Convergence-based service environments are embedded in large-capacity servers and adopt client/server models. Applications, devices, networks, and infrastructure are converging and creating an immense amount of content, which poses complex challenges for organizations, developers and users. In the field of security, we are seeing the convergence of frameworks and paradigms like augmented reality, ubiquitous computing and pervasive computing; and we are seeing new kinds of content, much of it user-generated, that can be searched, organized and consumed on many devices and in many formats [10][11][12][13][14][15] Division of Information and Communication, Baekseok University, Cheonan, Republic of Korea tion frameworks, scalable algorithms, and new paradigms for information discovery; and ways of searching, organizing and delivering converged information for delivery at the right place, at the right time and at the right level of detail. This special focus issue on convergence security systems will address the need for novel services and reviews security vulnerabilities in recent years. Some of these research areas are listed below.• Privacy and authentication for wireless networks This special issue is devoted to one of the hottest topics in convergence security systems, and its articles are expected to be cited widely in the areas of computer virology and hacking techniques.Lee et al.[1] present reconfigurable real number-field elliptic curve cryptography to improve security. They propose a method for configuring a cryptographic system using real number-field coordinates on an elliptic curve, as well as a finite field, through expansion of existing elliptic curve cryptography. They discuss a method for application of an elliptic curve defined on a real-number field for cryptographic systems and the advantages obtained from the use of a realnumber field. Hong [2] introduces an efficient and secure 123
Welcome to this special issue of Wireless Personal Communications. This issue contains a collection of the best papers out of various authors who have been submitted to this issue. The main goal for this issue is to be a timely vehicle for publishing selected research papers from practitioners and academia in convergence industries on this emerging topic. This issue covers some of the hottest topics in Communication and Ubiquitous Computing, including: applications for interaction processing; networking and architectures; information indexing, searching, and visualization; intelligent information processing algorithms; sensors, wireless technology and embedded systems; converged and interactive applications and frameworks; future communication systems; hybrid networking system; multicasting and multimedia delivery; architectures and protocols; data and index structures; semantic routing and search.The paper by Jeong and Shin [1] proposes an efficient authentication scheme to protect user privacy in seamless big data services. The proposed method is a security management scheme that allows users to easily access big data from different network environments by assigning a key shared among users and servers, linking big data and users' attribute information. The paper by Lee et al.[2] presents a systematic classification management scheme to
Welcome to this special issue of the Journal of Computer Virology and Hacking Techniques on Knowledge-based System and Security. The main goal for this special issue is to be a timely vehicle for publishing selected research papers from academia and practitioners in different industries on this emerging topic. Knowledge-based security systems are developed to ensure computer virology-making by effectively using timely and appropriate knowledge base, security management, hacking techniques for convergence [11][12][13][14]. This special issue covers some of the hottest topics in knowledge-based system and security, including: Privacy and authentication for wireless network; Convergence security in ubiquitous computing; Algorithmic and computer virology; Innovative applications of ubiquitous computing; Intelligent applications for security processing; Hacking, Knowledge processing algorithms; User experience in knowledge security systems, embedded systems security; Personalization, privacy, computer virology, Information indexing; computer virology; Cryptology and embedded systems; Security applications in computer virology.The paper by Lee [1] presents a secure game development method for the Internet of Things (IoT). The proposed method for developing a game in the IoT service environment looks at the length-related password vulnerability and introduces a method with which a hacker lures Internet users and seizes the users' IDs and passwords, as well as their password generation patterns. An additional improved process is
Welcome to this special issue of Wireless Personal Communications. This issue contains a collection of the best papers out of various authors who have been submitted to this issue. The main goal for this issue is to be a timely vehicle for publishing selected research papers from practitioners and academia in convergence industries on this emerging topic. This issue covers some of the hottest topics in Convergence Interaction for Communication, including: convergence; interactive applications; cloud service; P2P architectures and wireless protocols; data and index structures; motion recognition; future communication system; hybrid networking system; spectrum resource allocation; personal networking and architectures; multiple access techniques; multicasting and computer communications.The paper by Mun et al. [1] proposes the injecting of a subject policy into access control to strengthen the protection of personal information. This study provides two confidential access control models that apply individually established policies to the role-based access control model (RBAC) and the mandatory access control model (MAC) technologies. In the SpRBAC model, a user's right to access would follow organizational policy, and accessing personal information would be restricted by the subject policy. In the SpMAC model, users would have to satisfy the subject policy established by the provider of the information, in addition to the requirements of the normal MAC policy. The paper by Lee et al.[2] presents variability change management using orthogonal variability model-based traceability. The proposed method is an approach to tracing variability based on explicit & Joong-Kyung Ryu
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.