


default search action
Security and Communication Networks, Volume 2017
Volume 2017, 2017
- Andronicus Ayobami Akinyelu

, Aderemi Oluyinka Adewumi
:
Improved Instance Selection Methods for Support Vector Machine Speed Optimization. 6790975:1-6790975:11 - Dapeng Man

, Wu Yang
, Shichang Xuan
, Xiaojiang Du:
Thwarting Nonintrusive Occupancy Detection Attacks from Smart Meters. 5350201:1-5350201:9 - Jiguo Li

, Fengjie Sha, Yichen Zhang, Xinyi Huang, Jian Shen
:
Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length. 3596205:1-3596205:11 - Ankit Kumar Jain

, Brij B. Gupta
:
Phishing Detection: Analysis of Visual Similarity Based Approaches. 5421046:1-5421046:20 - Ying-Hao Hung, Yuh-Min Tseng

, Sen-Shan Huang:
Revocable ID-Based Signature with Short Size over Lattices. 7571201:1-7571201:9 - Naveed Ahmed Azam

:
A Novel Fuzzy Encryption Technique Based on Multiple Right Translated AES Gray S-Boxes and Phase Embedding. 5790189:1-5790189:9 - Dhanalakshmi Krishnan Sadhasivan

, Kannapiran Balasubramanian
:
A Fusion of Multiagent Functionalities for Effective Intrusion Detection System. 6216078:1-6216078:15 - Hongyan Cui

, Xiaofei Liu, Tao Yu, Honggang Zhang, Yajun Fang, Zong-Guo Xia:
Cloud Service Scheduling Algorithm Research and Optimization. 2503153:1-2503153:7 - Je Sen Teh

, Azman Samsudin
:
A Chaos-Based Authenticated Cipher with Associated Data. 9040518:1-9040518:15 - Chalee Vorakulpipat

, Soontorn Sirapaisan, Ekkachan Rattanalerdnusorn, Visut Savangsuk:
A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives. 2057260:1-2057260:11 - Yuan-Yu Tsai

, Tsung-Chieh Cheng, Yao-Hsien Huang
:
A Low-Complexity Region-Based Authentication Algorithm for 3D Polygonal Models. 1096463:1-1096463:11 - Nishaal J. Parmar

, Pramode K. Verma:
A Comparative Evaluation of Algorithms in the Implementation of an Ultra-Secure Router-to-Router Key Exchange System. 1467614:1-1467614:7 - Jeyamala Chandrasekaran

, S. J. Thiruvengadam
:
A Hybrid Chaotic and Number Theoretic Approach for Securing DICOM Images. 6729896:1-6729896:12 - Gautam Kumar

, Hemraj Saini
:
Novel Noncommutative Cryptography Scheme Using Extra Special Group. 9036382:1-9036382:21 - Hector Santoyo-Garcia, Eduardo Fragoso-Navarro

, Rogelio Reyes-Reyes
, Clara Cruz-Ramos
, Mariko Nakano-Miyatake
:
Visible Watermarking Technique Based on Human Visual System for Single Sensor Digital Cameras. 7903198:1-7903198:18 - Murat Dener

, Ömer Faruk Bay:
Practical Implementation of an Adaptive Detection-Defense Unit against Link Layer DoS Attacks for Wireless Sensor Networks. 1531928:1-1531928:9 - Mahalakshmi Gunasekaran

, Subathra Periakaruppan:
GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack Detection in WSN. 9863032:1-9863032:10 - Probidita Roychoudhury

, Basav Roychoudhury
, Dilip Kumar Saikia:
Hierarchical Group Based Mutual Authentication and Key Agreement for Machine Type Communication in LTE and Future 5G Networks. 1701243:1-1701243:21 - Mervat Mikhail

, Yasmine Abouelseoud
, Galal A. Elkobrosy:
Two-Phase Image Encryption Scheme Based on FFCT and Fractals. 7367518:1-7367518:13 - Yiqin Lu

, Meng Wang
, Pengsen Huang:
An SDN-Based Authentication Mechanism for Securing Neighbor Discovery Protocol in IPv6. 5838657:1-5838657:9 - Xiaoming Hu

, WenAn Tan, Huajie Xu, Jian Wang, Chuang Ma:
Strong Designated Verifier Signature Schemes with Undeniable Property and Their Applications. 7921782:1-7921782:9 - Seunghwan Chang, Hyang-Sook Lee, Juhee Lee

, Seongan Lim
:
Security Analysis of a Certificateless Signature from Lattices. 3413567:1-3413567:7 - Emir Husni

:
Dynamic Rule Encryption for Mobile Payment. 4975302:1-4975302:11 - Dongmin Kim, Ik Rae Jeong

:
Certificateless Public Auditing Protocol with Constant Verification Time. 6758618:1-6758618:14 - Ahmad Samer Wazan

, Romain Laborde
, David W. Chadwick
, François Barrère, Abdelmalek Benzekri, Mustafa Kaiiali
, Adib Habbal
:
Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker. 6907146:1-6907146:23 - Mirko Köhler

, Ivica Lukic, Visnja Krizanovic Cik
:
Protecting Information with Subcodstanography. 9130683:1-9130683:13 - Trong-Minh Hoang

, Van-Kien Bui, Thanh-Tra Nguyen:
The Performance Evaluation of an IEEE 802.11 Network Containing Misbehavior Nodes under Different Backoff Algorithms. 2459780:1-2459780:8 - Asish Kumar Dalai

, Sanjay Kumar Jena:
Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications. 3825373:1-3825373:12 - Mohammad Ali Nematollahi

, Chalee Vorakulpipat
, Hamurabi Gamboa-Rosales
:
Optimization of a Blind Speech Watermarking Technique against Amplitude Scaling. 5454768:1-5454768:13 - Chien-Hua Tsai

, Pin-Chang Su:
An ECC-Based Blind Signcryption Scheme for Multiple Digital Documents. 8981606:1-8981606:14 - Zheng Zhao

, Fenlin Liu
, Daofu Gong
:
An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks. 1560594:1-1560594:12 - Anier Soria-Lorente

, Stefan Berres
:
A Secure Steganographic Algorithm Based on Frequency Domain for the Transmission of Hidden Information. 5397082:1-5397082:14 - Guoyong Han, Wenying Zhang

:
Improved Biclique Cryptanalysis of the Lightweight Block Cipher Piccolo. 7589306:1-7589306:12 - Xingchun Yang

, Chunxiang Xu, Chao Rong Li:
A Privacy Model for RFID Tag Ownership Transfer. 5084636:1-5084636:10 - Peng Li

, Xiaotian Yu
, He Xu
, Jiewei Qian, Lu Dong
, Huqing Nie
:
Research on Secure Localization Model Based on Trust Valuation in Wireless Sensor Networks. 6102780:1-6102780:12 - Xiaoye Li

, Jing Yang
, Zhenlong Sun
, Jianpei Zhang
:
Differential Privacy for Edge Weights in Social Networks. 4267921:1-4267921:10 - Qingqing Gan

, Xiaoming Wang
, Daini Wu
:
Revocable Key-Aggregate Cryptosystem for Data Sharing in Cloud. 2508693:1-2508693:11 - Vennila Ganesan

, M. S. K. Manikandan:
A Secured Load Mitigation and Distribution Scheme for Securing SIP Server. 7821487:1-7821487:14 - Jingyu Hua, An Tang, Qingyun Pan, Kim-Kwang Raymond Choo, Hong Ding

, Yizhi Ren
:
Practical m-k-Anonymization for Collaborative Data Publishing without Trusted Third Party. 9532163:1-9532163:10 - Khairan D. Rajab

:
New Hybrid Features Selection Method: A Case Study on Websites Phishing. 9838169:1-9838169:10 - Lan Liu

, Ryan K. L. Ko
, Guangming Ren, Xiaoping Xu:
Malware Propagation and Prevention Model for Time-Varying Community Networks within Software Defined Networks. 2910310:1-2910310:8 - Sang-Pil Kim, Myeong-Sun Gil, Hajin Kim, Mi-Jung Choi

, Yang-Sae Moon
, Hee-Sun Won:
Efficient Two-Step Protocol and Its Discriminative Feature Selections in Secure Similar Document Detection. 6841216:1-6841216:12 - Dina Shehada

, Chan Yeob Yeun
, M. Jamal Zemerly
, Mahmoud Al-Qutayri, Yousof Al-Hammadi
, Ernesto Damiani
, Jiankun Hu
:
BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications. 3606424:1-3606424:18 - Mohammed Abdulridha Hussain

, Hai Jin
, Zaid Alaa Hussien
, Zaid Ameen Abduljabbar
, Salah H. Abbdal, Ayad Ibrahim:
Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing. 9479476:1-9479476:15 - Jianxin Xu

, Dongqin Feng
:
Identification of ICS Security Risks toward the Analysis of Packet Interaction Characteristics Using State Sequence Matching Based on SF-FSM. 2430835:1-2430835:17 - An Wang, Yu Zhang, Liehuang Zhu

, Weina Tian, Rixin Xu, Guoshuang Zhang:
RFA: R-Squared Fitting Analysis Model for Power Attack. 5098626:1-5098626:8 - Ju-Min Zhao

, Ding Feng, Deng-ao Li, Wei Gong, Haoxiang Liu, Shimin Huo:
Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems. 8356983:1-8356983:9 - Lichen Zhang

, Yingshu Li
, Liang Wang
, Junling Lu
, Peng Li
, Xiaoming Wang
:
An Efficient Context-Aware Privacy Preserving Approach for Smartphones. 4842694:1-4842694:11 - Pan Yang

, Xiaolin Gui
, Jian An, Feng Tian
:
An Efficient Secret Key Homomorphic Encryption Used in Image Processing Service. 7695751:1-7695751:11 - Yanping Xu

, Chunhua Wu
, Kangfeng Zheng, Xu Wang
, Xinxin Niu, Tianliang Lu:
Computing Adaptive Feature Weights with PSO to Improve Android Malware Detection. 3284080:1-3284080:14 - Shihong Zou

, Yanhong Xu, Honggang Wang
, Zhouzhou Li, Shanzhi Chen, Bo Hu:
A Survey on Secure Wireless Body Area Networks. 3721234:1-3721234:9 - Jiaye Pan

, Yi Zhuang
:
PMCAP: A Threat Model of Process Memory Data on the Windows Operating System. 4621587:1-4621587:15 - Mansour Alsaleh

, Noura Alomar
, Monirah Alshreef, Abdulrahman Alarifi, AbdulMalik S. Al-Salman
:
Performance-Based Comparative Assessment of Open Source Web Vulnerability Scanners. 6158107:1-6158107:14 - Xin Liu

, Shundong Li
, Xiubo Chen, Gang Xu, Xiaolin Zhang, Yong Zhou:
Efficient Solutions to Two-Party and Multiparty Millionaires' Problem. 5207386:1-5207386:11 - Pieter Robyns

, Bram Bonné
, Peter Quax
, Wim Lamotte
:
Noncooperative 802.11 MAC Layer Fingerprinting and Tracking of Mobile Devices. 6235484:1-6235484:21 - Hung-Yu Chien

:
Group Authentication with Multiple Trials and Multiple Authentications. 3109624:1-3109624:7 - Changsheng Wan

, Juan Zhang, Daoli Huang:
SCPR: Secure Crowdsourcing-Based Parking Reservation System. 1076419:1-1076419:9 - Zuochao Dou

, Issa Khalil
, Abdallah Khreishah
:
CLAS: A Novel Communications Latency Based Authentication Scheme. 4286903:1-4286903:20 - Huiting Fan

, Kai Xing
, Lei Tan, Weikang Rui, Zhonghu Xu
, Shuo Zhang, Jing Xu
:
Privacy Preserved Self-Awareness on the Community via Crowd Sensing. 8026787:1-8026787:8 - Waqas Ahmed Imtiaz

, Affaq Qamar
, Atiq ur Rehman, Haider Ali, Adnan Rashid Chaudhry
, Javed Iqbal
:
Design and Analysis of Self-Healing Tree-Based Hybrid Spectral Amplitude Coding OCDMA System. 2524513:1-2524513:12 - Juha Partala

:
Semantically Secure Symmetric Encryption with Error Correction for Distributed Storage. 4321296:1-4321296:10 - Hao Hu

, Hongqi Zhang, Yuling Liu, Yongwei Wang:
Quantitative Method for Network Security Situation Based on Attack Prediction. 3407642:1-3407642:19 - Bingxin Zhu, Puwen Wei

, Mingqiang Wang
:
Adaptive Security of Broadcast Encryption, Revisited. 1404279:1-1404279:16 - Ran Ji

, Jian Wang
, Chaojing Tang, Ruilin Li:
Automatic Reverse Engineering of Private Flight Control Protocols of UAVs. 1308045:1-1308045:9 - Miguel Seijo Simó

, Gregorio López López
, José Ignacio Moreno
:
Cybersecurity Vulnerability Analysis of the PLC PRIME Standard. 7369684:1-7369684:18 - Yuan Ping

, Baocang Wang
, Yuehua Yang, Shengli Tian:
Building Secure Public Key Encryption Scheme from Hidden Field Equations. 9289410:1-9289410:6 - Kai Fan

, Panfei Song, Zhao Du, Haojin Zhu
, Hui Li, Yintang Yang, Xinghua Li, Chao Yang:
NFC Secure Payment and Verification Scheme with CS E-Ticket. 4796373:1-4796373:9 - Xiangyang Zhu

, Hua Dai
, Xun Yi, Geng Yang
, Xiao Li:
MUSE: An Efficient and Accurate Verifiable Privacy-Preserving Multikeyword Text Search over Encrypted Cloud Data. 1923476:1-1923476:17 - Chenyu Wang

, Guoai Xu:
Cryptanalysis of Three Password-Based Remote User Authentication Schemes with Non-Tamper-Resistant Smart Card. 1619741:1-1619741:14 - Song Li, Jie Cui

, Hong Zhong, Yiwen Zhang, Qiang He:
LEPA: A Lightweight and Efficient Public Auditing Scheme for Cloud-Assisted Wireless Body Sensor Networks. 4364376:1-4364376:16 - Guomin Zhou, Peng Zeng, Xiaohui Yuan

, Siyuan Chen, Kim-Kwang Raymond Choo:
An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model. 1915239:1-1915239:7 - Caixue Zhou

, Zhiqiang Zhao
, Wan Zhou
, Yuan Mei
:
Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings. 8405879:1-8405879:17 - Anita Pradhan

, Kolla Raja Sekhar, Gandharba Swain
:
Adaptive PVD Steganography Using Horizontal, Vertical, and Diagonal Edges in Six-Pixel Blocks. 1924618:1-1924618:13 - Qinlong Huang

, Licheng Wang
, Yixian Yang:
Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities. 6426495:1-6426495:12 - Yi Liang, Zhipeng Cai

, Qilong Han
, Yingshu Li
:
Location Privacy Leakage through Sensory Data. 7576307:1-7576307:12 - Rameez Asif

, William J. Buchanan
:
Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment. 7616847:1-7616847:10 - Chun-Juan Ouyang

, Ming Leng, Jie-wu Xia, Huan Liu
:
Vague Sets Security Measure for Steganographic System Based on High-Order Markov Model. 1790268:1-1790268:13 - Jingxuan Wang

, Lucas C. K. Hui, Siu-Ming Yiu, Gang Zhou, Ruoqing Zhang:
F-DDIA: A Framework for Detecting Data Injection Attacks in Nonlinear Cyber-Physical Systems. 9602357:1-9602357:12 - Chao Yuan

, Mixue Xu, Xueming Si:
Research on a New Signature Scheme on Blockchain. 4746586:1-4746586:10 - Ruhul Amin

, SK Hafizul Islam
, Muhammad Khurram Khan
, Arijit Karati
, Debasis Giri
, Saru Kumari
:
A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments. 5989151:1-5989151:15 - Zhihua Li

, Ziyuan Li, Ning Yu, Steven Wen:
Locality-Based Visual Outlier Detection Algorithm for Time Series. 1869787:1-1869787:10 - Jiajun Shen

, Dongqin Feng
:
Stackelberg Interdependent Security Game in Distributed and Hierarchical Cyber-Physical Systems. 9017039:1-9017039:19 - Geovandro C. C. F. Pereira

, Renan C. A. Alves
, Felipe Leno da Silva
, Roberto M. Azevedo
, Bruno C. Albertini
, Cíntia B. Margi
:
Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems. 2046735:1-2046735:16 - Sufang Zhou, Shundong Li

, Jiawei Dou, Yaling Geng, Xin Liu
:
Efficient Secure Multiparty Subset Computation. 9717580:1-9717580:11 - Xin Wang

, Dafang Zhang
, Xin Su
, Wenjia Li:
Mlifdect: Android Malware Detection Based on Parallel Machine Learning and Information Fusion. 6451260:1-6451260:14 - Yiyuan Luo

, Xuejia Lai:
Improvements for Finding Impossible Differentials of Block Cipher Structures. 5980251:1-5980251:9 - Lein Harn, Ching-Fang Hsu

:
A Novel Design of Membership Authentication and Group Key Establishment Protocol. 8547876:1-8547876:7 - Yu Liu, Huicong Liang, Wei Wang

, Meiqin Wang
:
New Linear Cryptanalysis of Chinese Commercial Block Cipher Standard SM4. 1461520:1-1461520:10 - Rong Ma

, Zhenfu Cao
, Xingkai Wang:
Efficient Asymmetric Index Encapsulation Scheme for Anonymous Content Centric Networking. 9248654:1-9248654:9 - Gang Han, Yu Yu

, Xiangxue Li
, Qifeng Zhou, Dong Zheng
, Hui Li:
1-Resilient Boolean Functions on Even Variables with Almost Perfect Algebraic Immunity. 6268230:1-6268230:9 - Hongji Huang, Wanyou Sun, Jie Yang, Guan Gui

:
Relay Selections for Security and Reliability in Mobile Communication Networks over Nakagami-m Fading Channels. 2569239:1-2569239:8 - Jiankuo Dong

, Fangyu Zheng
, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, Yuan Zhao:
Utilizing the Double-Precision Floating-Point Computing Power of GPUs for RSA Acceleration. 3508786:1-3508786:15 - Donghui Hu

, Zhongjin Ma, Xiaotian Zhang, Peipei Li, Dengpan Ye, Baohong Ling:
The Concept Drift Problem in Android Malware Detection and Its Solution. 4956386:1-4956386:13 - Lukasz Krzywiecki

, Tomasz Wlislocki
:
Deniable Key Establishment Resistance against eKCI Attacks. 7810352:1-7810352:13 - Han Yan

, Xiang Cheng, Sen Su
, Siyao Zhang:
Authenticated Location-Aware Publish/Subscribe Services in Untrusted Outsourced Environments. 4215425:1-4215425:15 - Vitor Hugo Galhardo Moia

, Marco Aurélio Amaral Henriques
:
Similarity Digest Search: A Survey and Comparative Analysis of Strategies to Perform Known File Filtering Using Approximate Matching. 1306802:1-1306802:17 - Lein Harn, Ching-Fang Hsu

, Zhe Xia, Junwei Zhou
:
How to Share Secret Efficiently over Networks. 5437403:1-5437403:6 - Jongho Moon

, Youngsook Lee
, Jiye Kim, Dongho Won
:
Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User. 1378128:1-1378128:13 - Nurmamat Helil

, Kaysar Rahman:
CP-ABE Access Control Scheme for Sensitive Data Set Constraint with Hidden Access Policy and Constraint Policy. 2713595:1-2713595:13 - Xiaojuan Zhang

, Xiutao Feng, Dongdai Lin:
Fault Attack on the Authenticated Cipher ACORN v2. 3834685:1-3834685:16 - Lu Zhou

, Mingchao Liao
, Cao Yuan
, Haoyu Zhang
:
Low-Rate DDoS Attack Detection Using Expectation of Packet Size. 3691629:1-3691629:14 - Iván García-Magariño

, Raquel Lacuesta
:
ABS-TrustSDN: An Agent-Based Simulator of Trust Strategies in Software-Defined Networks. 8575842:1-8575842:9 - Yanli Ren

, Min Dong, Zhihua Niu, Xiaoni Du:
Noninteractive Verifiable Outsourcing Algorithm for Bilinear Pairing with Improved Checkability. 4892814:1-4892814:9 - Peipei Wang

, Yun Cao, Xianfeng Zhao
:
Segmentation Based Video Steganalysis to Detect Motion Vector Modification. 8051389:1-8051389:12 - Yuan Shi

, Huanguo Zhang, Juan Wang
, Feng Xiao, Jianwei Huang, Daochen Zha, Hongxin Hu, Fei Yan, Bo Zhao:
CHAOS: An SDN-Based Moving Target Defense System. 3659167:1-3659167:11 - Guomin Zhou, Peng Zeng, Xiaohui Yuan

, Siyuan Chen, Kim-Kwang Raymond Choo:
Erratum to "An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model". 2041842:1 - Rafal Kozik

, Michal Choras:
Pattern Extraction Algorithm for NetFlow-Based Botnet Activities Detection. 6047053:1-6047053:10 - Jie Zhang

, Jie Chen, Aijun Ge
, Chuangui Ma:
Shorter Decentralized Attribute-Based Encryption via Extended Dual System Groups. 7323158:1-7323158:19 - Fusheng Wu

, Huanguo Zhang
, Wengqing Wang, Jianwei Jia, Shi Yuan
:
A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace. 7042835:1-7042835:15 - Mahmoud Khasawneh

, Anjali Agarwal:
A Collaborative Approach for Monitoring Nodes Behavior during Spectrum Sensing to Mitigate Multiple Attacks in Cognitive Radio Networks. 3261058:1-3261058:16 - Elena Pagnin

, Aikaterini Mitrokotsa
:
Privacy-Preserving Biometric Authentication: Challenges and Directions. 7129505:1-7129505:9 - Tomasz Andrysiak

, Lukasz Saganowski
, Piotr Kiedrowski
:
Predictive Abuse Detection for a PLC Smart Lighting Network Based on Automatically Created Models of Exponential Smoothing. 7892182:1-7892182:19 - Long Nguyen-Vu

, Ngoc-Tu Chau
, Seongeun Kang, Souhwan Jung
:
Android Rooting: An Arms Race between Evasion and Detection. 4121765:1-4121765:13 - Guoyin Zhang, Liang Kou, Liguo Zhang, Chao Liu, Qingan Da, Jianguo Sun

:
A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT. 3126010:1-3126010:12 - Jian Mao, Wenqian Tian

, Yan Zhang, Jian Cui, Hanjun Ma
, Jingdong Bian, Jianwei Liu, Jianhong Zhang
:
Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment. 2948025:1-2948025:13 - Ivan Vaccari

, Enrico Cambiaso
, Maurizio Aiello
:
Remotely Exploiting AT Command Attacks on ZigBee Networks. 1723658:1-1723658:9 - Mohamed Amine Ferrag

, Leandros A. Maglaras
, Helge Janicke
, Jianmin Jiang, Lei Shu
:
Authentication Protocols for Internet of Things: A Comprehensive Survey. 6562953:1-6562953:41 - Chao Yuan

, Mixue Xu, Xueming Si:
Corrigendum to "Research on a New Signature Scheme on Blockchain". 8295275:1 - Rabia Riaz

, Tae-Sun Chung
, Sanam Shahla Rizvi
, Nazish Yaqub:
BAS: The Biphase Authentication Scheme for Wireless Sensor Networks. 7041381:1-7041381:10 - Muhammad Hilmi Kamarudin

, Carsten Maple, Tim Watson, Nader Sohrabi Safa
:
A New Unified Intrusion Anomaly Detection in Identifying Unseen Web Attacks. 2539034:1-2539034:18 - Li Kuang

, Yin Wang
, Pengju Ma, Long Yu, Chuanbin Li, Lan Huang, Mengyao Zhu
:
An Improved Privacy-Preserving Framework for Location-Based Services Based on Double Cloaking Regions with Supplementary Information Constraints. 7495974:1-7495974:15 - Xiaolong Xu

, Xuan Zhao, Feng Ruan, Jie Zhang, Wei Tian, Wanchun Dou
, Alex X. Liu:
Data Placement for Privacy-Aware Applications over Big Data in Hybrid Clouds. 2376484:1-2376484:15 - Shuo Li, Zhanjie Song, Wenhuan Lu

, Daniel Sun, Jianguo Wei
:
Parameterization of LSB in Self-Recovery Speech Watermarking Framework in Big Data Mining. 3847092:1-3847092:12 - Donghui Hu

, Qiang Shen, Shengnan Zhou, Xueliang Liu, Yuqi Fan, Lina Wang:
Adaptive Steganalysis Based on Selection Region and Combined Convolutional Neural Networks. 2314860:1-2314860:9 - Hong Rong

, Huimei Wang, Jian Liu, Jialu Hao, Ming Xian:
Privacy-Preserving k-Means Clustering under Multiowner Setting in Distributed Cloud Environments. 3910126:1-3910126:19 - Xiancui Xiao, Xiangwei Zheng

, Yuang Zhang:
A Multidomain Survivable Virtual Network Mapping Algorithm. 5258010:1-5258010:12 - Ming-Hung Wang

, Hanchi Wang, You-Ru Chen, Chin-Laung Lei
:
Automatic Test Pattern Generator for Fuzzing Based on Finite State Machine. 7819590:1-7819590:11 - Junling Lu

, Zhipeng Cai
, Xiaoming Wang
, Lichen Zhang
, Zhuojun Duan:
An Edge Correlation Based Differentially Private Network Data Release Method. 8408253:1-8408253:14 - Vishal Sharma

, Kyungroul Lee, Soonhyun Kwon, Jiyoon Kim
, Hyungjoon Park, Kangbin Yim, Sun-Young Lee
:
A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT. 4749085:1-4749085:24 - Yujia Liu

, Weiming Zhang
, Nenghai Yu
:
Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth. 1897438:1-1897438:15 - Yang Yu

, Jun Long
, Zhiping Cai
:
Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders. 4184196:1-4184196:10 - Qing Yang

, Rongxing Lu
, Yacine Challal
, Maryline Laurent
:
Security and Privacy in Emerging Wireless Networks. 5618742:1-5618742:2 - Wenjie Yang, Jian Weng

, Weiqi Luo
, Anjia Yang:
Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC. 5704865:1-5704865:8 - Abdul Razaq

, Awais Yousaf
, Umer Shuaib, Nasir Siddiqui, Atta Ullah, Adil Waheed:
A Novel Construction of Substitution Box Involving Coset Diagram and a Bijective Map. 5101934:1-5101934:16 - Wei Yin

, Jadwiga Indulska
, Hongjian Zhou:
Protecting Private Data by Honey Encryption. 6760532:1-6760532:9 - Tong Li

, Yuhui Zheng, Ti Zhou
:
Efficient Anonymous Authenticated Key Agreement Scheme for Wireless Body Area Networks. 4167549:1-4167549:8 - Mikel Iturbe

, Iñaki Garitano
, Urko Zurutuza
, Roberto Uribeetxeberria:
Towards Large-Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends. 9150965:1-9150965:17 - Dhruti Sharma

, Devesh C. Jinwala
:
Multiuser Searchable Encryption with Token Freshness Verification. 6435138:1-6435138:16 - Feng Li, Yali Si, Ning Lu

, Zhen Chen, Limin Shen:
A Security and Efficient Routing Scheme with Misbehavior Detection in Delay-Tolerant Networks. 2761486:1-2761486:16 - Mahdi Madani

, Ilyas Benkhaddra
, Camel Tanougast
, Salim Chitroub, Loïc Siéler:
Digital Implementation of an Improved LTE Stream Cipher Snow-3G Based on Hyperchaotic PRNG. 5746976:1-5746976:15 - Tengfei Tu

, Lu Rao, Hua Zhang
, Qiaoyan Wen, Jia Xiao:
Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud. 4603237:1-4603237:17 - Fu-Hau Hsu, Chih-Wen Ou

, Yanling Hwang, Ya-Ching Chang, Po-Ching Lin:
Detecting Web-Based Botnets Using Bot Communication Traffic Features. 5960307:1-5960307:11 - Xiaona Xia

, Jiguo Yu, Shanshan Zhang, Shu Wu
:
Trusted Service Scheduling and Optimization Strategy Design of Service Recommendation. 9192084:1-9192084:9 - Keyang Liu

, Weiming Zhang
, Xiaojuan Dong
:
A Cloud-User Protocol Based on Ciphertext Watermarking Technology. 4376282:1-4376282:14 - Shuai Han

, Shengli Liu
, Lin Lyu
:
Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption. 2148534:1-2148534:27 - Ji Li

, Jianghong Wei
, Wenfen Liu
, Xuexian Hu
:
PMDP: A Framework for Preserving Multiparty Data Privacy in Cloud Computing. 6097253:1-6097253:14 - Ke Yin

:
Research on the Effectiveness Evaluation Model of the Prison Physical Protection System Based on Grey Analytic Hierarchy Process. 6207437:1-6207437:9 - Yi Liu

, Hongqi Zhang, Jiang Liu
, Yingjie Yang:
A New Approach for Delivering Customized Security Everywhere: Security Service Chain. 9534754:1-9534754:17 - Xing Guo

, Shanshan Chen
, Yiwen Zhang
, Wei Li:
Service Composition Optimization Method Based on Parallel Particle Swarm Algorithm on Spark. 9097616:1-9097616:8 - Hao Chen, Tao Wang, Fan Zhang

, Xinjie Zhao, Wei He, Lumin Xu, Yunfei Ma:
Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher. 8051728:1-8051728:15 - Jun Chen

, Xiangyang Luo
, Yanqing Guo, Yi Zhang
, Daofu Gong
:
A Survey on Breaking Technique of Text-Based CAPTCHA. 6898617:1-6898617:15 - Shin-Yan Chiou

, Tsung-Ju Wang, Jiun-Ming Chen:
Design and Implementation of a Mobile Voting System Using a Novel Oblivious and Proxy Signature. 3075210:1-3075210:16 - Yang Zhou

, Wei Ni
, Kangfeng Zheng, Ren Ping Liu, Yixian Yang:
Scalable Node-Centric Route Mutation for Defense of Large-Scale Software-Defined Networks. 4651395:1-4651395:13 - Qian Meng, Jianfeng Ma

, Kefei Chen, Yinbin Miao, Tengfei Yang:
Comparable Encryption Scheme over Encrypted Cloud Data in Internet of Everything. 6430850:1-6430850:11 - Ru Zhang

, Yanyu Huo, Jianyi Liu
, Fangyu Weng:
Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering. 7536381:1-7536381:9 - Zhen Liu, Huanyu Meng

, Shuang Ren, Feng Liu:
Reliable Collaborative Filtering on Spatio-Temporal Privacy Data. 9127612:1-9127612:11

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














