Volume 1 (2015)


Article No. 1 (DOI:10.22667/ReBiCTE.2015.01.15.001)

A Grid-based Approach to Location-Dependent Key Management in Wireless Sensor Networks

Jaewoo Choi, Jihyun Bang, Mirim Ahn, Leehyung Kim, and Taekyoung Kwon


Article No. 2 (DOI:10.22667/ReBiCTE.2015.01.15.002)

Secure Distribution Protocol for Restoring Information with Different Accesing Grants

Lidia Ogiela, Marek R. Ogiela, and Urszula Ogiela


Article No. 3 (DOI:10.22667/ReBiCTE.2015.01.15.003)

Harvesting Entropy from On-board Sensors of Constrained Devices for Hardening Security of
IoT Communication Mechanisms

Marcin P. Pawlowski, Antonio J. Jara, and Maciej J. Ogorzalek


Article No. 4 (DOI:10.22667/ReBiCTE.2015.01.15.004)

An Efficient Handover Authentication Scheme Based on HMAC for Proxy Mobile IPv6 Network

Tianhan Gao, Ling Tan, Peiyu Qiao, and Kangbin Yim


Article No. 5 (DOI:10.22667/ReBiCTE.2015.01.15.005)

Security Threats in Electronic Currency Exchange Protocols

Marek R. Ogiela and Piotr Sułkowski


Article No. 6 (DOI:10.22667/ReBiCTE.2015.01.15.006)

A Privacy Preserving V2I Service Access Management System for Vehicular Clouds

Youngho Park, Chul Sur,and Kyung-Hyune Rhee


Article No. 7 (DOI:10.22667/ReBiCTE.2015.01.15.007)

A Study of Compensation in Personal Identifiable Information Leakage

Tomohisa Ishikawa and Kouichi Sakurai


Article No. 8 (DOI:10.22667/ReBiCTE.2015.01.15.008)

Detection of Employees’ Carelessness Leading to Cause Insider Threats through Analyzing Email RDF Data

Sung-Min Kim, Young-Seok Son, and Young-Guk Ha


Article No. 9 (DOI:10.22667/ReBiCTE.2015.01.15.009)

Advanced Unknown Malicious Code Detection Model

Hyoungjun Kim, Jaehee Lee, Hyunsik Yoon, and Kyungho Lee


Article No. 10 (DOI:10.22667/ReBiCTE.2015.01.15.010)

Secure Virtual Keypad for Smartphones against Shoulder Surfing Attacks

Dongmin Choi, Cheolheon Baek, Jian Shen, and Ilyong Chung


Article No. 11 (DOI:10.22667/ReBiCTE.2015.01.15.011)

A Traffic Mitigation Method for DDoS Defense in Large Autonomous System

Ho-Seok Kang and Sung-Ryul Kim


Article No. 12 (DOI:10.22667/ReBiCTE.2015.01.15.012)

Study on Scenario-based Personnel Risk Analysis

Inhyun Cho, Jaehee Lee, and Kyungho Lee 


Article No. 13 (DOI:10.22667/ReBiCTE.2015.01.15.013)

Non-memorizing evolutionary authentication algorithm using the preference symbols for secondary authentication

KwangCheol Rim


Article No. 14 (DOI:10.22667/ReBiCTE.2015.01.15.014)

The Trusted Two-dimensional Code System based on Certificate-based Signature Scheme 

Tianhan Gao, Luoyin Feng, Yingnan Zhao, Shiyue Qin, and Quanqi Wang


Article No. 15 (DOI:10.22667/ReBiCTE.2015.01.15.015)

A Design of Access Control Model for Information Leak Detection based on Inference in Smart Device

Junho, Choi, Chang Choi, Htet Myet Lynn, Byeongkyu Ko, Ilsun You, and Pankoo Kim


Article No. 16 (DOI:10.22667/ReBiCTE.2015.01.15.016)

Query Recommending Scheme : Implementations and Evaluation

Hoen-min Lee, Taerim Lee, Kyung Hyune Rhee, Sang Uk Shin


Article No. 17 (DOI:10.22667/ReBiCTE.2015.01.15.017)

User Authorization Method based on Face Recognition for Auto Network Access in Home Network System

Hae-Min Moon, Jungsu Shin, JuHyun Shin, and Sung Bum Pan


Article No. 18 (DOI:10.22667/ReBiCTE.2015.01.15.018)

Robust Method for Hiding Binary Image into JPEG HDR Base Layer Image against Common Image Processing

Myung-Ho Lee, Oh-Jin Kwon, and Yong-Hwan Lee


Article No. 19 (DOI:10.22667/ReBiCTE.2015.01.15.019)

Protecting The Networks from Objectionable Contents

Chang-Yul Kim, Oh-Jin Kwon, Seokrim Choi, and Yong-Hwan Lee


Article No. 20 (DOI:10.22667/ReBiCTE.2015.08.31.020)

Design and Implementation of Low-power Nanoscale Cryptosystem for Group-centric secure information sharing

Valliyappan Valliyappan, Eugene B John, Ram Krishnan, and Sruthi Nanduru