Volume 11, Issue 3 (August 2014)

Special Issue on Mobile Collaboration Technologies and Internet Services

 

Editorial

Papers


[ view | download | cite ]
Huang, Y., Leu, F., Chen, J., Chu, W. C.: A True Random-Number Encryption Method Employing Block Cipher and PRNG. Computer Science and Information Systems, Vol. 11, No. 3, 905–924. (2014)


[ view | download | cite ]
Chen, C., Tsaur, W., Chen, Y., Chang, Y.: A Secure Mobile DRM System Based on Cloud Architecture. Computer Science and Information Systems, Vol. 11, No. 3, 925–941. (2014)


[ view | download | cite ]
Shahamabadi, M. S., Ali, B. M., Noordin, N. K., Rasid, M. F. b. A., Varahram, P., Jara, A. J.: A NEMO-HWSN Solution to Support 6LoWPAN Network Mobility in Hospital Wireless Sensor Network. Computer Science and Information Systems, Vol. 11, No. 3, 943–960. (2014)


[ view | download | cite ]
Moon, H., Pan, S. B.: Long Distance Face Recognition for Enhanced Performance of Internet of Things Service Interface. Computer Science and Information Systems, Vol. 11, No. 3, 961–974. (2014)


[ view | download | cite ]
Gao, T., Guo, N., Yim, K., Wang, Q.: PPS: A Privacy-Preserving Security Scheme for Multi-operator Wireless Mesh Networks with Enhanced User Experience. Computer Science and Information Systems, Vol. 11, No. 3, 975–999. (2014)


[ view | download | cite ]
Jeong, H. J., Ye, S., Lim, J., You, I., Hyun, W.: A Computer Remote Control System Based on Speech Recognition Technologies of Mobile Devices and Wireless Communication Technologies. Computer Science and Information Systems, Vol. 11, No. 3, 1001–1016. (2014)


[ view | download | cite ]
Chen, Y., Chen, M., Cheung, F., Chang, Y.: A New Hybrid Architecture with an Intersection-Based Coverage Algorithm in Wireless Sensor Networks. Computer Science and Information Systems, Vol. 11, No. 3, 1017–1035. (2014)


[ view | download | cite ]
Lee, T., Lee, H., Rhee, K., Shin, S. U.: The Efficient Implementation of Distributed Indexing with Hadoop for Digital Investigations on Big Data. Computer Science and Information Systems, Vol. 11, No. 3, 1037–1054. (2014)


[ view | download | cite ]
Han, Y., Choi, J., Cho, S., Yoo, H., Woo, J., Nah, Y., Park, M.: A New Detection Scheme of Software Copyright Infringement using Software Birthmark on Windows Systems. Computer Science and Information Systems, Vol. 11, No. 3, 1055–1069. (2014)


[ view | download | cite ]
Doh, I., Lim, J., Li, S., Chae, K.: Pairwise and Group Key Setup Mechanism for Secure Machine-to-Machine Communication. Computer Science and Information Systems, Vol. 11, No. 3, 1071–1090. (2014)


[ view | download | cite ]
Chen, H., Yang, C., Su, H., Wei, C., Lee, C.: A Secure E-Mail Protocol Using ID-based FNS Multicast Mechanism. Computer Science and Information Systems, Vol. 11, No. 3, 1091–1112. (2014)


[ view | download | cite ]
Park, H. W., Yeo, I. Y., Lee, J. R., Jang, H.: Study on Network Architecture of Big Data Center for the Efficient Control of Huge Data Traffic. Computer Science and Information Systems, Vol. 11, No. 3, 1113–1126. (2014)


[ view | download | cite ]
Wu, G., Chen, X., Yao, L., Lee, Y., Yim, K.: An Efficient Wormhole Attack Detection Method in Wireless Sensor Networks. Computer Science and Information Systems, Vol. 11, No. 3, 1127–1141. (2014)


[ view | download | cite ]
Weng, C., Wen, J., Chen, H., Yang, L.: The Performance Analysis of Direct/Cooperative Transmission to Support QoS in WLANs. Computer Science and Information Systems, Vol. 11, No. 3, 1143–1156. (2014)


[ view | download | cite ]
Zhang, G., Sun, Y., Xu, M., Bie, R.: Weibo Clustering: A New Approach Utilizing Users’ Reposting Data in Social Networking Services. Computer Science and Information Systems, Vol. 11, No. 3, 1157–1172. (2014)


[ view | download | cite ]
Shih, N., Chen), H. C. (.: An Approach for Selecting Candidates in Soft-handover Procedure Using Multi-Generating Procedure and Second Grey Relational Analysis. Computer Science and Information Systems, Vol. 11, No. 3, 1173–1190. (2014)