Journal cover image

Browse issues

Vol. 23
Vol. 22
Vol. 21
Vol. 20
Vol. 19
Vol. 18
Vol. 17
Vol. 16
Vol. 15
Vol. 14
Vol. 13
Vol. 12
Vol. 11
Vol. 10
Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Services Technology and Management

2017 Vol. 23 No. 1/2

Special Issue on Advanced IT and Security Services in the Internet of Things Environment

Guest Editors: Professor Hangbae Chang and Professor Kyungjin Cha


PagesTitle and authors
3-14Analysis of random noise generated by graphic processing units
Yongjin Yeom; Taeill Yoo
DOI: 10.1504/IJSTM.2017.10002707

15-20A privacy-preserving URL-hiding scheme for the web of things
Jin Hyun Park; Im Young Jung; Soonja Kim
DOI: 10.1504/IJSTM.2017.10002692

21-31Empirical analysis of anti-reversing schemes for protecting mobile codes in the internet-of-things
Haehyun Cho; Hyunki Kim; Jongsu Lim; Junghwan Lee; Jeong Hyun Yi
DOI: 10.1504/IJSTM.2017.10002693

32-39Analysis on the thermo-control characteristics of moxibustion device based on temperature sensing data
Taegon Kim; Minwoo Cheon
DOI: 10.1504/IJSTM.2017.10002699

40-51Secure rank correlation computation for IoT applications
Kok-Seng Wong; Myung Ho Kim
DOI: 10.1504/IJSTM.2017.10002702

52-63Efficient resource provisioning for virtual clusters on the cloud
Shao-Jui Chen; Chia-Ching Chen; Hsiang-Lun Lu; Wei-Jen Wang
DOI: 10.1504/IJSTM.2017.10002703

64-82System security manager education framework
Geunhye Kim; Mina Shim
DOI: 10.1504/IJSTM.2017.10002704

83-100A study on decision support system based on the fuzzy logic approach for the livestock service management
Saraswathi Sivamani; Hong-Geun Kim; Jangwoo Park; Yongyun Cho
DOI: 10.1504/IJSTM.2017.10002705

101-116Design and implementation of lightweight network access control technique on wireless router
Hyeji Heo; Jaecheol Ryou
DOI: 10.1504/IJSTM.2017.10002706

117-130Keyless signature infrastructure and PKI: hash-tree signatures in pre- and post-quantum world
Ahto Buldas; Risto Laanoja; Ahto Truu
DOI: 10.1504/IJSTM.2017.10002708

131-153Design and implementation of Hadoop platform for processing big data of logistics which is based on IoT
Nam-Ho Kim
DOI: 10.1504/IJSTM.2017.10002714

154-164Comparing security vulnerability by operating system environment
Dongkyun Seo; Kyungho Lee
DOI: 10.1504/IJSTM.2017.10002715