+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

Volume 3, Issue 3/4, November 2013 (BibTex)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

Distributed Capability-based Access Control for the Internet of Things                                                          
Jose L. Hernandez-Ramos, Antonio J. Jara, Leandro Marin, and Antonio F. Skarmeta

pp. 17-27 (10.22670/JOWUA.2013.11.31.017)
A New Exponentiation Algorithm Resistant to Combined Side Channel Attack
Hyungdong Kim, Yongje Choi, Dooho Choi, and Jaecheol Ha

pp. 28-37 (10.22670/JOWUA.2013.11.31.028)
Detecting Web based DDoS Attack using MapReduce operations in Cloud Computing Environment
Junho Choi, Chang Choi, Byeongkyu Ko, Dongjin Choi, and Pankoo Kim

Lattice Based Identity Based Proxy Re-Encryption Scheme
Kunwar Singh, C Pandu Rangan and A.K. Banerjee

pp. 52-62 (10.22670/JOWUA.2013.11.31.052)
Externalizing Behaviour for Analysing System Models
Marieta Georgieva Ivanova, Christian W. Probst, Rene Rydhof Hansen, and Florian Kammuller

Detection and prevention of LeNa Malware on Android
Hwan-Taek Lee, Minkyu Park, and Seong-Je Cho

A New Logging-based IP Traceback Approach using Data Mining Techniques
Ho-Seok Kang and Sung-Ryul Kim
[abstract]

Guidelines for the Prevention of Internal Improprieties in Japanese Organization
Shigeyoshi SHIMA and Ayako KOMATSU
[abstract]

DRM Cloud Architecture and Service Scenario for Content Protection
Hyejoo Lee, Changho Seo, and Sang Uk Shin
[abstract

Constructing Verifiable Random Number in Finite Field
Jun Ye, Xiaofeng Chen, and Jianfeng Ma

DGA-Based Botnet Detection Using DNS Traffic
Yong-lin Zhou, Qing-shan Li, Qidi Miao, and Kangbin Yim

A Fuzzy-based Trust Management in WSNs
Guowei Wu, Zuosong Liu, Lin Yao, Zhenzhen Xu, and Wei Wang

Vulnerability to Flash Controller for Secure USB Drives
Jaein Kim, Youngjun Lee, Kyungroul Lee, Taeyoung Jung, Dmitry Volokhov, and Kangbin Yim

[Goto Archives]