


default search action
Security and Communication Networks, Volume 4
Volume 4, Number 1, January 2011
- Guojun Wang, Laurence Tianruo Yang, Kouichi Sakurai:

Guest editorial: Trusted computing and communications. 1-2
- Huiyun Li, Keke Wu, Fengqi Yu:

Enhanced correlation power analysis attack against trusted systems. 3-10 - Yanjiang Yang, Jianying Zhou

, Robert H. Deng
, Feng Bao:
Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks. 11-22 - Neyire Deniz Sarier

:
A new biometric identity based encryption scheme secure against DoS attacks. 23-32 - Benfano Soewito

, Lucas Vespa, Ning Weng, Haibo Wang:
Hybrid pattern matching for trusted intrusion detection. 33-43 - Antonio Muñoz, Antonio Maña:

TPM-based protection for mobile agents. 45-60 - Yizhi Ren, Mingchu Li, Kouichi Sakurai:

FineTrust: a fine-grained trust model for peer-to-peer networks. 61-69 - Pei-Te Chen, Chi-Sung Laih:

A challenge-based trust establishment protocol for peer-to-peer networks. 71-78 - Anne V. D. M. Kayem

, Patrick Martin, Selim G. Akl:
Enhancing identity trust in cryptographic key management systems for dynamic environments. 79-94 - A. Srinivasan, F. Li, J. Wu:

Secure reputation monitoring system - a novel connected dominating set-based framework for WSNs. 95-108
Volume 4, Number 2, February 2011
- Tran Thanh Dai, Johnson I. Agbinya

:
Combating key-swapping collusion attack on random pairwise key pre-distribution schemes for wireless sensor networks. 109-121 - Jun Shao, Zhenfu Cao

, Peng Liu:
SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption. 122-135 - Khaled Salah

, Karim Sattar
, Mohammed H. Sqalli, Ehab Al-Shaer:
A potential low-rate DoS attack against network firewalls. 136-146 - Stylianos Basagiannis

, Panagiotis Katsaros
, Andrew Pombortsis:
Synthesis of attack actions using model checking for the verification of security protocols. 147-161 - Ashok Kumar Das

:
An efficient random key distribution scheme for large-scale distributed sensor networks. 162-180 - N. K. Sreelaja, G. A. Vijayalakshmi Pai:

Swarm intelligence based key generation for stream cipher. 181-194 - Carlisle Adams:

Achieving non-transferability in credential systems using hidden biometrics. 195-206 - Mohsen Toorani

, Abolfazl Falahati
:
A secure cryptosystem based on affine transformation. 207-215 - Suleyman Kondakci

, Cemali Dinçer:
Internet epidemiology: healthy, susceptible, infected, quarantined, and recovered. 216-238
Volume 4, Number 3, March 2011
- Matteo Cesana

, Azzedine Boukerche, Albert Y. Zomaya
:
Security for QoS assured wireless and mobile networks. 239-241
- Fabio Martignon, Stefano Paris, Antonio Capone

:
DSA-Mesh: a distributed security architecture for wireless mesh networks. 242-256 - Thomas Gamer

, Lars Völker
, Martina Zitterbart:
Differentiated security in wireless mesh networks. 257-266 - Rodolphe Marques, Edgar Araújo, André Zúquete

:
Fast 802.11 handovers with 802.1X reauthentications. 267-283 - Soufiene Djahel

, Farid Naït-Abdesselam, Damla Turgut:
Characterizing the greedy behavior in wireless ad hoc networks. 284-298 - Gabriele Cecchetti

, Anna Lina Ruscelli
:
Real-time support for HCCA function in IEEE 802.11e networks: a performance evaluation. 299-315 - Soon-Young Oh, Gustavo Marfia

, Mario Gerla:
MANET QoS support without reservations. 316-328 - Dario Rossi, Roberta Fracchia, Michela Meo

:
On the quality of broadcast services in vehicular ad hoc networks. 329-346
Volume 4, Number 4, April 2011
- Quoc-Cuong Le, Patrick Bellot:

A novel approach to build QKD relaying models. 347-356 - Jieyan Fan, Dapeng Wu

, Antonio Nucci, Ram Keralapura, Lixin Gao:
Protocol oblivious classification of multimedia traffic. 357-371 - Fang Qi, Zhe Tang, Guojun Wang, Jie Wu:

SSL-enabled trusted communication: Spoofing and protecting the non-cautious users. 372-383 - Sourour Meharouech, Adel Bouhoula

, Tarek Abbes:
Trusted intrusion detection architecture for high-speed networks based on traffic classification, load balancing and high availability mechanism. 384-394
- Shao-Hsiu Hung, Jui-Hung Yeh, Jyh-Cheng Chen:

sRAMP: secure reconfigurable architecture and mobility platform. 395-409
- Subrat Kumar Dash, Krupa Sagar Reddy, Arun K. Pujari:

Adaptive Naive Bayes method for masquerade detection. 410-417 - Sandeep K. Sood

, Anil Kumar Sarje, Kuldip Singh:
Dynamic identity-based single password anti-phishing protocol. 418-427 - Franjieh El Khoury, Marcel Egea, Nada Meskaoui, Nagi Wakim:

An iris recognition model for secured access to data. 428-435 - Han-Ching Wu, Shou-Hsuan Stephen Huang:

Packet-based algorithms for stepping-stone detection with chaff perturbation. 436-446 - Sana Hoor Arisar

, Andrew H. Kemp:
A comprehensive investigation of secure location estimation techniques for WSN applications. 447-459 - Hongyan Yao:

Role-based authentication protocol. 460-470 - Rajadurai Rajavelsamy, Jicheol Lee, Sungho Choi:

Towards security architecture for Home (evolved) NodeB: challenges, requirements and solutions. 471-481
Volume 4, Number 5, May 2011
- Jiankun Hu

, Vijayakumar Bhagavatula
, Mohammed Bennamoun
, Kar-Ann Toh:
Biometric security for mobile computing. 483-486
- Kai Xi, Tohari Ahmad

, Fengling Han
, Jiankun Hu
:
A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment. 487-499 - Byounggyu Choi, Youngsung Kim, Kar-Ann Toh:

Fusion of visual and infrared face verification systems. 500-514 - Fahim K. Sufi

, Fengling Han
, Ibrahim Khalil
, Jiankun Hu
:
A chaos-based encryption technique to protect ECG packets for time critical telecardiology applications. 515-524 - Foteini Agrafioti, Francis Minhthang Bui

, Dimitrios Hatzinakos:
Medical biometrics in mobile health monitoring. 525-539 - Hwee Keong Lam, Zujun Hou, Wei-Yun Yau

, Tai Pang Chen, Jun Li
, K. Y. Sim:
A topological interpretation of fingerprint reference point. 540-547 - Julien Bringer, Hervé Chabanne, Bruno Kindarji:

Identification with encrypted biometric data. 548-562 - Arathi Arakala, Kathy J. Horadam, Jason Jeffers, Serdar Boztas

:
Protection of minutiae-based templates using biocryptographic constructs in the set difference metric. 563-576 - S. M. Prasad, V. K. Govindan, P. S. Sathidevi:

Palmprint authentication using fusion of wavelet and contourlet features. 577-590 - Zujun Hou, Wei-Yun Yau

, Yue Wang:
A review on fingerprint orientation estimation. 591-599
Volume 4, Number 6, June 2011
- Lu Xiao, Gregory G. Rose:

Attacks on a lightweight cipher based on a multiple recursive generator. 601-607 - Georgios Androulidakis, Symeon Papavassiliou:

Two-stage selective sampling for anomaly detection: analysis and evaluation. 608-621 - Xia Yin, Zhiliang Wang, Chuanming Jing, Jianping Wu:

A formal approach to robustness testing of network protocol with time constraints. 622-632 - Divya Muthukumaran, Joshua Schiffman, Mohamed Hassan, Anuj Sawani, Vikhyath Rao, Trent Jaeger:

Protecting the integrity of trusted applications in mobile phone systems. 633-650
- Ahmad Samer Wazan, Romain Laborde, François Barrère, Abdelmalek Benzekri:

A formal model of trust for calculating the quality of X.509 certificate. 651-665
- Sudip Misra, P. Venkata Krishna

, Kiran Isaac Abraham:
A stochastic learning automata-based solution for intrusion detection in vehicular ad hoc networks. 666-677 - Xiaodong Lin:

A provably secure threshold signature scheme based on DDH assumption. 678-684 - Wen Gu, Pramode K. Verma, Stamatios V. Kartalopoulos:

A unified security framework for WiMAX over EPON access networks. 685-696 - Abdelrahman Desoky:

Matlist: Mature linguistic steganography methodology. 697-718 - Patrick Traynor, Chaitrali Amrutkar, Vikhyath Rao, Trent Jaeger, Patrick D. McDaniel, Thomas La Porta:

From mobile phones to responsible devices. 719-726
Volume 4, Number 7, July 2011
- Naveen K. Chilamkurti, Ben Soh, Tai-Hoon Kim:

Special issue on security and privacy in wireless systems. 727-728 - Leonidas Kazatzopoulos, Constantinos Delakouridis, Giannis F. Marias:

A privacy-aware overlay routing scheme in WSNs. 729-743 - Mauro Conti

, Roberto Di Pietro
, Andrea Gabrielli, Luigi V. Mancini
:
Secure topology maintenance and events collection in WSNs. 744-762 - Avinash Srinivasan:

SecLoc - secure localization in WSNs using CDS. 763-770 - Zhengming Li, Chunxiao Chigan:

RAMV: ensuring resource-aware message verification in VANETs. 771-784 - Hesiri Weerasinghe, Raymond Tackett, Huirong Fu:

Verifying position and velocity for vehicular ad-hoc networks. 785-791
Volume 4, Number 8, August 2011
- Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini:

TOGBAD - an approach to detect routing attacks in tactical environments. 793-806 - Wassim El-Hajj

, Hazem M. Hajj, Zouheir Trabelsi, Fadi A. Aloul:
Updating snort with a customized controller to thwart port scanning. 807-814 - Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang:

A robust user authentication scheme with self-certificates for wireless sensor networks. 815-824 - D. A. Knox, C. Adams:

Digital credentials with privacy-preserving delegation. 825-838 - Adel Ali Ahmed

, Norsheila Fisal:
Secure real-time routing protocol with load distribution in wireless sensor networks. 839-869 - Lei Wu, Jerome Harrington, Corey Kuwanoe, Cliff Changchun Zou:

Harnessing the power of BitTorrent for distributed denial-of-service attacks. 860-870 - Alexander J. O'Ree, Mohammad S. Obaidat

:
Security enhancements for UDDI. 871-887 - Thaier Hayajneh

, Razvi Doomun, Prashant Krishnamurthy, David Tipper
:
Source - destination obfuscation in wireless ad hocnetworks. 888-901 - Jiankun Hu

, Xuan Dau Hoang
, Ibrahim Khalil
:
An embedded DSP hardware encryption module for secure e-commerce transactions. 902-909 - Ming-Yang Su, Sheng-Cheng Yeh:

A study on the prevention of sniffing nodes in mobile ad hoc networks. 910-918 - Fazirulhisyam Hashim, Abbas Jamalipour

:
A generic sampling framework for improving anomaly detection in the next generation network. 919-936 - Haitham Rashwan, Ernst M. Gabidulin, Bahram Honary:

Security of the GPT cryptosystem and its applications to cryptography. 937-946 - Asaf Shabtai, Dennis Potashnik, Yuval Fledel, Robert Moskovitch, Yuval Elovici:

Monitoring, analysis, and filtering system for purifying network traffic of known and unknown malicious content. 947-965 - Yanling Chen, A. J. Han Vinck:

Secrecy coding for the binary symmetric wiretap channel. 966-978
Volume 4, Number 9, September 2011
- Sudip Misra, Mieso K. Denko, Hussein T. Mouftah:

Security challenges in emerging and next-generation wireless communication networks. 979-980 - Padmalochan Bera, Soumya Kanti Ghosh, Pallab Dasgupta:

A WLAN security management framework based on formal spatio-temporal RBAC model. 981-993 - Sandhya Khurana, Neelima Gupta:

End-to-end protocol to secure ad hoc networks against wormhole attacks. 994-1002
- Amit Shirsat, Bharat K. Bhargava:

Local geometric algorithm for hole boundary detection in sensor networks. 1003-1012
- Al-Sakib Khan Pathan

, Muhammad Mostafa Monowar, Jinfang Jiang, Lei Shu
, Guangjie Han:
An efficient approach of secure group association management in densely deployed heterogeneous distributed sensor network. 1013-1026 - R. Aparna, B. B. Amberker:

An efficient scheme to handle bursty behavior in secure group communication using binomial key trees. 1027-1043 - Hai-Cheng Chu, Der-Jiunn Deng, Han-Chieh Chao

:
Digital forensics of WLM 8.1 via check point methodology within corporate intranet in future communication security. 1044-1062 - Jung-Shian Li, Che-Jen Hsieh, Chih-Ying Chang, Naveen K. Chilamkurti:

Improved IPsec performance utilizing transport-layer-aware compression architecture. 1063-1074 - Jahangir H. Sarker, Hussein T. Mouftah:

A self-stabilized random access protocol against denial of service attack in wireless networks. 1075-1087
Volume 4, Number 10, October 2011
- Scott Fowler

, Sherali Zeadally, Naveen K. Chilamkurti:
Impact of denial of service solutions on network quality of service. 1089-1103 - Zhen Li, Qi Liao, Andrew Blaich, Aaron Striegel

:
Fighting botnets with economic uncertainty. 1104-1113 - Joon S. Park, Gaeil An, Ivy Y. Liu:

Active access control (AAC) with fine-granularity and scalability. 1114-1129 - Hai Huang, Zhenfu Cao

:
Authenticated key exchange protocol with enhanced freshness properties. 1130-1136 - Marshall Riley, Kemal Akkaya, Kenny Fong:

A survey of authentication schemes for vehicular ad hoc networks. 1137-1152 - Hai Huang, Zhenfu Cao

:
IDOAKE: strongly secure ID-based one-pass authenticated key exchange protocol. 1153-1161 - Thomas E. Carroll, Daniel Grosu

:
A game theoretic investigation of deception in network security. 1162-1172 - Hedieh Sajedi

, Mansour Jamzad:
HYSA: HYbrid steganographic approach using multiple steganography methods. 1173-1184 - Giovanni Di Crescenzo, Tao Zhang, Stanley Pietrowicz:

Anonymity notions and techniques for public-key infrastructures in vehicular networks. 1185-1198 - Ali A. Kanso

:
Cryptosystems based on continued fractions. 1199-1211 - Vladimir B. Balakirsky, A. J. Han Vinck:

Performance of the verification for binary memoryless channels. 1212-1225
Volume 4, Number 11, November 2011
- Petros Belsis

, Dimitris Vassis, Christos Skourlas:
Identifying and utilizing secure paths in ad hoc assistive medical environments. 1231-1242 - Gauri Vakde, Radhika Bibikar, Zhengyi Le, Matthew K. Wright

:
EnPassant: anonymous routing for disruption-tolerant networks with applications in assistive environments. 1243-1256 - Oscar García Morchon, Thomas Falck, Klaus Wehrle

:
Sensor network security for pervasive e-health. 1257-1273 - Christopher Armbrust, Syed Atif Mehdi, Max Reichardt, Jan Koch, Karsten Berns:

Using an autonomous robot to maintain privacy in assistive environments. 1275-1293 - Thanassis Giannetsos

, Tassos Dimitriou, Neeli R. Prasad:
People-centric sensing in assistive healthcare: Privacy challenges and directions. 1295-1307
- Yee Wei Law

, Giorgi Moniava, Zheng Gong, Pieter H. Hartel
, Marimuthu Palaniswami
:
KALwEN: a new practical and interoperable key management scheme for body sensor networks. 1309-1329 - Huawang Qin, Yuewei Dai, Zhiquan Wang:

Identity-based multi-receiver threshold signcryption scheme. 1331-1337 - Neminath Hubballi, Santosh Biswas, Sukumar Nandi

:
Network specific false alarm reduction in intrusion detection system. 1339-1349 - Fahim K. Sufi, Ibrahim Khalil, Ibrahim Habib:

Cardioids-based faster authentication and diagnosis of remote cardiovascular patients. 1351-1368
Volume 4, Number 12, December 2011
- Qian Chen, Jun Tian, Lei Yang, Dapeng Wu

:
A robust video hash scheme based on 2D-DCT temporal maximum occurrence. 1369-1377 - Lei Yang, Qian Chen, Jun Tian, Dapeng Wu

:
Content based image hashing using companding and gray code. 1378-1386 - Mahmoud Mostafa, Anas Abou El Kalam, Mohamed Maachaoui

, Noureddine Idboufker:
Specification, implementation and performance evaluation of the QoS-friendly encapsulating security payload (Q-ESP) protocol. 1387-1404 - Hisham Dahshan, James Irvine

:
An elliptic curve secret sharing key management scheme for mobile ad hoc networks. 1405-1419 - Mohamed F. Younis

, Osama Farrag, Sookyoung Lee, William D'Amico:
Optimized packet formation in multi-level security wireless data acquisition networks. 1420-1439 - Rongxing Lu, Xiaodong Lin, Xiaohui Liang

, Xuemin (Sherman) Shen
:
An efficient and provably secure public key encryption scheme based on coding theory. 1440-1447 - Einar Petana, Sanjeev Kumar:

TCP SYN-based DDoS attack on EKG signals monitored via a wireless sensor network. 1448-1460 - Hui Zhao, Mingchu Li, Xinxin Fan:

A formal separation method of protocols to eliminate parallel attacks in virtual organization. 1461-1468 - Marshall Riley, Kemal Akkaya, Kenny Fong:

Group-based hybrid authentication scheme for cooperative collision warnings in VANETs. 1469-1482 - Xuejiao Liu, Chengfang Fang, Debao Xiao:

Intrusion diagnosis and prediction with expert system. 1483-1494

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














