Digital Library
Search: "[ keyword: Security ]" (53)
-
Ghassan Sabeeh Mahmood, Dong Jun Huang, Baidaa Abdulrahman Jaleel
Vol. 15, No. 3, pp. 538-549, Jun. 2019
10.3745/JIPS.03.0117
Keywords: access control, Cloud Storage, Encryption, Security -
Vera Suryani, Selo Sulistyo, Widyawan Widyawan
Vol. 14, No. 6, pp. 1431-1437, Dec. 2018
10.3745/JIPS.03.0106
Keywords: Attacks, Authentication, Internet of Things, Security, Statistic -
Nam Yong Kim, Shailendra Rathore, Jung Hyun Ryu, Jin Ho Park, Jong Hyuk Park
Vol. 14, No. 6, pp. 1361-1384, Dec. 2018
10.3745/JIPS.03.0105
Keywords: Cyber Physical System, Internet of Things, Security Analysis, Security Threats -
Sarang Na, Taeeun Kim, Hwankuk Kim
Vol. 14, No. 3, pp. 740-750, Jun. 2018
10.3745/JIPS.03.0098
Keywords: Common Platform Enumeration (CPE), Common Vulnerabilities and Exposures (CVE), OS Fingerprinting, Security Vulnerability Analysis, Service Identification -
Alfredo J. Perez, Sherali Zeadally, Nafaa Jabeur
Vol. 14, No. 2, pp. 286-308, Apr. 2018
10.3745/JIPS.03.0094
Keywords: Human-Centric Sensing, Internet of Things, Opportunistic Sensing, Participatory Sensing, Privacy, Security, Ubiquitous Sensing -
Vera Suryani, Selo Sulistyo, Widyawan Widyawan
Vol. 13, No. 6, pp. 1613-1627, Dec. 2017
10.3745/JIPS.03.0088
Keywords: Framework, Internet of Things, Privacy, Security, Trust -
Pradip Kumar Sharma, Seo Yeon Moon, Jong Hyuk Park
Vol. 13, No. 1, pp. 184-195, Feb. 2017
10.3745/JIPS.03.0065
Keywords: Blockchain, Internet of Things, Security, Vehicular Network -
Ghazli Abdelkader, Hadj Said Naima, Ali Pacha Adda
Vol. 13, No. 1, pp. 152-173, Feb. 2017
10.3745/JIPS.03.0064
Keywords: authentication, GSM, Location Update, Mobility Management, Paging, Security -
Bang Nguyen Van, Suk-Hwan Lee, Ki-Ryong Kwon
Vol. 13, No. 1, pp. 68-82, Feb. 2017
10.3745/JIPS.03.0059
Keywords: chaotic map, GIS Vector Map, Selective Encryption, Vector Map Security -
Nawal Sad Houari, Noria Taghezout
Vol. 12, No. 4, pp. 688-710, Dec. 2016
10.3745/JIPS.03.0056
Keywords: Business Rules (BR), Business Rules Management System (BRMS), Encryption Algorithms, Security Agent