Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2014 (2014), Article ID 683982, 8 pages
http://dx.doi.org/10.1155/2014/683982
Research Article

Ubi-RKE: A Rhythm Key Based Encryption Scheme for Ubiquitous Devices

Department of Computer Science and Engineering, Seoul National University of Science and Technology, Seoul 139-743, Republic of Korea

Received 13 June 2014; Accepted 19 July 2014; Published 19 August 2014

Academic Editor: Young-Sik Jeong

Copyright © 2014 Jae Dong Lee et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. D. J. Levitin and P. R. Cook, “Memory for musical tempo: additional evidence that auditory memory is absolute,” Perception & Psychophysics, vol. 58, no. 6, pp. 927–935, 1996. View at Publisher · View at Google Scholar · View at Scopus
  2. J.-S. Oh, C.-U. Park, and S.-B. Lee, “NFC-based mobile payment service adoption and diffusion,” Journal of Convergence, vol. 5, no. 2, pp. 8–14, 2014. View at Google Scholar
  3. A. Goode, “Managing mobile security: how are we doing?” Network Security, vol. 2010, no. 2, pp. 12–15, 2010. View at Publisher · View at Google Scholar · View at Scopus
  4. S. P. Singh and R. Maini, “Comparison of data encryption algorithms,” International Journal of Computer Science and Communication, vol. 2, no. 1, pp. 125–127, 2011. View at Google Scholar
  5. T.-Y. Chang, Y.-J. Yang, and C.-C. Peng, “A personalized rhythm click-based authentication system,” Information Management & Computer Security, vol. 18, no. 2, pp. 72–85, 2010. View at Publisher · View at Google Scholar · View at Scopus
  6. M. Abutaha, M. Farajallah, R. Tahboub, and M. Odeh, “Survey paper: cryptography is the science of information security,” International Journal of Computer Science and Security, vol. 5, no. 3, pp. 298–308, 2011. View at Google Scholar
  7. A. Abusukhon, M. Talib, and I. Ottoum, “Secure network communication based on text-to-image encryption,” International Journal of Cyber-Security and Digital Forensics (IJCSDF), vol. 1, no. 4, pp. 263–271, 2012. View at Google Scholar
  8. S. Dutta, C. Kumar, and S. Chakraborty, “A symmetric key algorithm for cryptography using music,” International Journal of Engineering and Technology, vol. 5, no. 3, pp. 3109–3115, 2013. View at Google Scholar · View at Scopus
  9. J. Kelsey, B. Schneier, D. Wagner, and C. Hall, “Cryptanalytic attacks on pseudorandom number generators,” Lecture Notes in Computer Science, vol. 1372, pp. 168–188, 1998. View at Google Scholar
  10. J. O. Wobbrock, “TapSongs: Tapping rhythm-based passwords on a single binary sensor,” in Proceedings of the 22nd Annual ACM Symposium on User Interface Software and Technology (UIST '09), pp. 93–96, October 2009. View at Publisher · View at Google Scholar · View at Scopus
  11. F. Monrose, M. K. Reiter, and S. Wetzel, “Password hardening based on keystroke dynamics,” International Journal of Information Security, vol. 1, no. 2, pp. 69–83, 2002. View at Publisher · View at Google Scholar
  12. T. Chang, Y. Yang, and C. Peng, “A personalized rhythm click-based authentication system,” Information Management and Computer Security, vol. 18, no. 2, pp. 72–85, 2010. View at Publisher · View at Google Scholar · View at Scopus
  13. T. Kwon and S. Na, “TinyLock: affordable defense against smudge attacks on smartphone pattern lock systems,” Computers & Security, vol. 42, pp. 137–150, 2014. View at Google Scholar
  14. S. Chiasson, E. Stobert, A. Forget, R. Biddle, and P. C. van Oorschot, “Persuasive cued click-points: design, implementation, and evaluation of a knowledge-based authentication mechanism,” IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 2, pp. 222–235, 2012. View at Publisher · View at Google Scholar · View at Scopus
  15. P. Andriotis, T. Tryfonas, G. Oikonomou, and C. Yildiz, “A pilot study on the security of pattern screen-lock methods and soft side channel attacks,” in Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '13), pp. 1–6, April 2013. View at Publisher · View at Google Scholar · View at Scopus
  16. C.-I. Fan and Y.-H. Lin, “full privacy minutiae-based fingerprint verificationfor low-computation devices,” Journal of Convergence, vol. 3, pp. 21–24, 2012. View at Google Scholar
  17. M. Cho and I.-H. Lee, “Optical image encryption and decryption considering wireless communication channels,” Journal of Information Processing Systems, vol. 10, no. 2, pp. 215–222, 2014. View at Google Scholar
  18. H. T. Panduranga, S. K. Naveen Kumar, and H. S. Sharath Kumar, “Hardware software co-simulation of the multiple image encryption technique using the Xilinx system generator,” Journal of Information Processing Systems, vol. 9, no. 3, pp. 499–510, 2013. View at Google Scholar
  19. M. I. Malkawi, “The art of software systems development: reliability, availability, maintainability, performance (RAMP),” Human-Centric Computing and Information Sciences, vol. 3, no. 1, article 22, 17 pages, 2013. View at Google Scholar