


default search action
Computers & Electrical Engineering, Volume 59
Volume 59, April 2017
- Zehua Lyu, Xuping Tu, Xiaobing Pei, Hu Liang, Mudar Sarem:

Netlet: A simple and versatile network middleware for peer-to-peer application program. 1-14 - Tallha Akram

, Syed Rameez Naqvi, Sajjad Ali Haider, Muhammad Kamran:
Towards real-time crops surveillance for disease classification: exploiting parallelism in computer vision. 15-26 - R. Muthumeenakshi, T. R. Reshmi, Krishnan Murugan

:
Extended 3PAKE authentication scheme for value-added services in VANETs. 27-38 - A. Karthikeyan

, P. Senthil Kumar:
Randomly prioritized buffer-less routing architecture for 3D Network on Chip. 39-50 - Bander A. Alzahrani:

Secure and scalable control plane for intra-domain publish-subscribe communication. 51-62 - Fatih Basçiftçi

, Ayse Eldem
:
A third eye with human-computer interaction for the visually impaired. 63-72
- Joaquín García

, Gregorio Martínez Pérez:
Introduction to the Special Section on Critical Systems Modelling and Security. 73-75 - Fu-Hau Hsu, Chuan-Sheng Wang, Yu-Liang Hsu, Yung-Pin Cheng, Yu-Hsiang Hsneh:

A client-side detection mechanism for evil twins. 76-85 - Giuseppe Bernieri

, Estefanía Etchevés Miciolino
, Federica Pascucci
, Roberto Setola:
Monitoring system reaction in cyber-physical testbed under cyber-attacks. 86-98 - Saiful Azad

, Musfiq Rahman
, M. S. A. Noman Ranak, B. M. F. Kamal Ruhee, N. Nourin Nisa, Nazrul Kabir, Arafatur Rahman
, Jasni Mohamad Zain
:
VAP code: A secure graphical password for smart devices. 99-109 - P. Varalakshmi, T. Judgi:

Multifaceted trust management framework based on a trust level agreement in a collaborative cloud. 110-125 - Luigi Coppolino

, Salvatore D'Antonio, Giovanni Mazzeo
, Luigi Romano:
Cloud security: Emerging threats and current solutions. 126-140 - Carlos André Batista de Carvalho, Rossana Maria de Castro Andrade

, Miguel Franklin de Castro
, Emanuel Ferreira Coutinho, Nazim Agoulmine:
State of the art and challenges of security SLA for cloud computing. 141-152 - Qin Liu, Guojun Wang, Xuhui Liu, Tao Peng, Jie Wu:

Achieving reliable and secure services in cloud computing environments. 153-164 - Gaurav Somani

, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Muttukrishnan Rajarajan:
DDoS victim service containment to minimize the internal collateral damages in cloud computing. 165-179 - Ming-Yang Su:

Applying episode mining and pruning to identify malicious online attacks. 180-188 - M. R. Gauthama Raman

, Kirthivasan Kannan, V. S. Shankar Sriram
:
Development of Rough Set - Hypergraph Technique for Key Feature Identification in Intrusion Detection Systems. 189-200
- Abhishek Parakh, Zhiwei Wang:

Introduction to the Special Section on Challenges and Solutions in Mobile Systems Security. 201-203 - Yu-Yi Chen, Meng-Lin Tsai

, Fong-Jia Chang:
The design of secure mobile coupon mechanism with the implementation for NFC smartphones. 204-217 - Qi Xie

, Zhixiong Tang, Kefei Chen:
Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks. 218-230 - G. Usha, M. Rajesh Babu, S. Saravana Kumar

:
Dynamic anomaly detection using cross layer security in MANET. 231-241 - Shyamala Ramachandran

, Valli Shanmugam:
A two way authentication using bilinear mapping function for wireless sensor networks. 242-249 - Chia-Hui Liu

, Yu-Fang Chung
:
Secure user authentication scheme for wireless healthcare sensor networks. 250-261 - Xianji Jin, Jianquan Liang, Weiming Tong, Lei Lu, Zhongwei Li:

Multi-agent trust-based intrusion detection scheme for wireless sensor networks. 262-273 - Selva Reegan A., E. Baburaj:

Polynomial and multivariate mapping-based triple-key approach for secure key distribution in wireless sensor networks. 274-290 - Yousheng Zhou

, Feng Wang, Fei Tang, Xiaojun Wang
:
Cellular automata based secure distributed storage scheme with integrity proof. 291-304 - Trupil Limbasiya

, Nishant Doshi
:
An analytical study of biometric based remote user authentication schemes using smart cards. 305-321

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














