Search Word(s) in Title, Keywords, Authors, and Abstract: NTRU

NDynamic Framework for Secure VM Migration over Cloud Computing
Suresh B. Rathod and V. Krishna Reddy
Page: 476~490, Vol. 13, No.3, 2017
10.3745/JIPS.01.0015

Keywords: Cloud Computing, Datacenter (DC), Host Controller, Physical Host, Virtual Machine (VM)
Show / Hide Abstract

Cyberbullying and a Mobile Game App? An Initial Perspective on an Alternative Solution
Manmeet Mahinderjit Singh, Ping Jie Ng, Kar Ming Yap, Mohd Heikal Husin and Nurul Hashimah Ahamed Hassain Malim
Page: 559~572, Vol. 13, No.3, 2017
10.3745/JIPS.04.0033

Keywords: Cyberbullying, Digital Etiquette, Intrusion Detection System, Mobile Application, Social Network
Show / Hide Abstract

HB-DIPM: Human Behavior Analysis-Based Malware Detection and Intrusion Prevention Model in the Future Internet
Jeong Kyu Lee, Seo Yeon Moon and Jong Hyuk Park
Page: 489~501, Vol. 12, No.3, 2016
10.3745/JIPS.01.0009

Keywords: Future Internet, Human Behavior, Intrusion Prevention, Malware Detection
Show / Hide Abstract

Multifactor Authentication Using a QR Code and a One-Time Password
Jyoti Malik, Dhiraj Girdhar, Ratna Dahiya and G. Sainarayanan
Page: 483~490, Vol. 10, No.3, 2014
10.3745/JIPS.02.0005
Keywords: Authentication, One-Time Password, Personal Assurance Message, Quick Response Code
Show / Hide Abstract

A Step towards User Privacy while Using Location-Based Services
Fizza Abbas and Heekuck Oh
Page: 618~627, Vol. 10, No.4, 2014
10.3745/JIPS.01.0003
Keywords: Location Based Services, Location Privacy, Point of Interests
Show / Hide Abstract

Anonymous Authentication Scheme based on NTRU for the Protection of Payment Information in NFC Mobile Environment
Sung-Wook Park and Im-Yeong Lee
Page: 461~476, Vol. 9, No.3, 2013
10.3745/JIPS.2013.9.3.461
Keywords: NFC Mobile Payment, Zero Knowledge Proof, NTRU, Ring Signature
Show / Hide Abstract

Efficient Proof of Vote Validity Without Honest-Verifier Assumption in Homomorphic E-Voting
Kun Peng
Page: 549~560, Vol. 7, No.3, 2011
10.3745/JIPS.2011.7.3.549
Keywords: Efficient Proof, E-Voting
Show / Hide Abstract

Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Aly M. El-Semary and Mostafa Gadal-Haqq M. Mostafa
Page: 481~500, Vol. 6, No.4, 2010
10.3745/JIPS.2010.6.4.481
Keywords: Data-Mining, Fuzzy Logic, IDS, Intelligent Techniques, Network Security, Software Agents
Show / Hide Abstract

Addressing Mobile Agent Security through Agent Collaboration
Evens Jean, Yu Jiao and Ali R Hurson
Page: 43~53, Vol. 3, No.2, 2007
None
Keywords: Disk Striping, Multimedia System, Bandwidth
Show / Hide Abstract

Robust Real-time Intrusion Detection System
Byung-Joo Kim and Il-Kon Kim
Page: 9~13, Vol. 1, No.1, 2005
None
Keywords: real-time IDS, kernel PCA. LS-SVM
Show / Hide Abstract

A Multiple Instance Learning Problem Approach Model to Anomaly Network Intrusion Detection
Ill-Young Weon, Doo-Heon Song, Sung-Bum Ko and Chang-Hoon Lee
Page: 14~21, Vol. 1, No.1, 2005
None
Keywords: Multiple Instance Learning Problem, Network Intrusion Detection, Anomaly Detection
Show / Hide Abstract