Volume 11, Issue 3 (August 2014)
Special Issue on Mobile Collaboration Technologies and Internet Services
Papers
A True Random-Number Encryption Method Employing Block Cipher and PRNG
Yi-Li Huang, Fang-Yie Leu, Jian-Hong Chen and William Cheng-Chung Chu
[ view | download | cite ]
Huang, Y., Leu, F., Chen, J., Chu, W. C.: A True Random-Number Encryption Method Employing Block Cipher and PRNG. Computer Science and Information Systems, Vol. 11, No. 3, 905–924. (2014), https://doi.org/10.2298/CSIS130921056H
A Secure Mobile DRM System Based on Cloud Architecture
Chin-Ling Chen, Woei-Jiunn Tsaur, Yu-Yi Chen and Yao-Chung Chang
[ view | download | cite ]
Chen, C., Tsaur, W., Chen, Y., Chang, Y.: A Secure Mobile DRM System Based on Cloud Architecture. Computer Science and Information Systems, Vol. 11, No. 3, 925–941. (2014), https://doi.org/10.2298/CSIS130919057C
A NEMO-HWSN Solution to Support 6LoWPAN Network Mobility in Hospital Wireless Sensor Network
Mohammadreza Sahebi Shahamabadi, Borhanuddin M Ali, Nor Kamariah Noordin, Mohd Fadlee b. A. Rasid, Pooria Varahram and Antonio J. Jara
[ view | download | cite ]
Shahamabadi, M. S., Ali, B. M., Noordin, N. K., Rasid, M. F. b. A., Varahram, P., Jara, A. J.: A NEMO-HWSN Solution to Support 6LoWPAN Network Mobility in Hospital Wireless Sensor Network. Computer Science and Information Systems, Vol. 11, No. 3, 943–960. (2014), https://doi.org/10.2298/CSIS130917058S
Long Distance Face Recognition for Enhanced Performance of Internet of Things Service Interface
Hae-Min Moon and Sung Bum Pan
[ view | download | cite ]
Moon, H., Pan, S. B.: Long Distance Face Recognition for Enhanced Performance of Internet of Things Service Interface. Computer Science and Information Systems, Vol. 11, No. 3, 961–974. (2014), https://doi.org/10.2298/CSIS130926059M
PPS: A Privacy-Preserving Security Scheme for Multi-operator Wireless Mesh Networks with Enhanced User Experience
Tianhan Gao, Nan Guo, Kangbin Yim and Qianyi Wang
[ view | download | cite ]
Gao, T., Guo, N., Yim, K., Wang, Q.: PPS: A Privacy-Preserving Security Scheme for Multi-operator Wireless Mesh Networks with Enhanced User Experience. Computer Science and Information Systems, Vol. 11, No. 3, 975–999. (2014), https://doi.org/10.2298/CSIS130917060G
A Computer Remote Control System Based on Speech Recognition Technologies of Mobile Devices and Wireless Communication Technologies
Hae-Duck J. Jeong, Sang-Kug Ye, Jiyoung Lim, Ilsun You and WooSeok Hyun
[ view | download | cite ]
Jeong, H. J., Ye, S., Lim, J., You, I., Hyun, W.: A Computer Remote Control System Based on Speech Recognition Technologies of Mobile Devices and Wireless Communication Technologies. Computer Science and Information Systems, Vol. 11, No. 3, 1001–1016. (2014), https://doi.org/10.2298/CSIS130915061J
A New Hybrid Architecture with an Intersection-Based Coverage Algorithm in Wireless Sensor Networks
Young-Long Chen, Mu-Yen Chen, Fu-Kai Cheung and Yung-Chi Chang
[ view | download | cite ]
Chen, Y., Chen, M., Cheung, F., Chang, Y.: A New Hybrid Architecture with an Intersection-Based Coverage Algorithm in Wireless Sensor Networks. Computer Science and Information Systems, Vol. 11, No. 3, 1017–1035. (2014), https://doi.org/10.2298/CSIS130926062C
The Efficient Implementation of Distributed Indexing with Hadoop for Digital Investigations on Big Data
Taerim Lee, Hyejoo Lee, Kyung-Hyune Rhee and Sang Uk Shin
[ view | download | cite ]
Lee, T., Lee, H., Rhee, K., Shin, S. U.: The Efficient Implementation of Distributed Indexing with Hadoop for Digital Investigations on Big Data. Computer Science and Information Systems, Vol. 11, No. 3, 1037–1054. (2014), https://doi.org/10.2298/CSIS130920063L
A New Detection Scheme of Software Copyright Infringement using Software Birthmark on Windows Systems
Yongman Han, Jongcheon Choi, Seong-je Cho, Haeyoung Yoo, Jinwoon Woo, Yunmook Nah and Minkyu Park
[ view | download | cite ]
Han, Y., Choi, J., Cho, S., Yoo, H., Woo, J., Nah, Y., Park, M.: A New Detection Scheme of Software Copyright Infringement using Software Birthmark on Windows Systems. Computer Science and Information Systems, Vol. 11, No. 3, 1055–1069. (2014), https://doi.org/10.2298/CSIS130918064H
Pairwise and Group Key Setup Mechanism for Secure Machine-to-Machine Communication
Inshil Doh, Jiyoung Lim, Shi Li and Kijoon Chae
[ view | download | cite ]
Doh, I., Lim, J., Li, S., Chae, K.: Pairwise and Group Key Setup Mechanism for Secure Machine-to-Machine Communication. Computer Science and Information Systems, Vol. 11, No. 3, 1071–1090. (2014), https://doi.org/10.2298/CSIS130922065D
A Secure E-Mail Protocol Using ID-based FNS Multicast Mechanism
Hsing-Chung Chen, Cheng-Ying Yang, Hui-Kai Su, Ching-Chuan Wei and Chao-Ching Lee
[ view | download | cite ]
Chen, H., Yang, C., Su, H., Wei, C., Lee, C.: A Secure E-Mail Protocol Using ID-based FNS Multicast Mechanism. Computer Science and Information Systems, Vol. 11, No. 3, 1091–1112. (2014), https://doi.org/10.2298/CSIS130924066C
Study on Network Architecture of Big Data Center for the Efficient Control of Huge Data Traffic
Hyoung Woo Park, Il Yeon Yeo, Jongsuk Ruth Lee and Haengjin Jang
[ view | download | cite ]
Park, H. W., Yeo, I. Y., Lee, J. R., Jang, H.: Study on Network Architecture of Big Data Center for the Efficient Control of Huge Data Traffic. Computer Science and Information Systems, Vol. 11, No. 3, 1113–1126. (2014), https://doi.org/10.2298/CSIS130916067P
An Efficient Wormhole Attack Detection Method in Wireless Sensor Networks
Guowei Wu, Xiaojie Chen, Lin Yao, Youngjun Lee and Kangbin Yim
[ view | download | cite ]
Wu, G., Chen, X., Yao, L., Lee, Y., Yim, K.: An Efficient Wormhole Attack Detection Method in Wireless Sensor Networks. Computer Science and Information Systems, Vol. 11, No. 3, 1127–1141. (2014), https://doi.org/10.2298/CSIS130921068W
The Performance Analysis of Direct/Cooperative Transmission to Support QoS in WLANs
Chien-Erh Weng, Jyh-Horng Wen, Hsing-Chung Chen and Lie Yang
[ view | download | cite ]
Weng, C., Wen, J., Chen, H., Yang, L.: The Performance Analysis of Direct/Cooperative Transmission to Support QoS in WLANs. Computer Science and Information Systems, Vol. 11, No. 3, 1143–1156. (2014), https://doi.org/10.2298/CSIS130925069W
Weibo Clustering: A New Approach Utilizing Users’ Reposting Data in Social Networking Services
Guangzhi Zhang, Yunchuan Sun, Mengling Xu and Rongfang Bie
[ view | download | cite ]
Zhang, G., Sun, Y., Xu, M., Bie, R.: Weibo Clustering: A New Approach Utilizing Users’ Reposting Data in Social Networking Services. Computer Science and Information Systems, Vol. 11, No. 3, 1157–1172. (2014), https://doi.org/10.2298/CSIS130927070Z
An Approach for Selecting Candidates in Soft-handover Procedure Using Multi-Generating Procedure and Second Grey Relational Analysis
Neng-Yih Shih and Hsing-Chung Chen (Jack Chen)
[ view | download | cite ]
Shih, N., Chen), H. C. (.: An Approach for Selecting Candidates in Soft-handover Procedure Using Multi-Generating Procedure and Second Grey Relational Analysis. Computer Science and Information Systems, Vol. 11, No. 3, 1173–1190. (2014), https://doi.org/10.2298/CSIS130930071S