International Journal of Services Technology and Management (IJSTM)

International Journal of Services Technology and Management

2017 Vol.23 No.1/2

Special Issue on Advanced IT and Security Services in the Internet of Things Environment

Guest Editors: Professor Hangbae Chang and Professor Kyungjin Cha

Editorial

Pages Title and author(s)
3-14Analysis of random noise generated by graphic processing units
Yongjin Yeom; Taeill Yoo
DOI: 10.1504/IJSTM.2017.081880
15-20A privacy-preserving URL-hiding scheme for the web of things
Jin Hyun Park; Im Young Jung; Soonja Kim
DOI: 10.1504/IJSTM.2017.081871
21-31Empirical analysis of anti-reversing schemes for protecting mobile codes in the internet-of-things
Haehyun Cho; Hyunki Kim; Jongsu Lim; Junghwan Lee; Jeong Hyun Yi
DOI: 10.1504/IJSTM.2017.081872
32-39Analysis on the thermo-control characteristics of moxibustion device based on temperature sensing data
Taegon Kim; Minwoo Cheon
DOI: 10.1504/IJSTM.2017.081874
40-51Secure rank correlation computation for IoT applications
Kok-Seng Wong; Myung Ho Kim
DOI: 10.1504/IJSTM.2017.081875
52-63Efficient resource provisioning for virtual clusters on the cloud
Shao-Jui Chen; Chia-Ching Chen; Hsiang-Lun Lu; Wei-Jen Wang
DOI: 10.1504/IJSTM.2017.081876
64-82System security manager education framework
Geunhye Kim; Mina Shim
DOI: 10.1504/IJSTM.2017.081877
83-100A study on decision support system based on the fuzzy logic approach for the livestock service management
Saraswathi Sivamani; Hong-Geun Kim; Jangwoo Park; Yongyun Cho
DOI: 10.1504/IJSTM.2017.081878
101-116Design and implementation of lightweight network access control technique on wireless router
Hyeji Heo; Jaecheol Ryou
DOI: 10.1504/IJSTM.2017.081879
117-130Keyless signature infrastructure and PKI: hash-tree signatures in pre- and post-quantum world
Ahto Buldas; Risto Laanoja; Ahto Truu
DOI: 10.1504/IJSTM.2017.081881
131-153Design and implementation of Hadoop platform for processing big data of logistics which is based on IoT
Nam-Ho Kim
DOI: 10.1504/IJSTM.2017.081883
154-164Comparing security vulnerability by operating system environment
Dongkyun Seo; Kyungho Lee
DOI: 10.1504/IJSTM.2017.081884