


default search action
Security and Communication Networks, Volume 7
Volume 7, Number 1, January 2014
- Madhusanka Liyanage

, Andrei V. Gurtov
:
Securing virtual private LAN service by efficient key management. 1-13
- Hongbing Wang, Zhenfu Cao

, Lifei Wei:
A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption. 14-32
- Kazim Yumbul, Erkay Savas, Övünç Kocabas, Johann Großschädl:

Design and implementation of a versatile cryptographic unit for RISC processors. 36-52 - Bora Aslan, Muharrem Tolga Sakalli:

Algebraic construction of cryptographically good binary linear transformations. 53-63
- Kun Peng:

Efficient homomorphic sealed-bid auction free of bid validity check and equality test. 64-76
- Son Thanh Nguyen, Erdal Cayirci, Chunming Rong

:
A secure many-to-many routing protocol for wireless sensor and actuator networks. 88-98
- Riccardo Bresciani, Andrew Butterfield

:
A UTP approach towards probabilistic protocol verification. 99-107 - Manoj Singh Gaur, Rajbir Kaur

, P. Lalith Suresh, Vijay Laxmi
:
Exploiting convergence characteristics to tackle collusion attacks in OLSR for Security and Communication Networks. 108-122
- Alper Kanak

, Ibrahim Sogukpinar
:
BioPSTM: a formal model for privacy, security, and trust in template-protecting biometric authentication. 123-138 - Steffen Bartsch:

Policy override in practice: model, evaluation, and decision support. 139-156 - Maria B. Line:

Why securing smart grids is not just a straightforward consultancy exercise. 160-174 - Jingcheng Gao, Jing Liu, Bharat Rajan, Rahul Nori, Bo Fu, Yang Xiao

, Wei Liang, C. L. Philip Chen
:
SCADA communication and security issues. 175-194 - Nasim Beigi Mohammadi, Jelena V. Misic, Vojislav B. Misic, Hamzeh Khazaei

:
A framework for intrusion detection system in advanced metering infrastructure. 195-205 - Nico Saputro

, Kemal Akkaya:
On preserving user privacy in Smart Grid advanced metering infrastructure applications. 206-220 - Hasen Nicanfar, Victor C. M. Leung

:
Password-authenticated cluster-based group key agreement for smart grid communication. 221-233 - Mi Wen, Rongxing Lu, Jingsheng Lei, Hongwei Li, Xiaohui Liang

, Xuemin (Sherman) Shen
:
SESA: an efficient searchable encryption scheme for auction in emerging smart grid marketing. 234-244
Volume 7, Number 2, February 2014
- Mehran S. Fallah, Nafiseh Kahani:

TDPF: a traceback-based distributed packet filter to mitigate spoofed DDoS attacks. 245-264 - Shuhui Chen, Rongxing Lu, Xuemin (Sherman) Shen

:
SRC: a multicore NPU-based TCP stream reassembly card for deep packet inspection. 265-278 - Ghada Zaibi, Fabrice Peyrard, Abdennaceur Kachouri, Daniele Fournier-Prunaret, Mounir Samet:

Efficient and secure chaotic S-Box for wireless sensor network. 279-292 - Idris Ahmed, Anne E. James

, Dhananjay Singh
:
Critical analysis of counter mode with cipher block chain message authentication mode protocol - CCMP. 293-308 - Ning Lu, Yulong Wang, Sen Su, Fangchun Yang:

A novel path-based approach for single-packet IP traceback. 309-321
- Mohammad S. Obaidat

, Petros Nicopolitidis, Weili Han:
Security of e-systems. 322-324
- David M. Monteiro, Joel J. P. C. Rodrigues, Jaime Lloret, Sandra Sendra

:
A hybrid NFC-Bluetooth secure protocol for Credit Transfer among mobile phones. 325-337
- Abdallah Ghourabi

, Tarek Abbes, Adel Bouhoula
:
Characterization of attacks collected from the deployment of Web service honeypot. 338-351
- Fahim H. Abbasi, Richard J. Harris, Stephen Marsland, Giovanni S. Moretti:

An exemplar-based learning approach for detection and classification of malicious network streams in honeynets. 352-364
- Lingzhi Fu, Xiang Shen, Linghao Zhu, Junyu Wang:

A low-cost UHF RFID tag chip with AES cryptography engine. 365-375 - Mohammad S. Obaidat

, Isaac Woungang, Sanjay Kumar Dhurandher, Vincent Koo:
A cryptography-based protocol against packet dropping and message tampering attacks on mobile ad hoc networks. 376-384 - Weili Han, Chen Sun, Chenguang Shen, Chang Lei, Sean Shen:

Dynamic combination of authentication factors based on quantified risk and benefit. 385-396
- Peter Mueller

, Der-Chyuan Lou
, Xinyi Huang:
Special issue on applied cryptography for information and communication networks. 397-398
- Muhammad Khurram Khan

, Saru Kumari
:
Cryptanalysis and Improvement of "An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems". 399-408 - Huimin Shuai, Wen Tao Zhu, Xin Liu:

Publishing and sharing encrypted data with potential friends in online social networks. 409-421 - Huaqun Wang:

Signer-admissible strong designated verifier signature from bilinear pairings. 422-428 - Weijia Wang, Lei Hu:

A generic homomorphic MAC construction for authentication in network coding. 429-433 - Changlu Lin, Fei Tang, Pinhui Ke, Lein Harn, Shengyuan Zhang:

Secure universal designated verifier identity-based signcryption. 434-444 - Wenjie Yang

, Futai Zhang, Limin Shen:
Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles. 445-454 - Yuan He, Li Xu, Wei Wu:

A local joint fast handoff scheme in cognitive wireless mesh networks. 455-465 - Yong Yu

, Jianbing Ni, Haomiao Yang, Yi Mu, Willy Susilo
:
Efficient public key encryption with revocable keyword search. 466-472
Volume 7, Number 3, March 2014
- Yi Luo, Ferenc Szidarovszky, Youssif B. Al-Nashif, Salim Hariri:

A fictitious play-based response strategy for multistage intrusion defense systems. 473-491 - Hongli Zhang, Lin Ye, Jiantao Shi

, Xiaojiang Du, Mohsen Guizani:
Verifying cloud service-level agreement by a third-party auditor. 492-502 - Heliang Huang

, Wansu Bao, Shukai Liu:
Parallel Gaussian elimination for XL family over GF(2). 503-510 - Lanxiang Chen, Gongde Guo, Zhen Peng:

A hill cipher-based remote data possession checking in cloud storage. 511-518 - Zhejun Fang, Yuqing Zhang, Ying Kong, Qixu Liu:

Static detection of logic vulnerabilities in Java web applications. 519-531 - Novarun Deb

, Manali Chakraborty, Nabendu Chaki
:
CORIDS: a cluster-oriented reward-based intrusion detection system for wireless mesh networks. 532-543 - JingZheng Wu, Liping Ding, Yanjun Wu, Nasro Min-Allah

, Samee Ullah Khan
, Yongji Wang:
C2Detector: a covert channel detection framework in cloud computing. 544-557 - Daniel Caragata, Safwan El Assad, Charles A. Shoniregun, Galyna A. Akmayeva:

Confidential initial identification and other improvements for UMTS security. 558-566 - Lein Harn:

Secure secret reconstruction and multi-secret sharing schemes with unconditional security. 567-573 - Yan Bai, Lirong Dai, Sam Chung, Durga D. Devaraj:

Access control for cloud-based eHealth social networking: design and evaluation. 574-587 - Amizah Malip, Siaw-Lynn Ng, Qin Li:

A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks. 588-601 - Xuefeng Liu, Yuqing Zhang, Boyang Wang, Huaqun Wang:

An anonymous data aggregation scheme for smart grid systems. 602-610 - Robert H. Deng

, Xuhua Ding
, Swee-Won Lo:
Efficient authentication and access control of scalable multimedia streams over packet-lossy networks. 611-625 - Ying-Dar Lin, Tzung-Bi Shih, Yu-Sung Wu, Yuan-Cheng Lai:

Secure and transparent network traffic replay, redirect, and relay in a dynamic malware analysis environment. 626-640 - Xiaonan Wang, Yi Mu:

A secure mobility support scheme for 6LoWPAN wireless sensor networks. 641-652 - Sachin Kumar, Rajendra Kumar Sharma

:
Threshold visual secret sharing based on Boolean operations. 653-664 - Tahani Gazdar, Abderrahim Benslimane

, Abdelfettah Belghith
, Abderrezak Rachedi
:
A secure cluster-based architecture for certificates management in vehicular networks. 665-683
Volume 7, Number 4, April 2014
- Kai Wang

, Huachun Zhou, Hongbin Luo, Jianfeng Guan, Yajuan Qin, Hongke Zhang:
Detecting and mitigating interest flooding attacks in content-centric network. 685-699 - Peiqing Zhang, Nikos Fotiou, Bjarne E. Helvik

, Giannis F. Marias, George C. Polyzos
:
Analysis of the effect of InfoRanking on content pollution in peer-to-peer systems. 700-713 - Ali Sedaghatbaf

, Mohammad Abdollahi Azgomi
:
Attack modelling and security evaluation based on stochastic activity networks. 714-737 - Jin Wang, Kejie Lu:

On the mobile relay placement in hybrid MANETs with secure network coding. 738-749 - Cheng-Jung Tasia, Ting-Yi Chang, Pei-Cheng Cheng, Jyun-Hao Lin:

Two novel biometric features in keystroke dynamics authentication systems for touch screen devices. 750-758 - Changsha Ma, Kaiping Xue

, Peilin Hong:
Distributed access control with adaptive privacy preserving property for wireless sensor networks. 759-773 - Hwajeong Seo, Yeoncheol Lee, Hyunjin Kim, Taehwan Park, Howon Kim:

Binary and prime field multiplication for public key cryptography on embedded microprocessors. 774-787 - Yahui Wu, Su Deng, Hongbin Huang

:
Optimal incentive policy in delay tolerant networks with limited cost. 788-799 - Mohammad Ghebleh

, Ali A. Kanso
, Hala S. Own:
A blind chaos-based watermarking technique. 800-811
Volume 7, Number 5, May 2014
- Alfonso Muñoz Muñoz, Irina Arguelles Álvarez

, Sergio Sánchez García:
A formal model for the creation and evaluation of steganographic solutions based in lexical-semantic substitutions: a case applied to Spanish. 813-832
- Fatemeh Kavousi, Behzad Akbari:

A Bayesian network-based approach for learning attack strategies from intrusion alerts. 833-853 - Wun-She Yap

, Sze Ling Yeo, Swee-Huay Heng
, Matt Henricksen:
Security analysis of GCM for communication. 854-864 - Nils Gruschka, Luigi Lo Iacono

, Christoph Sorge:
Analysis of the current state in website certificate validation. 865-877 - Sebastián García

, Alejandro Zunino
, Marcelo Campo
:
Survey on network-based botnet detection methods. 878-903 - Yingjie Zhou, Guangmin Hu, Dapeng Wu

:
A data mining system for distributed abnormal event detection in backbone networks. 904-913 - Intae Kim

, Seong Oun Hwang:
Efficient identity-based broadcast signcryption schemes. 914-925 - Fady A. Mohamed, Elsayed E. Hemayed

:
Using trusted computing in trusted mail transfer protocol. 926-933 - Wei Xie, Lei Xie, Chen Zhang, Qiang Wang, Chao Wang, Chaojing Tang:

TOA: a tag-owner-assisting RFID authentication protocol toward access control and ownership transfer. 934-944
Volume 7, Number 6, June 2014
- Nasour Bagheri

, Masoumeh Safkhani
, Pedro Peris-Lopez
, Juan E. Tapiador
:
Weaknesses in a new ultralightweight RFID authentication protocol with permutation - RAPP. 945-949 - Lein Harn, Fuyou Miao, Chin-Chen Chang:

Verifiable secret sharing based on the Chinese remainder theorem. 950-957 - Tingting Liu, Shu Feng:

Research on hidden malicious user detection problem. 958-963 - Chunhua Su, Jianying Zhou

, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai:
Collaborative agglomerative document clustering with limited information disclosure. 964-978 - Massoud Hadian Dehkordi, Reza Alimoradi:

Certificateless identification protocols from super singular elliptic curve. 979-986 - Fengtong Wen, Willy Susilo

, Guomin Yang
:
A robust smart card-based anonymous user authentication protocol for wireless communications. 987-993 - Rui Zhang, Ling Liu, Rui Xue:

Role-based and time-bound access and management of EHR data. 994-1015 - Jung-San Lee, Ya-Chieh Huang:

Fast authentication mechanism with provable correctness for cluster-based VANETs. 1016-1030 - Fei Wang, Liusheng Huang, Haibo Miao, Miaomiao Tian:

A novel distributed covert channel in HTTP. 1031-1041 - Yinfeng Wu, Liping Huang, Xiao Wang, Ning Yu:

An extensible cheat-proofing multi-secret sharing scheme with low computation complexity. 1042-1048 - Wei Song, Zhiyong Peng, Qian Wang

, Fangquan Cheng, Xiaoxin Wu, Yihui Cui:
Efficient privacy-preserved data query over ciphertext in cloud computing. 1049-1065
Volume 7, Number 7, July 2014
- Wee-How Khoh

, Thian Song Ong
, Ying-Han Pang
, Andrew Beng Jin Teoh
:
Score level fusion approach in dynamic signature verification based on hybrid wavelet-Fourier transform. 1067-1078 - Niu Liu, Shaohua Tang, Lingling Xu:

Yet another attack on the chinese remainder theorem-based hierarchical access control scheme. 1079-1095 - Tal Grinshpoun

, Amnon Meisels, Eyal Felstaine:
Avoidance of misbehaving nodes in wireless mesh networks. 1096-1114 - Wun-She Yap

, Sze Ling Yeo, Swee-Huay Heng
, Matt Henricksen:
Parallelizable MAC revisited. 1115-1127 - Yilei Wang, Zhe Liu, Qiuliang Xu:

New rational parties relying on reputation. 1128-1137 - Lingling Xu, Fangguo Zhang

, Shaohua Tang:
Timed-release oblivious transfer. 1138-1149 - Ning Lu, Yulong Wang, Sen Su, Fangchun Yang, Rui Han:

Filtering location optimization for the reactive packet filtering. 1150-1164 - Henry Carter

, Chaitrali Amrutkar, Italo Dacosta, Patrick Traynor:
For your phone only: custom protocols for efficient secure function evaluation on mobile devices. 1165-1176 - Jinguo Li, Yaping Lin, Gang Wang, Rui Li, Bo Yin:

Privacy and integrity preserving skyline queries in tiered sensor networks. 1177-1188
Volume 7, Number 8, August 2014
- Jie Huang, Bei Huang:

A security key distribution scheme based on energy efficiency for hybrid wireless sensor networks. 1189-1198 - Umberto Ferraro Petrillo, Giovanni Mastroianni, Ivan Visconti

:
The design and implementation of a secure CAPTCHA against man-in-the-middle attacks. 1199-1209 - Azeem Irshad

, Muhammad Sher
, Ch. Muhammad Shahzad Faisal, Anwer Ghani
, Mahmood Ul Hassan
, Shehzad Ashraf Chaudhry
:
A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme. 1210-1218 - Yuan Chen, Qingkuan Dong:

RCCA security for KEM+DEM style hybrid encryptions and a general hybrid paradigm from RCCA-secure KEMs to CCA-secure encryptions. 1219-1231 - Sha Ma, Bo Yang, Mingwu Zhang:

PPGJ: A privacy-preserving general join for outsourced encrypted database. 1232-1244 - Bo Wang, Jianyong Chen, Songsong Jia, Chunli Lv, Xiaomin Wang, Hongying Zheng:

Secret sharing scheme with dynamic size of shares for distributed storage system. 1245-1252 - Ou Ruan, Jing Chen, Jing Zhou, Yongquan Cui, Mingwu Zhang:

An efficient fair UC-secure protocol for two-party computation. 1253-1263 - Qi Xie, Xiao Tan, Duncan S. Wong, Guilin Wang, Mengjie Bao, Na Dong:

A practical anonymous authentication protocol for wireless roaming. 1264-1273 - Seongan Lim, Eunjeong Lee, Cheol-Min Park:

Equivalent public keys and a key substitution attack on the schemes from vector decomposition. 1274-1282 - Zhihua Xia

, Xinhui Wang, Xingming Sun, Baowei Wang:
Steganalysis of least significant bit matching using multi-order differences. 1283-1291 - Faraz Idris Khan, Taeshik Shon, Taekkyeun Lee, Ki-Hyung Kim:

Merkle tree-based wormhole attack avoidance mechanism in low power and lossy network based networks. 1292-1309
Volume 7, Number 9, September 2014
Editorials
- Yulei Wu, Guojun Wang, Ahmed Yassin Al-Dubai

:
Advances in trusted network computing. 1311-1312
- Yu-Teng Jang, Shuchih Ernest Chang, Yi-Jey Tsai:

Smartphone security: understanding smartphone users' trust in information security management. 1313-1321 - Zhigang Chen, Jiang-Tao Wang

, Xiao-heng Deng:
A trust model based on semantic distance for pervasive environments. 1322-1330 - Haibin Zhang, Yan Wang

, Xiuzhen Zhang:
The approaches to contextual transaction trust computation in e-Commerce environments. 1331-1351 - Wei Zhou, Zhiqiang Wei, Xiangjun Ren, Mijun Kang:

A game theoretic truthful reputation mechanism in mobile ad hoc networks. 1352-1363 - Chaoliang Li, Guojun Wang, Jin Zheng:

An aggregated signature-based fast RFID batch detection protocol. 1364-1371 - Lei (Chris) Liu, Xiaolong Jin, Geyong Min, Li Xu:

Anomaly diagnosis based on regression and classification analysis of statistical traffic features. 1372-1383 - Xiangyu Liu, Bin Wang, Xiaochun Yang, Meng Yu

, Wanyu Zang:
Obtaining K-obfuscation for profile privacy in social networks. 1384-1398 - Jun Yang, Bin Wang, Xiaochun Yang, Hongyi Zhang, Guang Xiang:

A secure K-automorphism privacy preserving approach with high data utility in social networks. 1399-1411 - Deqing Zou, Weide Zheng, Wenbin Jiang

, Hai Jin, Gang Chen:
Memshepherd: comprehensive memory bug fault-tolerance system. 1412-1419 - Bo Li, Xuefeng Ma, Jianming Li, Zhou Zong:

A fixed point model for rate control and routing in cloud data center networks. 1420-1436
Volume 7, Number 10, October 2014
- Hangbae Chang, Hosin David Lee, Richard E. Overill:

Human-centric security service and its application in smart space. 1439-1440 - Eun-Ha Song, Su-Hyun Yang, Young-Sik Jeong:

Human-centric visual monitoring of multi-clients system behavior and BiT for trust computing. 1441-1453 - Xiaohong Li, Ke He, Zhiyong Feng, Guangquan Xu:

Unified threat model for analyzing and evaluating software threats. 1454-1466 - Jianwei Niu

, Xiong Li
:
A novel user authentication scheme with anonymity for wireless communications. 1467-1476 - Yi Jun He, Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu:

UFLE: a user-friendly location-free encryption system for mobile users. 1477-1487 - Xiong Li

, Jianwei Niu
, Zhibo Wang, Cai-Sen Chen:
Applying biometrics to design three-factor remote user authentication scheme with key agreement. 1488-1497 - Hyeong-Il Kim, Al-Amin Hossain, Jae-Woo Chang:

A spatial transformation scheme supporting data privacy and query integrity for security of outsourced databases. 1498-1509 - I Luk Kim, Jung-Taek Seo

, Taeshik Shon, Jongsub Moon:
A novel approach to detection of mobile rogue access points. 1510-1516 - Daehoon Kim, Eenjun Hwang, Seungmin Rho:

Multi-camera-based security log management scheme for smart surveillance. 1517-1527 - Jin-Mook Kim, Hwa-Young Jeong

, Bong-Hwa Hong:
A study of privacy problem solving using device and user authentication for M2M environments. 1528-1535 - Deok Seok Seo

, Soon-Seok Kim, Yong-Hee Lee, Gwang-Hee Kim
, Yoon Seok Shin:
Privacy protection in human-centric healthcare home environment. 1536-1542 - Daesung Moon, Jang-Hee Yoo

, Mun-Kyu Lee:
Improved cancelable fingerprint templates using minutiae-based functional transform. 1543-1551 - Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng

, Ziping Wang:
Robust password changing and DoS resilience for human-centric password authentication. 1552-1559 - Ming Luo, Min Tu, Jianfeng Xu:

A security communication model based on certificateless online/offline signcryption for Internet of Things. 1560-1569 - Xuejiao Liu, Yingjie Xia, Yanbo Wang

, Jing Ren:
Discovering anomaly on the basis of flow estimation of alert feature distribution. 1570-1581 - Fulvio Corno

, Muhammad Sanaullah:
Modeling and formal verification of smart environments. 1582-1598 - Jin-Hyung Park, Seungmin Rho, Chang-Sung Jeong:

Real-time robust 3D object tracking and estimation for surveillance system. 1599-1611 - Sang-Soo Choi, Jungsuk Song, Seokhun Kim, Sookyun Kim

:
A model of analyzing cyber threats trend and tracing potential attackers based on darknet traffic. 1612-1621 - Yang-Hoon Kim, Hangbae Chang:

Human centric security policy and management design for small and medium business. 1622-1632 - Seung-Ryung Oh, Kun Woo Kim:

A study on the influences of R&D investment on information security for mechanical and electronics industry. 1633-1640
Volume 7, Number 11, November 2014
- Hongbing Wang, Peng Zeng, Kim-Kwang Raymond Choo

:
MDMR-IBE: efficient multiple domain multi-receiver identity-based encryption. 1641-1651 - Riaz Ahmed Shaikh

, Ahmed Saeed Alzahrani
:
Intrusion-aware trust model for vehicular ad hoc networks. 1652-1669 - Santiago Moral-García, Santiago Moral-Rubio, David Garcia Rosado

, Eduardo B. Fernández, Eduardo Fernández-Medina
:
Enterprise security pattern: a new type of security pattern. 1670-1690 - Zhe Jin

, Bok-Min Goi
, Andrew Beng Jin Teoh
, Yong Haur Tay
:
A two-dimensional random projected minutiae vicinity decomposition-based cancellable fingerprint template. 1691-1701 - Zhili Zhou, Xingming Sun, Xianyi Chen, Cheng Chang, Zhangjie Fu:

A novel signature based on the combination of global and local signatures for image copy detection. 1702-1711 - P. Venkata Krishna

, Sudip Misra, Dheeraj Joshi, Anant Gupta, Mohammad S. Obaidat
:
Secure socket layer certificate verification: a learning automata approach. 1712-1718 - Devendra Kumar Mahawer, A. Nagaraju

:
Metamorphic malware detection using base malware identification approach. 1719-1733 - Dimitrios Zissis

, Dimitrios Lekkas:
Trust coercion in the name of usable public key infrastructure. 1734-1745 - Keyvan RahimiZadeh

, Peyman Kabiri
:
Trust-based routing method using a mobility-based clustering approach in mobile ad hoc networks. 1746-1763 - Lukas Malina

, Jan Hajny:
Privacy-preserving framework for geosocial applications. 1764-1779 - Xinyin Xiang, Hui Li, Mingyu Wang, Zhenhua Liu:

Hidden attribute-based signcryption scheme for lattice. 1780-1787 - Éric Barthélémy, Jean-Marc Robert:

Mechanisms to locate noncooperative transmitters in wireless networks based on residual signal strengths. 1788-1804 - Baocang Wang, Yupu Hu, Xixiang Lv:

Indistinguishable against adaptive chosen ciphertext attack secure public key cryptosystem with double trapdoor decryption mechanism. 1805-1814 - Behnam Sattarzadeh, Mehran S. Fallah:

Typing secure implementation of authentication protocols in environments with compromised principals. 1815-1830 - Nor Badrul Anuar

, Maria Papadaki
, Steven Furnell
, Nathan L. Clarke
:
A response selection model for intrusion response systems: Response Strategy Model (RSM). 1831-1848 - Kuochen Wang, Chun-Ying Huang

, Li-Yang Tsai, Ying-Dar Lin:
Behavior-based botnet detection in parallel. 1849-1859 - Lu Leng, Andrew Beng Jin Teoh

, Ming Li, Muhammad Khurram Khan
:
A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional PalmPhasor-fusion. 1860-1871 - Mojtaba Eskandari, Hooman Raesi:

Frequent sub-graph mining for intelligent malware detection. 1872-1886 - Leonardo Maccari

, Romano Fantacci
, Tommaso Pecorella
, G. Ghettini, Francesco Chiti
:
Protecting mobile agents communications in pervasive networks with a trusted distributed mediator for ID-based RSA. 1887-1899 - Amitabha Bagchi, Rajshekar Kalayappan, Surabhi Sankhla:

Surveillance using non-stealthy sensors: A new intruder model. 1900-1911 - Guanghua Zhang, Yuqing Zhang, Xuefeng Liu:

Using fuzzy comprehensive evaluation method to establish a credible spectrum sensing and allocation model. 1912-1920 - Saru Kumari

, Mridul Kumar Gupta
, Muhammad Khurram Khan
, Xiong Li
:
An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement. 1921-1932 - Yingguang Zhang, Sen Su, Yulong Wang, Weifeng Chen, Fangchun Yang:

Privacy-assured substructure similarity query over encrypted graph-structured data in cloud. 1933-1944 - Ning Yu

, Lirui Zhang, Yongji Ren:
A novel D-S based secure localization algorithm for wireless sensor networks. 1945-1954 - Anas Abou El Kalam

, Mohammed Gad El Rab
, Yves Deswarte:
A model-driven approach for experimental evaluation of intrusion detection systems. 1955-1973 - Mingwu Zhang, Bo Yang, Chunzhi Wang, Tsuyoshi Takagi:

Unbounded anonymous hierarchical IBE with continual-key-leakage tolerance. 1974-1987 - Nishant Doshi

, Devesh C. Jinwala
:
Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption. 1988-2002 - Masoumeh Javanbakht, Hossein Erfani

, Hamid Haj Seyyed Javadi
, Parisa Daneshjoo:
Key Predistribution Scheme for Clustered Hierarchical Wireless Sensor Networks based on Combinatorial Designs. 2003-2014 - Thaier Hayajneh

, Razvi Doomun, Ghada A. Al-Mashaqbeh, Bassam Jamil Mohd:
An energy-efficient and security aware route selection protocol for wireless sensor networks. 2015-2038 - Saru Kumari

, Muhammad Khurram Khan
:
More secure smart card-based remote user password authentication scheme with user anonymity. 2039-2053 - Xixiang Lv, Yi Mu, Hui Li:

Loss-tolerant authentication with digital signatures. 2054-2062 - Sirapat Boonkrong

:
A more secure and efficient Andrew Secure RPC protocol. 2063-2077 - Marwan H. Abu-Amara

:
A combined solution for the Internet access denial caused by malicious Internet service providers. 2078-2093 - Feng Wang, Chin-Chen Chang, Lein Harn:

Simulatable and secure certificate-based threshold signature without pairings. 2094-2103 - Boyang Wang, Hui Li, Xuefeng Liu, Xiaoqing Li, Fenghua Li:

Preserving identity privacy on multi-owner cloud data during public verification. 2104-2113 - Sameer Hasan Albakri, Bharanidharan Shanmugam

, Ganthan Narayana Samy, Norbik Bashah Idris
, Azuan Ahmed
:
Security risk assessment framework for cloud computing environments. 2114-2124 - Yu-Fang Chung

:
The design of authentication key protocol in certificate-free public key cryptosystem. 2125-2133 - Sofien Gannouni

, Mutaz Beraka, Hassan Mathkour:
Data integration using service composition in data service middleware. 2134-2144 - Mrinal K. Mandal

, Madhumita Kar, Sandesh K. Singh, Vivek K. Barnwal:
Symmetric key image encryption using chaotic Rossler system. 2145-2152 - Zhaohong Li, Zhenzhen Zhang, Yunqing Shi:

Distinguishing computer graphics from photographic images using a multiresolution approach based on local binary patterns. 2153-2159
- Mee Hong Ling, Kok-Lim Alvin Yau, Geong Sen Poh:

Trust and reputation management in cognitive radio networks: a survey. 2160-2179
- Hongmei Zhang, Yongzhuang Wei, Rongxing Lu, Rose Qingyang Hu:

Call for papers: systematic network optimizations for security parameters (security and communication networks). 2180
- Ryan K. L. Ko

, Markus Kirchberg, Bu-Sung Lee
:
Special issue on trust and security in cloud computing. 2183-2184
- Sheikh Mahbub Habib

, Sebastian Ries, Max Mühlhäuser
, Prabhu Varikkattu:
Towards a trust management system for cloud computing marketplaces: using CAIQ as a trust information source. 2185-2200 - Yujing Liu, Wei Peng

, Jinshu Su
:
A study of IP prefix hijacking in cloud computing networks. 2201-2210 - Xingwen Zhao, Hui Li:

Achieving dynamic privileges in secure data sharing on cloud storage. 2211-2224 - K. Rahimunnisa

, P. Karthigaikumar
, Soumiya Rasheed, J. Jayakumar, S. Suresh Kumar:
FPGA implementation of AES algorithm for high throughput using folded parallel architecture. 2225-2236
Volume 7, Number 12, December 2014
- Yan-Xiao Liu, Ching-Nung Yang

, Po-Han Yeh:
Reducing shadow size in smooth scalable secret image sharing. 2237-2244 - Abdurrahman Pektas, Tankut Acarman

:
A dynamic malware analyzer against virtual machine aware malicious software. 2245-2257 - Bo Zhang, Zhenhua Huang, Jian Yu, Yang Xiang:

Trust computation for multiple routes recommendation in social network sites. 2258-2276 - Ming Wan, Hongke Zhang, Tin Yu Wu, Chi-Hsiang Lo:

Anomaly detection and response approach based on mapping requests. 2277-2292 - Xiaoming Wang, Yanchun Lin, Guoxiang Yao:

Data integrity verification scheme with designated verifiers for dynamic outsourced databases. 2293-2301 - Jianghong Wei

, Xuexian Hu, Wenfen Liu:
Traceable attribute-based signcryption. 2302-2317 - Renjian Feng, Shenyun Che, Xiao Wang, Jiangwen Wan:

An incentive mechanism based on game theory for trust management. 2318-2325 - Yang Tan

, Shaohua Tang, Ting Wang:
Adding variables variation to Rainbow-like scheme to enhance its security level against MinRank attack. 2326-2334 - Haijun Pan, Edwin S. H. Hou, Nirwan Ansari

:
Enhanced name and vote separated E-voting system: an E-voting system that ensures voter confidentiality and candidate privacy. 2335-2344 - Haifeng Qian, Yuan Zhou, Zhibin Li, Zhijie Chen:

Generating signatures with optimal overhead: practical paddings for signature schemes. 2345-2355 - Mustapha Benssalah, Mustapha Djeddou, Karim Drouiche:

Security enhancement of the authenticated RFID security mechanism based on chaotic maps. 2356-2372 - Zheng Yang

, Fei Guo:
Authenticated key exchange with synchronized state. 2373-2388 - Harkeerat Singh Bedi, Sajjan G. Shiva, Sankardas Roy:

A game inspired defense mechanism against distributed denial of service attacks. 2389-2404 - Liping Zhang, Shanyu Tang, Zhihua Cai:

Cryptanalysis and improvement of password-authenticated key agreement for session initiation protocol using smart cards. 2405-2411 - Marcos A. Simplício Jr.

, Mateus A. S. Santos, Rodrigo R. Leal, Marco A. L. Gomes, Walter Akio Goya:
SecureTCG: a lightweight cheating-detection protocol for P2P multiplayer online trading card games. 2412-2431 - Chunsheng Gu, Jixing Gu:

Known-plaintext attack on secure kNN computation on encrypted databases. 2432-2441 - Ganesh Reddy Karri

, P. Santhi Thilagam
:
Reputation-based cross-layer intrusion detection system for wormhole attacks in wireless mesh networks. 2442-2462 - Nina Skorin-Kapov, Amornrat Jirattigalachote, Lena Wosinska

:
An integer linear programming formulation for power equalization placement to limit jamming attack propagation in transparent optical networks. 2463-2468 - Han-Yu Lin:

Chaotic map-based three-party authenticated key agreement. 2469-2474
- Nourhene Ellouze

, Mohamed Allouche
, Habib Ben Ahmed
, Slim Rekhis
, Noureddine Boudriga:
Security of implantable medical devices: limits, requirements, and proposals. 2475-2491
- Chi-Yuan Chen, Han-Chieh Chao

:
A survey of key distribution in wireless sensor networks. 2495-2508 - Daisuke Takahashi, Yang Xiao

, Ke Meng:
Virtual flow-net for accountability and forensics of computer and network systems. 2509-2526 - Chin-Ling Chen, Chun-Yi Wu:

An RFID system yoking-proof protocol conforming to EPCglobal C1G2 standards. 2527-2541 - Guangjie Han, Wen Shen, Trung Quang Duong

, Mohsen Guizani, Takahiro Hara:
A proposed security scheme against Denial of Service attacks in cluster-based wireless sensor networks. 2542-2554 - Jong-Hyouk Lee, Thierry Ernst, Xiaomin Ma:

Performance analysis of secure beaconing messages for GeoNetworking. 2555-2563 - Yang Xiao

, Songqing Yue, Bo Fu, Suat Özdemir
:
GlobalView: building global view with log files in a distributed/networked system for accountability. 2564-2586 - Yu-Yi Chen, Der-Chen Huang, Meng-Lin Tsai:

The design of conditional access mechanism for ubiquitous video on demand services. 2587-2595 - Ming-Huang Guo:

A simple and rapid authentication protocol in mobile networks. 2596-2601 - Wojciech Mazurczyk

, Józef Lubacz
, Krzysztof Szczypiorski
:
On steganography in lost audio packets. 2602-2615 - Seokhee Lee, Keun-Gi Lee, Jong Hyuk Park, Sangjin Lee:

An on-site digital investigation methodology for data leak case. 2616-2626 - Hai-Cheng Chu:

The digital forensics of GPS path records and the discovery of previous Facebook IDs on a Pocket PC PDA. 2627-2636
- James Clarke, Stefanos Gritzalis

, Jianying Zhou
, Rodrigo Roman:
Protecting the internet of things. 2637-2638
- Sandra Dominikus, Stefan Kraxberger:

Secure Communication with RFID tags in the Internet of Things. 2639-2653 - Shahid Raza

, Simon Duquennoy, Joel Höglund, Utz Roedig
, Thiemo Voigt:
Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN. 2654-2668 - Evangelos Rekleitis

, Panagiotis Rizomiliotis, Stefanos Gritzalis
:
How to protect security and privacy in the IoT: a policy-based RFID tag management protocol. 2669-2683 - Di Ma

, Nitesh Saxena:
A context-aware approach to defend against unauthorized reading and relay attacks in RFID systems. 2684-2695 - Guangdong Bai

, Lin Yan, Liang Gu, Yao Guo
, Xiangqun Chen:
Context-aware usage control for web of things. 2696-2712 - Hamza Ghani, Abdelmajid Khelil

, Neeraj Suri
, György Csertán, László Gönczy, Gábor Urbanics, James Clarke:
Assessing the security of internet-connected critical infrastructures. 2713-2725
- James Clarke, Stefanos Gritzalis

, Jianying Zhou
, Rodrigo Roman:
Security in a completely interconnected world. 2726-2727
- Jan Henrik Ziegeldorf, Oscar García Morchon, Klaus Wehrle

:
Privacy in the Internet of Things: threats and challenges. 2728-2742 - Juan Caubet

, Oscar Esparza
, Jose L. Muñoz
, Juanjo Alins, Jorge Mata-Díaz:
RIAPPA: a Robust Identity Assignment Protocol for P2P overlays. 2743-2760 - David Rebollo-Monedero

, Jordi Forné
, Esteve Pallarès
, Javier Parra-Arnau, Carolina Tripp Barba, Luis Urquiza-Aguiar
, Mónica Aguilar-Igartua
:
On collaborative anonymous communications in lossy networks. 2761-2777 - Ana Nieto

, Javier López
:
Analysis and taxonomy of security/QoS tradeoff solutions for the future internet. 2778-2803 - Nikos Fotiou, Dirk Trossen, Giannis F. Marias, Alexandros Kostopoulos, George C. Polyzos

:
Enhancing information lookup privacy through homomorphic encryption. 2804-2814 - Maria Vasilevskaya, Linda Ariani Gunawan, Simin Nadjm-Tehrani, Peter Herrmann

:
Integrating security mechanisms into embedded systems by domain-specific modelling. 2815-2832

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














