Ausgabe 2/2014
Special Issue: IT Convergence Security
Inhalt (15 Artikel)
Construction of a secure two-factor user authentication system using fingerprint information and password
Woong Go, Kwangwoo Lee, Jin Kwak
Content-based control of HTTPs mail for implementation of IT-convergence security environment
Young Ran Hong, Dongsoo Kim
A secret sharing scheme for EBTC using steganography
Cheonshik Kim, Dongkyoo Shin, Dongil Shin, Raylin Tso, Chin-Nung Yang
Fast password recovery attack: application to APOP
Fanbao Liu, Yi Liu, Tao Xie, Dengguo Feng, Yumeng Feng
Analyzing and comparing the AES architectures for their power consumption
Ahmet Dogan, S. Berna Ors, Gokay Saldamli
Towards an accurate evaluation of quality of cloud service in service-oriented cloud computing
Shangguang Wang, Zhipiao Liu, Qibo Sun, Hua Zou, Fangchun Yang
A practical implementation of fuzzy fingerprint vault for smart cards
Daesung Moon, Yongwha Chung, Changho Seo, Sung-Young Kim, Jeong-Nyeo Kim
Image contrast enhancement for intelligent surveillance systems using multi-local histogram transformation
Hwan-Joo Kwak, Gwi-Tae Park
Test-driven forensic analysis of satellite automotive navigation systems
Kyung-Soo Lim, Changhoon Lee, Jong Hyuk Park, Sang-Jin Lee
Study on two privacy-oriented protocols for information communication systems
Taek-Young Youn, Jongsung Kim, Myung-Jae Lim
Information security strategies: towards an organizational multi-strategy perspective
Atif Ahmad, Sean B. Maynard, Sangseo Park