default search action
Security and Communication Networks, Volume 8
Volume 8, Number 1, January 2015
- Xueqi Cheng, Jinhong Yuan, Ali Tajer, Aiqun Hu, Wanlei Zhou:
Special issue on recent advances in network and information security - security and communication networks journal. 1
- Li Tao, Hu Aiqun:
Efficient trust chain model based on turing machine. 2-12 - Lei Jiang, Jianlong Tan, Qiu Tang:
An efficient sparse matrix format for accelerating regular expression matching on field-programmable gate arrays. 13-24 - Xian Liu:
Secrecy capacity of wireless channels subject to log-normal fading. 25-35 - Jian Li, DanJie Song, Ruifan Li, Xiaofeng Lu:
A quantum secure direct communication protocol based on four-qubit cluster state. 36-42 - Shengbao Wang, Zhenfu Cao, Qi Xie, Wenhao Liu:
Practical identity-based encryption in multiple private key generator (PKG) environments. 43-50 - Lejun Fan, Yuanzhuo Wang, Xueqi Cheng, Jinming Li, Shuyuan Jin:
Privacy theft malware multi-process collaboration analysis. 51-67 - Buyun Qu, Zhibin Zhang, Xingquan Zhu, Dan Meng:
An empirical study of morphing on behavior-based network traffic classification. 68-79 - Xiang Cui, Lihua Yin, Shuyuan Jin, Zhiyu Hao, Shuhao Li:
Botnet spoofing: fighting botnet with itself. 80-89
Volume 8, Number 2, January 2015
- Wei Yu, David W. Griffith, Linqiang Ge, Sulabh Bhattarai, Nada Golmie:
An integrated detection system against false data injection attacks in the Smart Grid. 91-109 - Sara Nazari, Amir-Masoud Eftekhari-Moghadam, Mohammad Shahram Moin:
A novel image steganography scheme based on morphological associative memory and permutation schema. 110-121 - Ji-Jian Chin, Rouzbeh Behnia, Swee-Huay Heng, Raphael C.-W. Phan:
Cryptanalysis of a certificateless identification scheme. 122-125 - Yuh-Min Tseng, Tung-Tso Tsai, Sen-Shan Huang:
Enhancement on strongly secure group key agreement. 126-135 - Niu Liu, Shaohua Tang, Lingling Xu, Daojing He:
Analyses of several recently proposed group key management schemes. 136-148 - Fahad Bin Muhaya:
Cryptanalysis and security enhancement of Zhu's authentication scheme for Telecare medicine information system. 149-158 - Hadi Kaveh, Mohammad Shahram Moin:
A high-capacity and low-distortion 3D polygonal mesh steganography using surfacelet transform. 159-167 - Shenyun Che, Renjian Feng, Xuan Liang, Xiao Wang:
A lightweight trust management based on Bayesian and Entropy for wireless sensor networks. 168-175 - Youngsang Shin, Steven A. Myers, Minaxi Gupta, Predrag Radivojac:
A link graph-based approach to identify forum spam. 176-188 - Ya-Fen Chang:
A flexible hierarchical access control mechanism enforcing extension policies. 189-201 - Yun Song, Zhihui Li, Yongming Li, Jing Li:
A new multi-use multi-secret sharing scheme based on the duals of minimal linear codes. 202-211 - Ahmed Moumena, Abdelrezzak Guessoum:
Fast anomaly detection using Boxplot rule for multivariate data in cooperative wideband cognitive radio in the presence of jammer. 212-219 - Tayeb Kenaza, Othmane Nait Hamoud, Nadia Nouali-Taboudjemat:
Efficient centralized approach to prevent from replication attack in wireless sensor networks. 220-231 - Shuzhen Wang, Zonghua Zhang, Farid Naït-Abdesselam:
Towards cross-layer approaches to coping with misbehavior in mobile ad hoc networks: an anatomy of reputation systems. 232-244 - Lili Xu, Fan Wu:
An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity. 245-260 - Mostafa Mohammadpourfard, Mohammad-Ali Doostari, Mohammad Bagher Ghaznavi Ghoushchi, Nafiseh Shakiba:
A new secure Internet voting protocol using Java Card 3 technology and Java information flow concept. 261-283 - Yilei Wang, Duncan S. Wong, Chuan Zhao, Qiuliang Xu:
Fair two-party computation with rational parties holding private types. 284-297 - Jiageng Chen, Mohammad Saiful Islam Mamun, Atsuko Miyaji:
An efficient batch verification system and its effect in a real time VANET environment. 298-310 - Zhenzhen Zhang, Jianjun Hou, Qinglong Ma, Zhaohong Li:
Efficient video frame insertion and deletion detection based on inconsistency of correlations between local binary pattern coded frames. 311-320 - Tinu Baby, Aswani Kumar Cherukuri:
On query execution over encrypted data. 321-331
- Youssef El Hajj Shehadeh, Dieter Hogrefe:
A survey on secret key generation mechanisms on the physical layer in wireless networks. 332-341
Volume 8, Number 3, February 2015
- Cristina Rottondi, Marco Savi, Giacomo Verticale, Christoph Krauß:
Mitigation of peer-to-peer overlay attacks in the automatic metering infrastructure of smart grids. 343-359 - Samir Moalla, Maher Rahmouni:
Trust path: a distributed model of search paths of trust in a peer-to-peer system. 360-367 - Mohammad Nauman, Sohail Khan, Abu Talib Othman, Shahrulniza Musa:
Realization of a user-centric, privacy preserving permission framework for Android. 368-382 - Shijun Zhao, Li Xi, Qianying Zhang, Yu Qin, Dengguo Feng:
Security analysis of SM2 key exchange protocol in TPM2.0. 383-395 - Zhi-Yi Shao, Bo Yang:
Private set intersection via public key encryption with keywords search. 396-402 - Ignacio Sanchez, Gianmarco Baldini, David Shaw, Raimondo Giuliani:
Experimental passive eavesdropping of Digital Enhanced Cordless Telecommunication voice communications through low-cost software-defined radios. 403-417 - Soumya Maity, Soumya Kanti Ghosh, Ehab Al-Shaer:
PoliCon: a policy conciliation framework for heterogeneous mobile ad hoc networks. 418-430 - Mohammad Ehdaie, Nikolaos Alexiou, Mahmoud Ahmadian-Attari, Mohammad Reza Aref, Panos Papadimitratos:
Key splitting: making random key distribution schemes resistant against node capture. 431-445 - Kao Zhao, Hai Jin, Deqing Zou, Weiqi Dai, Yang Xiang:
A privacy-preserving location tracking system for smartphones based on cloud storage. 446-458 - L. Xue, Guozi Sun:
Design and implementation of a malware detection system based on network behavior. 459-470 - Kwangsu Lee, Intae Kim, Seong Oun Hwang:
Privacy preserving revocable predicate encryption revisited. 471-485 - Ioannis Psaroudakis, Vasilios Katos, Pavlos S. Efraimidis:
A novel mechanism for anonymizing Global System for Mobile Communications calls using a resource-based Session Initiation Protocol community network. 486-500 - Qi Li, Jianfeng Ma, Rui Li, Jinbo Xiong, Ximeng Liu:
Large universe decentralized key-policy attribute-based encryption. 501-509 - Masoud Afrakhteh, Jeong-A Lee:
Adaptive least significant bit matching revisited with the help of error images. 510-515 - Shakil Ahmed, Khairulmizam Samsudin, Abdul Rahman Ramli, Fakhrul Zaman Rokhani:
Advanced Encryption Standard-XTS implementation in field programmable gate array hardware. 516-522
Volume 8, Number 4, March 2015
- Fotios Gogoulos, Anna Antonakopoulou, Georgios V. Lioudakis, Aziz S. Mousas, Dimitra I. Kaklamani, Iakovos S. Venieris:
An authorization model for cross-enterprise collaborations. 523-539 - Lili Wei, Dimitrios A. Pados, Stella N. Batalama, Rose Qingyang Hu, Michael J. Medley:
Optimal multiuser spread-spectrum data hiding in digital images. 540-549 - Zhengan Huang, Shengli Liu, Kefei Chen:
n-Evasive all-but-many lossy trapdoor function and its constructions. 550-564 - Walid Y. Zibideh, Mustafa M. Matalgah:
Modified data encryption standard encryption algorithm with improved error performance and enhanced security in wireless fading channels. 565-573 - Chin-Chen Chang, Chin-Yu Sun, Ting-Fang Cheng:
A dependable storage service system in cloud environment. 574-588 - Vijey Thayananthan, Ahmed Alzahrani, Muhammad Shuaib Qureshi:
Efficient techniques of key management and quantum cryptography in RFID networks. 589-597 - Depeng Li, Zeyar Aung, John R. Williams, Abel Sanchez:
Efficient and fault-diagnosable authentication architecture for AMI in smart grid. 598-616 - Liling Cao, Wancheng Ge:
Analysis and improvement of a multi-factor biometric authentication scheme. 617-625 - Jian Wang, Yiwen Xu, Jindong Zhang, Yanheng Liu, Weiwen Deng:
SAV4AV: securing authentication and verification for ad hoc vehicles. 626-636 - Alekha Kumar Mishra, Ashok Kumar Turuk:
Residual energy-based replica detection scheme for mobile wireless sensor networks. 637-648 - Fahimeh Rezaei, Michael Hempel, Hamid Sharif:
A novel automated framework for modeling and evaluating covert channel algorithms. 649-660 - Fiona Jiazi Liu, Ahmed Refaey, Xianbin Wang, Helen Tang:
Reliability enhancement for CIR-based physical layer authentication. 661-671 - Zhiqiang Liu, Ya Liu, Qingju Wang, Dawu Gu, Wei Li:
Meet-in-the-middle fault analysis on word-oriented substitution-permutation network block ciphers. 672-681 - Min Zhang, Jiashu Zhang, Ying Zhang:
Remote three-factor authentication scheme based on Fuzzy extractors. 682-693 - Mohsen Toorani:
Cryptanalysis of a new protocol of wide use for email with perfect forward secrecy. 694-701
Volume 8, Number 5, March 2015
- Ping Qi, Long-shu Li:
A fault recovery-based scheduling algorithm for cloud service reliability. 703-714 - Fu-Hau Hsu, Li-Han Chen, Chia-Jun Lin:
Defeat scanning worms in cyber warfare. 715-726 - Che-Hung Liu, Jen-Sheng Wang, Chih-Chiang Peng, Joseph Z. Shyu:
Evaluating and selecting the biometrics in network security. 727-739 - Joonsang Baek, Young-Ji Byon, Eman Hableel, Mahmoud Al-Qutayri:
Making air traffic surveillance more reliable: a new authentication framework for automatic dependent surveillance-broadcast (ADS-B) based on online/offline identity-based signature. 740-750 - Ashok Singh Sairam, Sangita Roy, Rishikesh Sahay:
Coloring networks for attacker identification and response. 751-768 - Hailong Zhang, Yongbin Zhou, Dengguo Feng:
Mahalanobis distance similarity measure based distinguisher for template attack. 769-777 - Zheng Yang:
A new efficient signcryption scheme in the standard model. 778-789 - Enes Pasalic, Samed Bajric, Milan Djordjevic:
On cross-correlation properties of S-boxes and their design using semi-bent functions. 790-800 - Kee Sung Kim, Ik Rae Jeong:
A new certificateless signature scheme under enhanced security models. 801-810 - Qingbin Wang, Shaozhen Chen:
Attribute-based signature for threshold predicates from lattices. 811-821 - Mohammad GhasemiGol, Abbas Ghaemi Bafghi:
E-correlator: an entropy-based alert correlation system. 822-836 - Ilija Basicevic, Stanislav Ocovaj, Miroslav Popovic:
Evaluation of entropy-based detection of outbound denial-of-service attacks in edge networks. 837-844 - Muhammad Zubair, Xiangwei Kong, Saeed Mahfooz:
DMAM: distributed mobility and authentication mechanism in next generation networks. 845-863 - Karan Verma, Halabi Hasbullah:
Bloom-filter based IP-CHOCK detection scheme for denial of service attacks in VANET. 864-878
Volume 8, Number 6, April 2015
- Liao Zhenhua, Wang Jinmiao, Lang Bo:
A ciphertext-policy hidden vector encryption scheme supporting multiuser keyword search. 879-887 - Guang-Gang Geng, Xiao-Dong Lee, Yan-Ming Zhang:
Combating phishing attacks via brand identity and authorization features. 888-898 - Chuan Qin, Chin-Chen Chang, Gwoboa Horng, Ying-Hsuan Huang, Yen-Chang Chen:
Reversible data embedding for vector quantization compressed images using search-order coding and index parity matching. 899-906 - Xiaoming Hu, Jian Wang, Huajie Xu, WenAn Tan:
A short and highly efficient identity-based designated verifier proxy signature scheme. 907-916 - Mahdiyeh Ali Mohammadi, Ali A. Pouyan:
Defense mechanisms against Sybil attack in vehicular ad hoc network. 917-936 - Wenfang Zhang, Xiaomin Wang, Muhammad Khurram Khan:
A virtual bridge certificate authority-based cross-domain authentication mechanism for distributed collaborative manufacturing systems. 937-951 - Yuede Ji, Qiang Li, Yukun He, Dong Guo:
BotCatch: leveraging signature and behavior for bot detection. 952-969 - Chun-Ying Huang, Ying-Dar Lin, Peng-Yu Liao, Yuan-Cheng Lai:
Stateful traffic replay for web application proxies. 970-981 - Chandramohan Dhasarathan, Vengattaraman Thirumal, Dhavachelvan Ponnurangam:
Data privacy breach prevention framework for the cloud service. 982-1005 - Hao Zhang, Nenghai Yu, Yonggang Wen:
Mobile cloud computing based privacy protection in location-based information survey applications. 1006-1025 - Rong Jiang, Rongxing Lu, Jun Luo, Chengzhe Lai, Xuemin Sherman Shen:
Efficient self-healing group key management with dynamic revocation and collusion resistance for SCADA in smart grid. 1026-1039 - Seyed Hossein Erfani, Hamid Haj Seyyed Javadi, Amir Masoud Rahmani:
A dynamic key management scheme for dynamic wireless sensor networks. 1040-1049 - R. Kumar, G. Kousalya:
Transactions based secure routing in wireless networks: a cognitive science approach. 1050-1062 - Mohammad Masdari, Sam Jabbehdari, Jamshid Bagherzadeh:
Secure publish/subscribe-based certificate status validations in mobile ad hoc networks. 1063-1076 - Ali Noorollahi Ravari, Mehran S. Fallah:
A nonmonotonic modal authorization logic for pervasive computing. 1077-1091 - Ismail Adel Al-Taharwa, Hahn-Ming Lee, Albert B. Jeng, Kuo-Ping Wu, Cheng-Seen Ho, Shyi-Ming Chen:
JSOD: JavaScript obfuscation detector. 1092-1107 - Yuesheng Zhu, Limin Ma, Jinjiang Zhang:
An enhanced Kerberos protocol with non-interactive zero-knowledge proof. 1108-1117 - Zheng Yang, Wu Yang:
A practical strongly secure one-round authenticated key exchange protocol without random oracles. 1118-1131 - Tao Feng, Shining Han, Xian Guo, Donglin Ma:
A new method of formalizing anonymity based on protocol composition logic. 1132-1140
- Hani Almimi, Azman Samsudin, Shahram Jahani:
Elliptic-curve scalar multiplication algorithm using ZOT structure. 1141-1154
Volume 8, Number 7, May 2015
- Fangyong Hou, Hongjun He:
Ultra simple way to encrypt non-volatile main memory. 1155-1168 - Seonho Choi, Kun Sun, Hyeonsang Eom, Edward Jung:
Multi-source broadcast authentication with Combined Key Chains for wireless ad hoc networks. 1169-1178 - Abdelfattah Amamra, Jean-Marc Robert, Chamseddine Talhi:
Enhancing malware detection for Android systems using a system call filtering and abstraction process. 1179-1192 - Abdelouahid Derhab, Abdelghani Bouras:
Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems. 1193-1212 - Hui Zhu, Xiaodong Lin, Yun Zhang, Rongxing Lu:
Duth: a user-friendly dual-factor authentication for Android smartphone devices. 1213-1222 - Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo:
A provably secure identity-based proxy ring signature based on RSA. 1223-1236
- Alfredo De Santis, Giancarlo De Maio, Umberto Ferraro Petrillo:
Using HTML5 to prevent detection of drive-by-download web malware. 1237-1255
- Jun-Po Yang, Wei-Guo Zhang:
Generating highly nonlinear resilient Boolean functions resistance against algebraic and fast algebraic attacks. 1256-1264 - Sevil Sen:
Sequence-based masquerade detection for different user groups. 1265-1278 - Yao Shen, Liusheng Huang, Xiaorong Lu, Wei Yang:
A novel comprehensive steganalysis of transmission control protocol/Internet protocol covert channels based on protocol behaviors and support vector machine. 1279-1290 - Le Chen, Rongxing Lu, Khalid Nawaf Alharbi, Xiaodong Lin, Zhenfu Cao:
ReDD: recommendation-based data dissemination in privacy-preserving mobile social networks. 1291-1305 - Atefeh Asayesh, Mohammad Ali Hadavi, Rasool Jalili:
(t, k)-Hypergraph anonymization: an approach for secure data publishing. 1306-1317 - Sang-Ho Na, Eui-Nam Huh:
A broker-based cooperative security-SLA evaluation methodology for personal cloud computing. 1318-1331 - Chia-Hui Liu, Fong-Qi Lin, Chin-Sheng Chen, Tzer-Shyong Chen:
Design of secure access control scheme for personal health record-based cloud healthcare service. 1332-1346 - Orhan Ermis, Serif Bahtiyar, Emin Anarim, M. Ufuk Çaglayan:
An improved conference-key agreement protocol for dynamic groups with efficient fault correction. 1347-1359 - Salima Smaoui, Mohammad S. Obaidat, Faouzi Zarai, Kuei-Fang Hsiao:
A new secure and efficient scheme for network mobility management. 1360-1377
- Rajeev Singh, Teek Parval Sharma:
On the IEEE 802.11i security: a denial-of-service perspective. 1378-1407 - Xing-Tian Wang, Mingchu Li, Szu-Ting Wang, Chin-Chen Chang:
Reversible data hiding exploiting high-correlation regulation for high-quality images. 1408-1421 - Yeu-Pong Lai, Wei-Feng Wu:
The defense in-depth approach to the protection for browsing users against drive-by cache attacks. 1422-1430
Volume 8, Number 8, May 2015
- Yang Ming, Yumin Wang:
Proxy signcryption scheme in the standard model. 1431-1446
- Shyh-Yih Wang, Wu-Chuan Yang, Ying-Jen Lin:
Balanced double subset difference broadcast encryption scheme. 1447-1460 - Zheng Yang:
An efficient strongly secure authenticated key exchange protocol without random oracles. 1461-1473 - Qingkuan Dong, Wenxiu Ding, Lili Wei:
Improvement and optimized implementation of cryptoGPS protocol for low-cost radio-frequency identification authentication. 1474-1484
- Zhenhua Chen, Shundong Li, Qianhong Wu, Qiong Huang:
A distributed secret share update scheme with public verifiability for ad hoc network. 1485-1493
- Xiuxia Tian, Ling Huang, Yong Wang, Chaofeng Sha, Xiaoling Wang:
DualAcE: fine-grained dual access control enforcement with multi-privacy guarantee in DaaS. 1494-1508 - Jianhong Zhang, Wenjing Tang:
On the security of Kim et al. two ID-based broadcast signcryption schemes. 1509-1514 - Masoud Afrakhteh, Jeong-A Lee:
Parallel modular steganography using error images. 1515-1524 - Jinyong Chang, Rui Xue:
Practical key-dependent message chosen-ciphertext security based on decisional composite residuosity and quadratic residuosity assumptions. 1525-1536 - Hong Zhu, Zhipeng Wang, Kevin Lü, Meiyi Xie, Xiang Zou, Bing Chen:
A distributed scheme for row-based computational private information retrieval. 1537-1546 - Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman, Kazumasa Omote:
Generic constructions of secure-channel free searchable encryption with adaptive security. 1547-1560 - Tooska Dargahi, Hamid H. S. Javadi, Mehdi Hosseinzadeh:
Application-specific hybrid symmetric design of key pre-distribution for wireless sensor networks. 1561-1574 - Miaomiao Tian, Liusheng Huang:
Certificateless and certificate-based signatures from lattices. 1575-1586 - Hassan Asgharian, Ahmad Akbari, Bijan Raahemi:
Feature engineering for detection of Denial of Service attacks in session initiation protocol. 1587-1601 - Chin-Chen Chang, Hai-Duong Le:
A provably secure smart card-based authenticated group key exchange protocol. 1602-1607 - Chi-Tung Chen, Cheng-Chi Lee:
A two-factor authentication scheme with anonymity for multi-server environments. 1608-1625
Volume 8, Number 9, June 2015
- Mubashar Khan, Naveed Ahmed Azam:
Right translated AES gray S-boxes. 1627-1635 - Weiwei Liu, Guangjie Liu, Yuewei Dai:
Damage-resistance matrix embedding framework: the contradiction between robustness and embedding efficiency. 1636-1647 - Rong Cheng, Fangguo Zhang:
Lattice-based obfuscation for re-encryption functions. 1648-1658 - Maryam Asadzadeh Kaljahi, Ali Payandeh, Mohammad Bagher Ghaznavi Ghoushchi:
TSSL: improving SSL/TLS protocol by trust model. 1659-1671 - Wioletta Wójtowicz, Marek R. Ogiela:
Biometric watermarks based on face recognition methods for authentication of digital images. 1672-1687 - Hongli Zhang, Dongliang Xu, Zhihong Tian, Yujian Fan:
An efficient parallel algorithm for exact multi-pattern matching. 1688-1697 - Sasan Adibi:
A multilayer non-repudiation system: a Suite-B approach. 1698-1706 - Songlin Sun, Bo Rong, Yi Qian:
Artificial frequency selective channel for covert cyclic delay diversity orthogonal frequency division multiplexing transmission. 1707-1716 - Hsiao-Ching Lin, Chinyang Henry Tseng, Hui-Tang Lin:
MoTIVE: mobile two-hop integrity validation for emergency vehicle routing. 1717-1724 - Dur-e-Shahwar Kundi, Arshad Aziz, Majida Kazmi:
An efficient single unit T-box/T-1-box implementation for 128-bit AES on FPGA. 1725-1731 - Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks. 1732-1751 - Santanu Chatterjee, Ashok Kumar Das:
An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks. 1752-1771 - Sina Khoshabi Nobar, Javad Musevi Niya:
Robust mitigation of selfish misbehavior in wireless networks. 1772-1779 - Yih-Jou Tzang, Hong-Yi Chang, Chih-Hsuan Tzang:
Enhancing the performance and security against media-access-control table overflow vulnerability attacks. 1780-1793 - Lein Harn, Guang Gong:
Conference key establishment protocol using a multivariate polynomial and its applications. 1794-1800 - Kai Zhang, Jie Guan, Xuliang Fei:
Improved conditional differential cryptanalysis. 1801-1811
- Yue Wu, Yimeng Zhao, Michel Riguidel, Guanghao Wang, Ping Yi:
Security and trust management in opportunistic networks: a survey. 1812-1827
Volume 8, Number 10, July 2015
Editorial
- Jinshu Su, Xiaofeng Wang, Weisong Shi, Indrakshi Ray:
Security, trust, and resilience of distributed networks and systems. 1829-1830
- Sheng Wen, Di Wu, Ping Li, Yang Xiang, Wanlei Zhou, Guiyi Wei:
Detecting stepping stones by abnormal causality probability. 1831-1844 - Sun Hao, Wen Wang, Huabiao Lu, Peige Ren:
AutoMal: automatic clustering and signature generation for malwares based on the network flow. 1845-1854 - Tong Zhao, Shanbo Lu, Wei Yan, Xiaoming Li:
A connectivity resilient dynamic multi-channel assignment method for VANET. 1855-1864 - Wenzhong Guo, Jia Ye Chen, Guolong Chen, Haifeng Zheng:
Trust dynamic task allocation algorithm with Nash equilibrium for heterogeneous wireless sensor network. 1865-1877 - Xiaohui Kuang, Li Liu, Qiang Liu, Xiang Li:
A clustering approach based on convergence degree chain for wireless sensor networks. 1878-1889 - Kai Shuang, Peng Zhang, Sen Su:
Comb: a resilient and efficient two-hop lookup service for distributed communication system. 1890-1903 - Yang Luo, Chunhe Xia, Liangshuang Lv, Zhao Wei, Yazhuo Li:
Modeling, conflict detection, and verification of a new virtualization role-based access control framework. 1904-1925 - Pingping Lin, Jun Bi, Yangyang Wang:
WEBridge: west-east bridge for distributed heterogeneous SDN NOSes peering. 1926-1942 - Ning Hu, BaoSheng Wang, Xin Liu:
Cooperative monitoring BGP among autonomous systems. 1943-1957 - René Mayrhofer:
An architecture for secure mobile devices. 1958-1970
Volume 8, Number 11, July 2015
- Jia-Lun Tsai, Nai-Wei Lo:
Secure chaotic maps-based authenticated key agreement protocol without smartcard for multi-server environments. 1971-1978 - Jiguo Li, Jingjing Zhao, Yichen Zhang:
Certificateless online/offline signcryption scheme. 1979-1990 - Mansour Alsaleh, Abdulrahman Alarifi, Abdullah Alqahtani, AbdulMalik S. Al-Salman:
Visualizing web server attacks: patterns in PHPIDS logs‡. 1991-2003 - Ying-Dar Lin, Yuan-Cheng Lai, Chun-Nan Lu, Peng-Kai Hsu, Chia-Yin Lee:
Three-phase behavior-based detection and classification of known and unknown malware. 2004-2015 - Charalampos Manifavas, Konstantinos Fysarakis, Alexandros Papanikolaou, Ioannis Papaefstathiou:
Embedded Systems Security: A Survey of EU Research Efforts. 2016-2036
- Muhammad Aamir, Syed Mustafa Ali Zaidi:
Denial-of-service in content centric (named data) networking: a tutorial and state-of-the-art survey. 2037-2059
Volume 8, Number 12, August 2015
- Fábio Borges, Raqueline A. M. Santos, Franklin L. Marquezino:
Preserving privacy in a smart grid scenario using quantum mechanics. 2061-2069 - S. Mobarakeh Moosavirad, Peyman Kabiri, Hamidreza Mahini:
Rashnu: a Wi-Fi intrusion response scheme. 2070-2078 - Shihong Zou, Jing Zhang, Xiaodong Lin:
An effective behavior-based Android malware detection system. 2079-2089 - Simona Ramanauskaite, Nikolaj Goranin, Antanas Cenys, Jonas Juknius:
Modelling influence of Botnet features on effectiveness of DDoS attacks. 2090-2101 - Wei Fei, Gaobo Yang, Leida Li, Ming Xia, Dengyong Zhang:
Detection of seam carving-based video retargeting using forensics hash. 2102-2113 - Young-joo Shin, Kwangjo Kim:
Differentially private client-side data deduplication protocol for cloud storage services. 2114-2123 - Pablo Picazo-Sanchez, Lara Ortiz-Martin, Pedro Peris-Lopez, Nasour Bagheri:
Weaknesses of fingerprint-based mutual authentication protocol. 2124-2134
- Mohammad Moradi, Mohammad Reza Keyvanpour:
CAPTCHA and its Alternatives: A Review. 2135-2156
Volume 8, Number 13, September 2015
- Qiqi Lai, Yupu Hu, Yuan Chen, Baocang Wang, Fenghe Wang:
New method of key-dependent message security for asymmetric encryption. 2157-2170
- Hailun Tan, Wen Hu, Sanjay Jha:
A remote attestation protocol with Trusted Platform Modules (TPMs) in wireless sensor networks. 2171-2188
- Jikai Teng, Chuankun Wu:
A collusion attack on asymmetric group key exchange. 2189-2193 - Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba:
New packing method in somewhat homomorphic encryption and its applications. 2194-2213 - SK Hafizul Islam, Muhammad Khurram Khan, Ali M. Al-Khouri:
Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing. 2214-2231 - Yu-Chi Chen, Raylin Tso, Masahiro Mambo, Kaibin Huang, Gwoboa Horng:
Certificateless aggregate signature with efficient verification. 2232-2243 - Chien-Hua Tsai, Pin-Chang Su:
Multi-document threshold signcryption scheme. 2244-2256 - Xueping Wu, Dafang Zhang, Xin Su, Wenwei Li:
Detect repackaged Android application based on HTTP traffic similarity. 2257-2266 - Cong Wang, Maode Ma, Zenghua Zhao:
An enhanced authentication protocol for WRANs in TV white space. 2267-2278 - Ibrahim F. Elashry, Yi Mu, Willy Susilo:
A resilient identity-based authenticated key exchange protocol. 2279-2290 - Teodor Sommestad, Ulrik Franke:
A test of intrusion alert filtering based on network information. 2291-2301 - Jun Tao, Limin Zhu, Le Chang, Jin Liu, Xiaoxiao Wang, Yaodan Hu:
Joint anti-attack scheme for channel assignment in multi-radio multi-channel wireless mesh networks. 2302-2316 - Xiaopu Ma, Ruixuan Li, Hongwei Wang, Huaqing Li:
Role mining based on permission cardinality constraint and user cardinality constraint. 2317-2328 - Jingjing Huang, Ting Jiang:
Secret key generation exploiting Ultra-wideband indoor wireless channel characteristics. 2329-2337 - Jianliang Wu, Tingting Cui, Tao Ban, Shanqing Guo, Lizhen Cui:
PaddyFrog: systematically detecting confused deputy vulnerability in Android applications. 2338-2349 - Hongfeng Zhu:
One-time identity-password authenticated key agreement scheme based on biometrics. 2350-2360 - Michael Farcasin, Eric Chan-Tin:
Why we hate IT: two surveys on pre-generated and expiring passwords in an academic setting. 2361-2373 - V. Thanikaiselvan, Pachiyappan Arulmozhivarman:
RAND - STEG: an integer wavelet transform domain digital image random steganography using knight's tour. 2374-2382
Volume 8, Number 14, September 2015
Editorial
- Qilian Liang, Jian Ren, Jing Liang, Baoju Zhang, Yiming Pi, Chenglin Zhao:
Security in big data. 2383-2385
- Yujin Zhang, Chenglin Zhao, Yiming Pi, Shenghong Li, Shilin Wang:
Image-splicing forgery detection based on local binary patterns of DCT coefficients. 2386-2395 - Rong Du, Chenglin Zhao, Feng Zhao, Shenghong Li:
Strategies of network coding against nodes conspiracy attack. 2396-2403 - Zhuo Li, Qilian Liang, Jiasong Mu, Wei Wang, Baoju Zhang:
The hybrid architecture of wireless and power line communications in HANs for Smart Grid security. 2404-2410 - Xin Yin, Yaqiu Sun:
Secure and efficient integration of big data for multi-cells based on micro images. 2411-2415 - Baoju Zhang, Qing Lei, Wei Wang, Jiasong Mu:
Distributed video coding of secure compressed sensing. 2416-2419 - Sheng Su, Haijie Yu:
Secure and efficient data collection in wireless image sensor network based on ellipse batch dispersive routing. 2420-2430 - Xin Wang, Qilian Liang, Jiasong Mu, Wei Wang, Baoju Zhang:
Physical layer security in wireless smart grid. 2431-2439 - Shitong Yuan, Jing Liang:
Energy efficient comparator for successive approximation register ADCs with application to encryption schemes in wireless communication. 2440-2446 - Junjie Chen, Qilian Liang, Jie Wang:
Secure transmission for big data based on nested sampling and coprime sampling with spectrum efficiency. 2447-2456 - Chao Yang, Jian Ren, Jianfeng Ma:
Provable ownership of files in deduplication cloud storage. 2457-2468 - Wei Wang, Xin Zhou, Baoju Zhang, Jiasong Mu:
Anomaly detection in big data from UWB radars. 2469-2475
Volume 8, Number 15, October 2015
- Ouissem Ben Fredj:
A realistic graph-based alert correlation system. 2477-2493 - Chen Li, Rongxing Lu, Hui Li, Le Chen, Jie Chen:
PDA: a privacy-preserving dual-functional aggregation scheme for smart grid communications. 2494-2506 - Qiuhua Wang, Xiaojun Wang, Qiuyun Lv, Xueyi Ye, Yi Luo, Lin You:
Analysis of the information theoretically secret key agreement by public discussion. 2507-2523 - Jung Yeon Hwang, Dooho Choi, Hyun Sook Cho, Boyeon Song:
New efficient batch verification for an identity-based signature scheme. 2524-2535
- Yi Sun, Qiaoyan Wen:
A general two-party bi-input private function evaluation protocol. 2536-2544
- Wes Masri, Sam Sleiman:
SQLPIL: SQL injection prevention by input labeling. 2545-2560
- Ángel Martín del Rey:
Mathematical modeling of the propagation of malware: a review. 2561-2579 - Saman Iftikhar, Muhammad Kamran, Zahid Anwar:
A survey on reversible watermarking techniques for relational databases. 2580-2603
Volume 8, Number 16, November 2015
- Padmini Jaikumar, Avinash C. Kak:
A graph-theoretic framework for isolating botnets in a network. 2605-2623 - Hui Feng, Hefei Ling, Fuhao Zou, Zhengding Lu:
SVM-based anti-forensic method for spread-spectrum fingerprinting. 2624-2634 - Michael Zuba, Zhijie Shi, Zheng Peng, Jun-Hong Cui, Shengli Zhou:
Vulnerabilities of underwater acoustic networks to denial-of-service jamming attacks. 2635-2645 - Arif Jamal Malik, Waseem Shahzad, Farrukh Aslam Khan:
Network intrusion detection using hybrid binary PSO and random forests algorithm. 2646-2660 - Jing Liang:
Geolocation-aware security in a netcentric small unmanned-aerial-system for RF emitters. 2661-2670 - Zhen Zhong, Chenglin Zhao, Yiming Pi, Lingming Wang:
Security assurance in wireless acoustic sensors via event forecasting and detection. 2671-2677 - Xuebin Sun, Shuang Men, Chenglin Zhao, Zheng Zhou:
A security authentication scheme in machine-to-machine home network service. 2678-2686 - Junwei Zhang, Jianfeng Ma, Chao Yang:
Protocol Derivation System for the Needham-Schroeder family. 2687-2703 - Ting Jiang, Ming Yang, Yi Zhang:
Research and implementation of M2M smart home and security system. 2704-2711 - Zongjie Cao, Lijia Chen:
Security in application layer of radar sensor networks: detect friends or foe. 2712-2722 - Xin Wang, Lijun Zhang, Amit Deokar, Qilian Liang:
Enhanced security and reliability with MIMO communications for smart grid. 2723-2729 - Monther Aldwairi, Yaser M. Khamayseh, Mohammad Al-Masri:
Application of artificial bee colony for intrusion detection systems. 2730-2740 - Mrutyunjaya Panda, Ajith Abraham, Manas Ranjan Patra:
Hybrid intelligent systems for detecting network intrusions. 2741-2749 - Carmen Torrano-Gimenez, Hai Thanh Nguyen, Gonzalo Álvarez, Katrin Franke:
Combining expert knowledge with automatic feature extraction for reliable web attack detection. 2750-2767 - Engin Deveci, Mehmet Ufuk Çaglayan:
Model driven security framework for software design and verification. 2768-2792 - Gang Liu, Jing Zhang, Jinhui Liu, Yuan Zhang:
Improved Biba model based on trusted computing. 2793-2797 - Abdelnaser Rashwan, Honggang Wang, Dalei Wu, Xinming Huang:
Security-quality aware routing for wireless multimedia sensor networks using secret sharing. 2798-2812 - Zahid Anwar, Waqas Ahmad Khan:
Guess who is listening in to the board meeting: on the use of mobile device applications as roving spy bugs. 2813-2825 - Danping Shi, Lei Hu, Ling Song, Siwei Sun:
Differential fault attack on Zorro block cipher. 2826-2835 - Anjia Yang, Kaitai Liang, Yunhui Zhuang, Duncan S. Wong, Xiaohua Jia:
A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction. 2836-2849 - Gefei Zhang, Dan Fan, Yuqing Zhang, Xiaowei Li, Xuefeng Liu:
A privacy preserving authentication scheme for roaming services in global mobility networks. 2850-2859 - Shiwei Chen, Chenhui Jin:
A second preimage attack on zipper hash. 2860-2866 - Hongying Zheng, Quan Yuan, Jianyong Chen:
A framework for protecting personal information and privacy. 2867-2874 - Guangyao Zhao, Bing Sun, Chao Li, Jinshu Su:
Truncated differential cryptanalysis of PRINCE. 2875-2887 - Celine Mary Stuart, Deepthi P. Pattathil:
A novel low-complexity scheme for improving security of NLFG-based symmetric key cryptosystem using secure concatenated RS-QCLDPC code. 2888-2900 - Feng Ye, Yi Qian, Rose Qingyang Hu:
HIBaSS: hierarchical identity-based signature scheme for AMI downlink transmission. 2901-2908 - Luyang Li, Wei-Guo Zhang:
Construction of resilient Boolean functions with high nonlinearity and good algebraic degree. 2909-2916 - Mehran Alidoost Nia, Reza Ebrahimi Atani, Antonio Ruiz-Martínez:
Privacy enhancement in anonymous network channels using multimodality injection. 2917-2932 - Alessandro Aldini:
Modeling and verification of trust and reputation systems. 2933-2946 - Mehdi Fallahpour, Shervin Shirmohammadi, Mohammad Ghanbari:
A high capacity data hiding algorithm for H.264/AVC video. 2947-2955
Volume 8, Number 17, November 2015
- Vahid Rafe, Ramin Hosseinpouri:
A security framework for developing service-oriented software architectures. 2957-2972 - Chris DelBello, Kazi Raihan, Tao Zhang:
Reducing energy consumption of mobile phones during data transmission and encryption for wireless body area network applications. 2973-2980 - Hongfeng Zhu:
Cryptanalysis and provable improvement of a chaotic maps-based mobile dynamic ID authenticated key agreement scheme. 2981-2991 - Habib Allah Yajam, Javad Mohajeri, Mahmoud Salmasizadeh:
Identity-based universal re-encryption for mixnets. 2992-3001 - Yaping Liu, Wenping Deng, Zhihong Liu, Feng Huang:
3S: three-signature path authentication for BGP security. 3002-3014 - Mohaddeseh Zakeri, Fatemeh Faraji Daneshgar, Maghsoud Abbaspour:
A static heuristic approach to detecting malware targets. 3015-3027
- Jin Wook Byun:
Privacy preserving smartcard-based authentication system with provable security. 3028-3044
- Hiroshi Fujinoki:
Designs, analyses, and optimizations for attribute-shuffling obfuscation to protect information from malicious cloud administrators. 3045-3066
- Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng, Yuan Zhou:
Signcryption KEM/tag-KEM, revisited. 3067-3082
- Mingchu Li, Shu Ma, Cheng Guo:
A novel weighted threshold secret image sharing scheme†. 3083-3093 - Wun-She Yap, Joseph K. Liu, Syh-Yuan Tan, Bok-Min Goi:
On the security of a lightweight authentication and encryption scheme for mobile ad hoc network. 3094-3098 - Yulong Wang, Yi Li:
An efficient and tunable matrix-disguising method toward privacy-preserving computation. 3099-3110 - Qin Liao, Hong Li, Songlin Kang, Chuchu Liu:
Application layer DDoS attack detection using cluster with label based on sparse vector decomposition and rhythm matching. 3111-3120 - Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim:
Karatsuba-Block-Comb technique for elliptic curve cryptography over binary fields. 3121-3130 - Benchaa Djellali, Kheira Belarbi, Abdallah Chouarfia, Pascal Lorenz:
User authentication scheme preserving anonymity for ubiquitous devices. 3131-3141 - Xiaopeng Yang, Wenping Ma, Chengli Zhang:
Group authenticated key exchange schemes via learning with errors. 3142-3156 - Jingyu Feng, Yuqing Zhang, Guangyue Lu, Wenxiu Zheng:
Securing cooperative spectrum sensing against ISSDF attack using dynamic trust evaluation in cognitive radio networks. 3157-3166 - Haiyan Sun, Qiaoyan Wen, Hua Zhang, Zhengping Jin:
A strongly secure identity-based authenticated key agreement protocol without pairings under the GDH assumption. 3167-3179 - Panos Kampanakis, Attila Altay Yavuz:
BAFi: a practical cryptographic secure audit logging scheme for digital forensics. 3180-3190
- Gaoxiang Li, Di Wu, Junfeng Shen, Tingting Li:
Deciphering privacy leakage in microblogging social networks: a measurement study. 3191-3204
- Xiang Cheng, Sen Su, Yiping Teng, Ke Xiao:
Enabling secure and efficient kNN query processing over encrypted spatial data in the cloud. 3205-3218
- Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
A biometrics and smart cards-based authentication scheme for multi-server environments. 3219-3228 - Longqi Yang, Guyu Hu, Dong Li, Yibing Wang, Bo Jia, Zhisong Pan:
Anomaly detection based on efficient Euclidean projection. 3229-3237
- Yao Du, Xiaoqing Wang, Junfeng Wang:
A static Android malicious code detection method based on multi-source fusion. 3238-3246
- Mehdi Afsar:
A comprehensive fault-tolerant framework for wireless sensor networks. 3247-3261
- Nan Li, Yi Mu, Willy Susilo, Fuchun Guo, Vijay Varadharajan:
Vulnerabilities of an ECC-based RFID authentication scheme. 3262-3270 - Khaled Rabieh, Mohamed M. E. A. Mahmoud, Marianne Azer, Mahmoud Allam:
A secure and privacy-preserving event reporting scheme for vehicular Ad Hoc networks. 3271-3281 - Jin Cao, Maode Ma, Hui Li:
GBAAM: group-based access authentication for MTC in LTE networks. 3282-3299
Volume 8, Number 18, December 2015
- Zhe Liu, Hwajeong Seo, Qiuliang Xu:
Performance evaluation of twisted Edwards-form elliptic curve cryptography for wireless sensor nodes. 3301-3310 - Masoud Narouei, Mansour Ahmadi, Giorgio Giacinto, Hassan Takabi, Ashkan Sami:
DLLMiner: structural mining for malware detection. 3311-3322 - Yuan Chen, Qingkuan Dong:
Achieving CCA security from DCCA security more efficiently by using the KEM+DEM hybrid paradigm. 3323-3334 - Padmapriya Praveenkumar, Rengarajan Amirtharajan, Karuppuswamy Thenmozhi, John Bosco Balaguru Rayappan:
Triple chaotic image scrambling on RGB - a random image encryption approach. 3335-3345 - Qihong Yu, Jiguo Li, Yichen Zhang:
Leakage-resilient certificate-based encryption. 3346-3355 - Zheng Yang, Wu Yang, Lingyun Zhu, Daigu Zhang:
Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation. 3356-3371 - Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng:
A dynamic identity-based user authentication scheme for remote login systems. 3372-3382 - Ashok Kumar Das, Dheerendra Mishra, Sourav Mukhopadhyay:
An anonymous and secure biometric-based enterprise digital rights management system for mobile environment. 3383-3404 - Masaya Yasuda, Yuka Sugimura:
Biometric key-binding using lattice masking†. 3405-3414 - Jaydeep Howlader, Ashis Kumar Mal:
Sealed-bid auction: a cryptographic solution to bid-rigging attack in the collusive environment. 3415-3440 - Alampallam Ramaswamy Vasudevan, Subramanian Selvakumar:
Intraclass and interclass correlation coefficient-based feature selection in NIDS dataset. 3441-3458 - Sangeeta Bhattacharya, Subramanian Selvakumar:
LAWRA: a layered wrapper feature selection approach for network attack detection. 3459-3468 - Fatma Hachmi, Khadouja Boujenfa, Mohamed Limam:
An optimization process to identify outliers generated by intrusion detection systems. 3469-3480 - Tytus Kurek, Artur Lason, Marcin Niemiec:
First step towards preserving the privacy of cloud-based IDS security policies. 3481-3491 - Yung-Ting Chuang:
An adaptable and scalable membership management for the iTrust information search and retrieval system. 3492-3510 - Xianping Mao, Junzuo Lai, Kefei Chen, Jian Weng, Qixiang Mei:
Efficient revocable identity-based encryption from multilinear maps. 3511-3522 - Lei Zeng, Yang Xiao, Hui Chen:
Auditing overhead, auditing adaptation, and benchmark evaluation in Linux. 3523-3534 - Lei Zheng, Shao-Wu Zhang:
FFT-based multidimensional linear attack on PRESENT using the 2-bit-fixed characteristic. 3535-3545 - Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim:
Optimized Karatsuba squaring on 8-bit AVR processors. 3546-3554 - Devrim Sipahi, Gökhan Dalkiliç, Mehmet Hilal Özcanhan:
Detecting spam through their Sender Policy Framework records. 3555-3563 - Mickaël Cazorla, Sylvain Gourgeon, Kevin Marquet, Marine Minier:
Survey and benchmark of lightweight block ciphers for MSP430 16-bit microcontroller. 3564-3579 - Guanglu Yan, Senlin Luo, Fan Feng, Limin Pan, Qamas Gul Khan Safi:
MOSKG: countering kernel rootkits with a secure paging mechanism. 3580-3591 - Zhenhua Chen, Shundong Li, Youwen Zhu, Jianhua Yan, Xinli Xu:
A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem. 3592-3601 - Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Colin Boyd:
Identity-based proxy signatures: a generic construction and a concrete scheme from RSA. 3602-3614 - Vandana Guleria, Ratna Dutta:
Universally composable issuer-free adaptive oblivious transfer with access policy. 3615-3633 - Ilija Basicevic, Stanislav Ocovaj, Miroslav Popovic:
Use of Tsallis entropy in detection of SYN flood DoS attacks. 3634-3640 - Feng Tian, Xiaolin Gui, Jian An, Pan Yang, Xuejun Zhang, Jianqiang Zhao:
A DCT-based privacy-preserving approach for efficient data mining. 3641-3652 - Feng Wang, You-sheng Zhou, Dao-feng Li:
Dynamic threshold changeable multi-policy secret sharing scheme. 3653-3658 - Xiaoling Huang, Guodong Ye, Huajin Chai, Ou Xie:
Compression and encryption for remote sensing image using chaotic system. 3659-3666 - Ting Chen, Xiaodong Lin, Jin Huang, Abel Bacchus, Xiaosong Zhang:
An empirical investigation into path divergences for concolic execution using CREST. 3667-3681 - Sedat Akleylek, Baris Bülent Kirlar:
New methods for public key cryptosystems based on XTR. 3682-3689 - Yilei Wang, Duncan S. Wong, Willy Susilo, Xiaofeng Chen, Qiuliang Xu:
Achieving fairness by sequential equilibrium in rational two-party computation under incomplete information. 3690-3700 - Ali Kanso, Mohammad Ghebleh, Hassan Noura:
A variant of Baptista's encryption scheme. 3701-3712 - Tung-Tso Tsai, Yuh-Min Tseng, Sen-Shan Huang:
Efficient revocable certificateless public key encryption with a delegated revocation authority. 3713-3725 - Payingat Jilna, Deepthi P. Pattathil:
A key management technique based on elliptic curves for static wireless sensor networks. 3726-3738 - Pawel Szalachowski, Tiffany Hyun-Jin Kim:
Secure broadcast in distributed networks with strong adversaries. 3739-3750 - Jianhua Yan, Licheng Wang, Mianxiong Dong, Yixian Yang, Wenbin Yao:
Identity-based signcryption from lattices. 3751-3770 - Xueli Huang, Xiaojiang Du:
Achieving data privacy on hybrid cloud. 3771-3781 - Shehzad Ashraf Chaudhry, Mohammad Sabzinejad Farash, Husnain Naqvi, Saru Kumari, Muhammad Khurram Khan:
An enhanced privacy preserving remote user authentication scheme with provable security. 3782-3795 - Mingming Jiang, Yupu Hu, Baocang Wang, F. H. Wang, Qiqi Lai:
Lattice-based multi-use unidirectional proxy re-encryption. 3796-3803 - Artur Janicki, Wojciech Mazurczyk, Krzysztof Szczypiorski:
On the undetectability of transcoding steganography. 3804-3814 - Mehmet Simsek:
A new metric for flow-level filtering of low-rate DDoS attacks. 3815-3825 - Malek Al-Zewairi, Ja'far Alqatawna, Jalal Atoum:
Risk adaptive hybrid RFID access control system. 3826-3835 - Jan Hajny, Petr Dzurenda, Lukas Malina:
Attribute-based credentials with cryptographic collusion prevention. 3836-3846 - Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Abdulhameed Alelaiwi:
A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof. 3847-3863 - Chuan-Gang Liu, I-Hsien Liu, Wun-Sheng Yao, Jung-Shian Li:
K-anonymity against neighborhood attacks in weighted social networks. 3864-3882 - Weizhi Meng, Wenjuan Li, Lam-for Kwok:
Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detection. 3883-3895 - Zhenbin Zhang, Liji Wu, An Wang, Zhaoli Mu, Xiangmin Zhang:
A novel bit scalable leakage model based on genetic algorithm. 3896-3905 - Runhua Shi, Hong Zhong, Jie Cui, Shun Zhang:
A novel one-to-many and many-to-one asymmetric encryption model and its algorithms. 3906-3913 - Reena Singh, Timothy A. Gonsalves:
A pragmatic approach towards secure sharing of digital objects. 3914-3926 - Jiyoung Shin, S. Kancharlapalli, Michael Farcasin, Eric Chan-Tin:
SmartPass: a smarter geolocation-based authentication scheme. 3927-3938 - Tzonelih Hwang, Prosanta Gope:
IAR-CTR and IAR-CFB: integrity aware real-time based counter and cipher feedback modes. 3939-3952 - Tiago Cruz, Paulo Simões, Edmundo Monteiro, Fernando Bastos, Alexandre Laranjeira:
Cooperative security management for broadband network environments. 3953-3977 - Victor Sucasas, Saud Althunibat, Ayman Radwan, Hugo Marques, Jonathan Rodriguez, Seiamak Vahid, Rahim Tafazolli, Fabrizio Granelli:
Lightweight security against combined IE and SSDF attacks in cooperative spectrum sensing for cognitive radio networks. 3978-3994 - Rabih Al Nachar, Elie Inaty, Patrick J. Bonnin, Yasser Alayli:
Breaking down Captcha using edge corners and fuzzy logic segmentation/recognition technique. 3995-4012 - Kee Sung Kim, Ik Rae Jeong:
Efficient verifiable data streaming. 4013-4018 - K. K. Soundra Pandian, Kailash Chandra Ray:
Non-singular sequence folding-based pseudorandom key generation algorithm for cryptographic processor. 4019-4027 - Mete Akgün, Ali Osman Bayrak, Mehmet Ufuk Çaglayan:
Attacks and improvements to chaotic map-based RFID authentication protocol. 4028-4040 - Sohail Abbas, Madjid Merabti, David Llewellyn-Jones:
On the evaluation of reputation and trust-based schemes in mobile ad hoc networks. 4041-4052 - Chi Cheng, Tao Jiang, Yining Liu, Mingwu Zhang:
Security analysis of a homomorphic signature scheme for network coding. 4053-4060 - Subhadeep Banik, Sonu Jha:
Some security results of the RC4+ stream cipher. 4061-4072 - Lvchen Cao, Yuling Luo, Jinjie Bi, Senhui Qiu, Zhenkun Lu, Jim Harkin, Liam McDaid:
An authentication strategy based on spatiotemporal chaos for software copyright protection. 4073-4086 - Lintao Li, Jianping An, Zhongyong Wang, Xiangming Li:
Under-sampling spectrum-sparse signals based on active aliasing for low probability detection. 4087-4097 - Qi Li, Jianfeng Ma, Rui Li, Jinbo Xiong, Ximeng Liu:
Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption. 4098-4109 - Hossein Jadidoleslamy:
TMS-HCW: a trust management system in hierarchical clustered wireless sensor networks. 4110-4122 - Mehmet Sabir Kiraz, Ziya Alper Genç, Süleyman Kardas:
Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer. 4123-4135 - Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards. 4136-4156 - Y. Sreenivasa Rao, Ratna Dutta:
Fully secure bandwidth-efficient anonymous ciphertext-policy attribute-based encryption. 4157-4176 - Louis Sibomana, Hung Tran, Quang Anh Tran:
Impact of secondary user communication on security communication of primary user. 4177-4190 - Zheng Yang:
On constructing practical multi-recipient key-encapsulation with short ciphertext and public key. 4191-4202 - Nerijus Paulauskas, Azuolas Faustas Bagdonas:
Local outlier factor use for the network flow anomaly detection. 4203-4212 - Xiao Fu, Xiaojiang Du, Bin Luo:
Data correlation-based analysis methods for automatic memory forensic. 4213-4226 - Sami Zhioua:
The web browser factor in traffic analysis attacks. 4227-4241 - Jayapalan Avila, Karuppusamy Thenmozhi:
Authentication scheme to combat a primary user emulation attack against cognitive radio users. 4242-4253 - Laura Gheorghe, Bogdan Marin, Gary Gibson, Lucian Mogosanu, Razvan Deaconescu, Valentin-Gabriel Voiculescu, Mihai Carabas:
Smart malware detection on Android. 4254-4272 - Xin Su, Dafang Zhang, Wenjia Li, Xiaofei Wang:
AndroGenerator: An automated and configurable android app network traffic generation system. 4273-4288 - N. Renugadevi, C. Mala:
Pruned nodes in ternary key tree during batch rekeying in group key agreement for cognitive radio ad hoc networks. 4289-4307 - Songyang Wu, Yong Zhang:
Secure cloud storage using anonymous and blackbox traceable data access control. 4308-4318 - SK Hafizul Islam, Mohammad S. Obaidat:
Design of provably secure and efficient certificateless blind signature scheme using bilinear pairing. 4319-4332 - Mayssaa El Rifai, Kam Wai Clifford Chan, Pramode K. Verma:
Multi-stage quantum secure communication using polarization hopping. 4333-4342 - Milad Jafari Barani, Peyman Ayubi, Fooad Jalili, Milad Yousefi Valandar, Ehsan Azariyun:
Image forgery detection in contourlet transform domain based on new chaotic cellular automata. 4343-4361 - Hassen Sallay, Sami Bourouis:
Intrusion detection alert management for high-speed networks: current researches and applications. 4362-4372 - Nasr addin Ahmed Salem Al-maweri, Wan Azizun Wan Adnan, Abdul Rahman Ramli, Khairulmizam Samsudin, Sharifah Mumtazah Syed Ahmad:
A hybrid digital image watermarking algorithm based on DCT-DWT and auto-thresholding. 4373-4395 - Mir Alireza Hakamian, Amir Masoud Rahmani:
Evaluation of isolation in virtual machine environments encounter in effective attacks against memory. 4396-4406
- Danfeng Yan, Yuan Tian, Fangchun Yang:
Privacy-preserving authorization method for mashups. 4421-4435 - Intesab Hussain, Soufiene Djahel, Zonghua Zhang, Farid Naït-Abdesselam:
A comprehensive study of flooding attack consequences and countermeasures in Session Initiation Protocol (SIP). 4436-4451
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.