Digital Library
Search: "[ keyword: Security ]" (56)
-
Cyrus Shahabi, Seon Ho Kim, Luciano Nocera, Giorgos Constantinou, Ying Lu, Yinghao Cai, Gérard Medioni, Ramakant Nevatia, Farnoush Banaei-Kashani
Vol. 10, No. 1, pp. 1-22, Mar. 2014
10.3745/JIPS.2014.10.1.001
Keywords: Multi-source, Multi-modal Event Detection, Law Enforcement, Criminal Activity, Surveillance, Security, Safety -
Rasheed Hussain, Heekuck Oh
Vol. 10, No. 1, pp. 103-118, Mar. 2014
10.3745/JIPS.2014.10.1.103
Keywords: VANET Clouds, Security, Privacy, Traffic Information, Data Dissemination, Cloud Computing -
Thang Hoang, Thuc Nguyen, Chuyen Luong, Son Do, Deokjai Choi
Vol. 9, No. 2, pp. 333-348, Jun. 2013
10.3745/JIPS.2013.9.2.333
Keywords: gait recognition, Mobile Security, Accelerometer, Pattern Recognition, Authentication, identification, Signal Processing -
Kun Peng
Vol. 9, No. 2, pp. 247-258, Jun. 2013
10.3745/JIPS.2013.9.2.247
Keywords: Mobile Wireless Network, Security -
Woon-hae Jeong, Se-jun Kim, Doo-soon Park, Jin Kwak
Vol. 9, No. 1, pp. 157-172, Mar. 2013
10.3745/JIPS.2013.9.1.157
Keywords: Collaborative Filtering, Movie Recommendation System, Personal Propensity, Security, Push Stack -
Amit Grover, Hal Berghel
Vol. 7, No. 4, pp. 561-580, Dec. 2011
10.3745/JIPS.2011.7.4.561
Keywords: RFID, RFID Standards, RFID Protocols, RFID Security, EPC structure, RFID Applications, RFID Classification -
Deng-Guo Feng, Jing Xu, Wei-Dong Chen
Vol. 7, No. 1, pp. 159-172, Mar. 2011
10.3745/JIPS.2011.7.1.159
Keywords: Strong Designated Verifier Signature, Ring signature, Deniable Authenticated Key Exchange, Provable security -
Aly M. El-Semary, Mostafa Gadal-Haqq M. Mostafa
Vol. 6, No. 4, pp. 481-500, Dec. 2010
10.3745/JIPS.2010.6.4.481
Keywords: data-mining, Fuzzy Logic, IDS, Intelligent Techniques, network security, Software Agents -
Elena Andreeva, Bart Mennink, Bart Preneel
Vol. 6, No. 4, pp. 453-480, Dec. 2010
10.3745/JIPS.2010.6.4.453
Keywords: Hash Functions, Domain Extenders, Security Properties -
Eric Renault, Ahmad Ahmad, Mohamed Abid
Vol. 6, No. 3, pp. 359-374, Sep. 2010
10.3745/JIPS.2010.6.3.359
Keywords: Future Internet, Network of Information, Security, Storage Space, Access Rights