Pub Date : 2016-07-14DOI: 10.1007/978-981-10-7850-7_9
E. Doynikova, Igor Kotenko
{"title":"An Automated Graph Based Approach to Risk Assessment for Computer Networks with Mobile Components","authors":"E. Doynikova, Igor Kotenko","doi":"10.1007/978-981-10-7850-7_9","DOIUrl":"https://doi.org/10.1007/978-981-10-7850-7_9","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"35 17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123522922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-14DOI: 10.1007/978-981-10-7850-7_15
Chengcheng Xu, Bao-kang Zhao, Shuhui Chen, Jinshu Su
{"title":"A Novel Hybrid Architecture for High Speed Regular Expression Matching","authors":"Chengcheng Xu, Bao-kang Zhao, Shuhui Chen, Jinshu Su","doi":"10.1007/978-981-10-7850-7_15","DOIUrl":"https://doi.org/10.1007/978-981-10-7850-7_15","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133621122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-14DOI: 10.1007/978-981-10-7850-7_12
Bo Liu, Jianfeng Guan, Zhongbai Jiang
{"title":"A Policy Management System Based on Multi-dimensional Attribution Label","authors":"Bo Liu, Jianfeng Guan, Zhongbai Jiang","doi":"10.1007/978-981-10-7850-7_12","DOIUrl":"https://doi.org/10.1007/978-981-10-7850-7_12","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116917671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-14DOI: 10.1007/978-981-10-7850-7_10
Igor Kotenko, I. Saenko, O. Lauta, Mikhail Kocinyak
{"title":"Assessment of Computer Network Resilience Under Impact of Cyber Attacks on the Basis of Stochastic Networks Conversion","authors":"Igor Kotenko, I. Saenko, O. Lauta, Mikhail Kocinyak","doi":"10.1007/978-981-10-7850-7_10","DOIUrl":"https://doi.org/10.1007/978-981-10-7850-7_10","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134369322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-14DOI: 10.1007/978-981-10-7850-7_5
Gyu-Ho Choi, H. Moon, S. Pan
{"title":"Personal Identification Using Time and Frequency Domain Features of ECG Lead-I","authors":"Gyu-Ho Choi, H. Moon, S. Pan","doi":"10.1007/978-981-10-7850-7_5","DOIUrl":"https://doi.org/10.1007/978-981-10-7850-7_5","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"435 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122485461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-14DOI: 10.1007/978-981-10-7850-7_8
M. Sridevi, C. Mala, S. Prabha
{"title":"A Discrete Wavelet Transformation Based Fast and Secure Transmission of Images for Group Communication","authors":"M. Sridevi, C. Mala, S. Prabha","doi":"10.1007/978-981-10-7850-7_8","DOIUrl":"https://doi.org/10.1007/978-981-10-7850-7_8","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114982394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-14DOI: 10.1007/978-981-10-7850-7_11
Tien-Ho Chang, Chia-Mei Chen, H. Hsiao, Gu-Shin Lai
{"title":"The Cryptanalysis of WPA & WPA2 Using the Parallel-Computing with GPUs","authors":"Tien-Ho Chang, Chia-Mei Chen, H. Hsiao, Gu-Shin Lai","doi":"10.1007/978-981-10-7850-7_11","DOIUrl":"https://doi.org/10.1007/978-981-10-7850-7_11","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133460703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secure Color-Code Key Exchange Protocol for Mobile Chat Application","authors":"Hsing-Chung Chen, Hong Chang, Tzu-Liang Kung, Yung-Fa Huang, Ze-Min Lin, Pei-Chi Yeh, Qiu-Hua Ruan","doi":"10.1007/978-981-10-7850-7_6","DOIUrl":"https://doi.org/10.1007/978-981-10-7850-7_6","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124486048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-14DOI: 10.1007/978-981-10-7850-7_13
Seira Hidano, S. Kiyomoto, A. Biswas, Toshihiro Uchibayashi, T. Suganuma
{"title":"Access Control for Cross-Border Transfer of Sensor Data","authors":"Seira Hidano, S. Kiyomoto, A. Biswas, Toshihiro Uchibayashi, T. Suganuma","doi":"10.1007/978-981-10-7850-7_13","DOIUrl":"https://doi.org/10.1007/978-981-10-7850-7_13","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128950879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-14DOI: 10.1007/978-981-10-7850-7_7
Chia-Chi Chang, Yen-Hao Shih
{"title":"Design and Implementation of SPEEX Speech Technology on ARM Processor","authors":"Chia-Chi Chang, Yen-Hao Shih","doi":"10.1007/978-981-10-7850-7_7","DOIUrl":"https://doi.org/10.1007/978-981-10-7850-7_7","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128396191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}