Search Word(s) in Title, Keywords, Authors, and Abstract: Authentication

Secure Authentication Approach Based New Mobility Management Schemes for Mobile Communication
Ghazli Abdelkader, Hadj Said Naima and Ali Pacha Adda
Page: 152~173, Vol. 13, No.1, 2017
10.3745/JIPS.03.0064

Keywords: Authentication, GSM, Location Update, Mobility Management, Paging, Security
Show / Hide Abstract

Fragile Watermarking Based on LBP for Blind Tamper Detection in Images
Heng Zhang, Chengyou Wang and Xiao Zhou
Page: 385~399, Vol. 13, No.2, 2017
10.3745/JIPS.03.0070

Keywords: Fragile Watermarking, Local Binary Pattern (LBP), Least Significant Bit (LSB), Tamper Detection and Localization
Show / Hide Abstract

Copyright Protection for Digital Image by Watermarking Technique
Suhad A. Ali, Majid Jabbar Jawad and Mohammed Abdullah Naser
Page: 599~617, Vol. 13, No.3, 2017
10.3745/JIPS.03.0074

Keywords: Digital Watermarking, Discrete Cosine Transform (DCT), Normalized Correlation (NC), PSNR
Show / Hide Abstract

HB-DIPM: Human Behavior Analysis-Based Malware Detection and Intrusion Prevention Model in the Future Internet
Jeong Kyu Lee, Seo Yeon Moon and Jong Hyuk Park
Page: 489~501, Vol. 12, No.3, 2016
10.3745/JIPS.01.0009

Keywords: Future Internet, Human Behavior, Intrusion Prevention, Malware Detection
Show / Hide Abstract

Counter Chain: A New Block Cipher Mode of Operation
Aly Mohamed El-Semary and Mohamed Mostafa A. Azim
Page: 266~279, Vol. 11, No.2, 2015
10.3745/JIPS.03.0031

Keywords: Authentication, Block Cipher Mode, Confidentiality, Counter Mode, Counter Chain
Show / Hide Abstract

Biological Infectious Watermarking Model for Video Copyright Protection
Bong-Joo Jang, Suk-Hwan Lee, SangHun Lim and Ki-Ryong Kwon
Page: 280~294, Vol. 11, No.2, 2015
10.3745/JIPS.02.0013

Keywords: Biological Virus Modeling, Copyright Protection, Infectious Watermarking, Video Watermarking
Show / Hide Abstract

Robust and Reversible Image Watermarking Scheme Using Combined DCT-DWT-SVD Transforms
Souad Bekkouch and Kamel Mohamed Faraoun
Page: 406~420, Vol. 11, No.3, 2015
10.3745/JIPS.02.0021

Keywords: Image Security, Image Watermarking, Reversible DWT-DCT-SVD Transform
Show / Hide Abstract

Secured Telemedicine Using Whole Image as Watermark with Tamper Localization and Recovery Capabilities
Gran Badshah, Siau-Chuin Liew, Jasni Mohamad Zain and Mushtaq Ali
Page: 601~615, Vol. 11, No.4, 2015
10.3745/JIPS.03.0044

Keywords: Lossless Recovery, Tamper Localization, Telemedicine, Watermarking, Whole Image, WITALLOR
Show / Hide Abstract

Gesture Input as an Out-of-band Channel
Oyuntungalag Chagnaadorj and Jiro Tanaka
Page: 92~102, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.092
Keywords: Secure Device Pairing, Out-of-band Channel, Authentication, Gesture Input, Accelerometer
Show / Hide Abstract

Multifactor Authentication Using a QR Code and a One-Time Password
Jyoti Malik, Dhiraj Girdhar, Ratna Dahiya and G. Sainarayanan
Page: 483~490, Vol. 10, No.3, 2014
10.3745/JIPS.02.0005
Keywords: Authentication, One-Time Password, Personal Assurance Message, Quick Response Code
Show / Hide Abstract

Adaptive Cross-Device Gait Recognition Using a Mobile Accelerometer
Thang Hoang, Thuc Nguyen, Chuyen Luong, Son Do and Deokjai Choi
Page: 333~348, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.333
Keywords: Gait Recognition, Mobile Security, Accelerometer, Pattern Recognition, Authentication, Identification, Signal Processing
Show / Hide Abstract

Anonymous Authentication Scheme based on NTRU for the Protection of Payment Information in NFC Mobile Environment
Sung-Wook Park and Im-Yeong Lee
Page: 461~476, Vol. 9, No.3, 2013
10.3745/JIPS.2013.9.3.461
Keywords: NFC Mobile Payment, Zero Knowledge Proof, NTRU, Ring Signature
Show / Hide Abstract

Designing an Efficient and Secure Credit Cardbased Payment System with Web Services Based on the ANSI X9.59-2006
Chi Po Cheong, Simon Fong, Pouwan Lei, Chris Chatwin and Rupert Young
Page: 495~520, Vol. 8, No.3, 2012
10.3745/JIPS.2012.8.3.495
Keywords: Payment Protocols, Electronic Commerce, SET, X9.59, Web Services
Show / Hide Abstract

Security Framework for RFID-based Applications in Smart Home Environment
Divyan M. Konidala, Daeyoung Kim, Chan Yeob Yeun and Byoungcheon Lee
Page: 111~120, Vol. 7, No.1, 2011
10.3745/JIPS.2011.7.1.111
Keywords: RFID, Smart Home, Home Network System, Home Server, Secure RFIDBased Applications, RFID Reader-Enabled Devices, RFID Tagged Consumer Items, EPCglobal Architecture Framework
Show / Hide Abstract

A Method of Risk Assessment for Multi-Factor Authentication
Jae-Jung Kim and Seng-Phil Hong
Page: 187~198, Vol. 7, No.1, 2011
10.3745/JIPS.2011.7.1.187
Keywords: Multi-factor Authentication, PKI, User Authentication, Biometric Authentication
Show / Hide Abstract

Grobner Basis Attacks on Lightweight RFID Authentication Protocols
Daewan Han
Page: 691~706, Vol. 7, No.4, 2011
10.3745/JIPS.2011.7.4.691
Keywords: RFID, Authentication Protocol, Algebraic Attack, Grobner Basis
Show / Hide Abstract

Design of Cryptographic Hardware Architecture for Mobile Computing
Mooseop Kim, Youngsae Kim and Hyunsook Cho
Page: 187~196, Vol. 5, No.4, 2009
10.3745/JIPS.2009.5.4.187
Keywords: Trusted Computing, MTM, Cryptographic circuit, RSA, HASH, Mobile Computing
Show / Hide Abstract

CLB-ECC: Certificateless Blind Signature Using ECC
Sanjeet Kumar Nayak, Sujata Mohanty and Banshidhar Majhi
Page: 0~0, Vol. 0, No.0, 0
10.3745/JIPS.03.0029
Keywords: Authentication, Blind Signature, Certificateless Cryptography, Elliptic Curve Cryptography, E-cash
Show / Hide Abstract