JeongSoo Park, KiSeok Bae, YongJe Choi, DooHo Choi, and JaeCheol Ha

pp. 110-117
Short signature from factoring assumption in the standard model
Zhiwei Wang, Guozi Sun, and Danwei Chen

pp. 118-128
Lattice Forward-Secure Identity Based Encryption Scheme
Kunwar Singh, C. Pandurangan, and A.K.Banerjee

pp. 129-133
Strategic Information Splitting Using Biometric Patterns
Marek R. Ogiela, Lidia Ogiela, and Urszula Ogiela

pp. 134-147
A Brief Survey on Rootkit Techniques in Malicious Codes
Sungkwan Kim, Junyoung Park, Kyungroul Lee, Ilsun You, and Kangbin Yim
[abstract][pdf]

pp. 148-153
Personal Identification Based on Cognitive Analysis of Selected Medical Visualization
Marek R. Ogiela and Lidia Ogiela

[Goto Archives] 
free templates