


default search action
Security and Communication Networks, Volume 8
Volume 8, Number 1, January 2015
- Xueqi Cheng, Jinhong Yuan

, Ali Tajer, Aiqun Hu, Wanlei Zhou
:
Special issue on recent advances in network and information security - security and communication networks journal. 1
- Tao Li, Aiqun Hu:

Efficient trust chain model based on turing machine. 2-12 - Lei Jiang, Jianlong Tan, Qiu Tang:

An efficient sparse matrix format for accelerating regular expression matching on field-programmable gate arrays. 13-24 - Xian Liu:

Secrecy capacity of wireless channels subject to log-normal fading. 25-35 - Jian Li, DanJie Song, Ruifan Li, Xiaofeng Lu:

A quantum secure direct communication protocol based on four-qubit cluster state. 36-42 - Shengbao Wang, Zhenfu Cao

, Qi Xie, Wenhao Liu:
Practical identity-based encryption in multiple private key generator (PKG) environments. 43-50 - Lejun Fan, Yuanzhuo Wang, Xueqi Cheng, Jinming Li, Shuyuan Jin:

Privacy theft malware multi-process collaboration analysis. 51-67 - Buyun Qu, Zhibin Zhang, Xingquan Zhu

, Dan Meng:
An empirical study of morphing on behavior-based network traffic classification. 68-79 - Xiang Cui, Lihua Yin, Shuyuan Jin, Zhiyu Hao, Shuhao Li:

Botnet spoofing: fighting botnet with itself. 80-89
Volume 8, Number 2, January 2015
- Wei Yu

, David W. Griffith, Linqiang Ge, Sulabh Bhattarai, Nada Golmie:
An integrated detection system against false data injection attacks in the Smart Grid. 91-109 - Sara Nazari

, Amir-Masoud Eftekhari-Moghadam
, Mohammad Shahram Moin
:
A novel image steganography scheme based on morphological associative memory and permutation schema. 110-121 - Ji-Jian Chin

, Rouzbeh Behnia, Swee-Huay Heng
, Raphael C.-W. Phan
:
Cryptanalysis of a certificateless identification scheme. 122-125 - Yuh-Min Tseng, Tung-Tso Tsai, Sen-Shan Huang:

Enhancement on strongly secure group key agreement. 126-135 - Niu Liu, Shaohua Tang, Lingling Xu, Daojing He

:
Analyses of several recently proposed group key management schemes. 136-148 - Fahad Bin Muhaya:

Cryptanalysis and security enhancement of Zhu's authentication scheme for Telecare medicine information system. 149-158 - Hadi Kaveh, Mohammad Shahram Moin

:
A high-capacity and low-distortion 3D polygonal mesh steganography using surfacelet transform. 159-167 - Shenyun Che, Renjian Feng, Xuan Liang, Xiao Wang:

A lightweight trust management based on Bayesian and Entropy for wireless sensor networks. 168-175 - Youngsang Shin, Steven A. Myers, Minaxi Gupta, Predrag Radivojac:

A link graph-based approach to identify forum spam. 176-188 - Ya-Fen Chang:

A flexible hierarchical access control mechanism enforcing extension policies. 189-201 - Yun Song, Zhihui Li, Yongming Li

, Jing Li:
A new multi-use multi-secret sharing scheme based on the duals of minimal linear codes. 202-211 - Ahmed Moumena, Abdelrezzak Guessoum:

Fast anomaly detection using Boxplot rule for multivariate data in cooperative wideband cognitive radio in the presence of jammer. 212-219 - Tayeb Kenaza, Othmane Nait Hamoud

, Nadia Nouali-Taboudjemat:
Efficient centralized approach to prevent from replication attack in wireless sensor networks. 220-231 - Shuzhen Wang, Zonghua Zhang, Farid Naït-Abdesselam:

Towards cross-layer approaches to coping with misbehavior in mobile ad hoc networks: an anatomy of reputation systems. 232-244 - Lili Xu, Fan Wu

:
An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity. 245-260 - Mostafa Mohammadpourfard, Mohammad-Ali Doostari, Mohammad Bagher Ghaznavi Ghoushchi

, Nafiseh Shakiba:
A new secure Internet voting protocol using Java Card 3 technology and Java information flow concept. 261-283 - Yilei Wang, Duncan S. Wong, Chuan Zhao, Qiuliang Xu:

Fair two-party computation with rational parties holding private types. 284-297 - Jiageng Chen

, Mohammad Saiful Islam Mamun, Atsuko Miyaji
:
An efficient batch verification system and its effect in a real time VANET environment. 298-310 - Zhenzhen Zhang, Jianjun Hou, Qinglong Ma, Zhaohong Li:

Efficient video frame insertion and deletion detection based on inconsistency of correlations between local binary pattern coded frames. 311-320 - Tinu Baby, Aswani Kumar Cherukuri:

On query execution over encrypted data. 321-331
- Youssef El Hajj Shehadeh, Dieter Hogrefe:

A survey on secret key generation mechanisms on the physical layer in wireless networks. 332-341
Volume 8, Number 3, February 2015
- Cristina Rottondi

, Marco Savi
, Giacomo Verticale
, Christoph Krauß
:
Mitigation of peer-to-peer overlay attacks in the automatic metering infrastructure of smart grids. 343-359 - Samir Moalla, Maher Rahmouni:

Trust path: a distributed model of search paths of trust in a peer-to-peer system. 360-367 - Mohammad Nauman

, Sohail Khan
, Abu Talib Othman, Shahrulniza Musa
:
Realization of a user-centric, privacy preserving permission framework for Android. 368-382 - Shijun Zhao, Li Xi, Qianying Zhang, Yu Qin, Dengguo Feng:

Security analysis of SM2 key exchange protocol in TPM2.0. 383-395 - Zhi-Yi Shao, Bo Yang:

Private set intersection via public key encryption with keywords search. 396-402 - Ignacio Sánchez, Gianmarco Baldini, David Shaw, Raimondo Giuliani:

Experimental passive eavesdropping of Digital Enhanced Cordless Telecommunication voice communications through low-cost software-defined radios. 403-417 - Soumya Maity, Soumya Kanti Ghosh, Ehab Al-Shaer:

PoliCon: a policy conciliation framework for heterogeneous mobile ad hoc networks. 418-430 - Mohammad Ehdaie, Nikolaos Alexiou, Mahmoud Ahmadian-Attari, Mohammad Reza Aref, Panos Papadimitratos

:
Key splitting: making random key distribution schemes resistant against node capture. 431-445 - Kao Zhao, Hai Jin, Deqing Zou, Weiqi Dai, Yang Xiang

:
A privacy-preserving location tracking system for smartphones based on cloud storage. 446-458 - L. Xue, Guozi Sun:

Design and implementation of a malware detection system based on network behavior. 459-470 - Kwangsu Lee

, Intae Kim
, Seong Oun Hwang:
Privacy preserving revocable predicate encryption revisited. 471-485 - Ioannis Psaroudakis, Vasilios Katos

, Pavlos S. Efraimidis:
A novel mechanism for anonymizing Global System for Mobile Communications calls using a resource-based Session Initiation Protocol community network. 486-500 - Qi Li, Jianfeng Ma, Rui Li, Jinbo Xiong, Ximeng Liu

:
Large universe decentralized key-policy attribute-based encryption. 501-509 - Masoud Afrakhteh, Jeong-A Lee

:
Adaptive least significant bit matching revisited with the help of error images. 510-515 - Shakil Ahmed, Khairulmizam Samsudin

, Abdul Rahman Ramli, Fakhrul Zaman Rokhani
:
Advanced Encryption Standard-XTS implementation in field programmable gate array hardware. 516-522
Volume 8, Number 4, March 2015
- Fotios Gogoulos, Anna Antonakopoulou

, Georgios V. Lioudakis
, Aziz S. Mousas, Dimitra I. Kaklamani, Iakovos S. Venieris:
An authorization model for cross-enterprise collaborations. 523-539 - Lili Wei, Dimitrios A. Pados, Stella N. Batalama, Rose Qingyang Hu, Michael J. Medley:

Optimal multiuser spread-spectrum data hiding in digital images. 540-549 - Zhengan Huang, Shengli Liu, Kefei Chen:

n-Evasive all-but-many lossy trapdoor function and its constructions. 550-564 - Walid Y. Zibideh, Mustafa M. Matalgah:

Modified data encryption standard encryption algorithm with improved error performance and enhanced security in wireless fading channels. 565-573 - Chin-Chen Chang, Chin-Yu Sun, Ting-Fang Cheng:

A dependable storage service system in cloud environment. 574-588 - Vijey Thayananthan, Ahmed Alzahrani

, Muhammad Shuaib Qureshi:
Efficient techniques of key management and quantum cryptography in RFID networks. 589-597 - Depeng Li, Zeyar Aung

, John R. Williams, Abel Sanchez:
Efficient and fault-diagnosable authentication architecture for AMI in smart grid. 598-616 - Liling Cao, Wancheng Ge:

Analysis and improvement of a multi-factor biometric authentication scheme. 617-625 - Jian Wang, Yiwen Xu, Jindong Zhang, Yanheng Liu, Weiwen Deng:

SAV4AV: securing authentication and verification for ad hoc vehicles. 626-636 - Alekha Kumar Mishra, Ashok Kumar Turuk

:
Residual energy-based replica detection scheme for mobile wireless sensor networks. 637-648 - Fahimeh Rezaei, Michael Hempel

, Hamid Sharif:
A novel automated framework for modeling and evaluating covert channel algorithms. 649-660 - Fiona Jiazi Liu, Ahmed Refaey, Xianbin Wang

, Helen Tang:
Reliability enhancement for CIR-based physical layer authentication. 661-671 - Zhiqiang Liu, Ya Liu, Qingju Wang, Dawu Gu, Wei Li:

Meet-in-the-middle fault analysis on word-oriented substitution-permutation network block ciphers. 672-681 - Min Zhang, Jiashu Zhang, Ying Zhang:

Remote three-factor authentication scheme based on Fuzzy extractors. 682-693 - Mohsen Toorani

:
Cryptanalysis of a new protocol of wide use for email with perfect forward secrecy. 694-701
Volume 8, Number 5, March 2015
- Ping Qi, Long-shu Li:

A fault recovery-based scheduling algorithm for cloud service reliability. 703-714 - Fu-Hau Hsu, Li-Han Chen

, Chia-Jun Lin:
Defeat scanning worms in cyber warfare. 715-726 - Che-Hung Liu, Jen-Sheng Wang, Chih-Chiang Peng, Joseph Z. Shyu:

Evaluating and selecting the biometrics in network security. 727-739 - Joonsang Baek

, Young-Ji Byon
, Eman Hableel, Mahmoud Al-Qutayri
:
Making air traffic surveillance more reliable: a new authentication framework for automatic dependent surveillance-broadcast (ADS-B) based on online/offline identity-based signature. 740-750 - Ashok Singh Sairam

, Sangita Roy
, Rishikesh Sahay
:
Coloring networks for attacker identification and response. 751-768 - Hailong Zhang, Yongbin Zhou, Dengguo Feng:

Mahalanobis distance similarity measure based distinguisher for template attack. 769-777 - Zheng Yang

:
A new efficient signcryption scheme in the standard model. 778-789 - Enes Pasalic

, Samed Bajric, Milan Djordjevic
:
On cross-correlation properties of S-boxes and their design using semi-bent functions. 790-800 - Kee Sung Kim, Ik Rae Jeong:

A new certificateless signature scheme under enhanced security models. 801-810 - Qingbin Wang, Shaozhen Chen:

Attribute-based signature for threshold predicates from lattices. 811-821 - Mohammad GhasemiGol

, Abbas Ghaemi Bafghi:
E-correlator: an entropy-based alert correlation system. 822-836 - Ilija Basicevic, Stanislav Ocovaj, Miroslav Popovic

:
Evaluation of entropy-based detection of outbound denial-of-service attacks in edge networks. 837-844 - Muhammad Zubair, Xiangwei Kong, Saeed Mahfooz:

DMAM: distributed mobility and authentication mechanism in next generation networks. 845-863 - Karan Verma

, Halabi Hasbullah:
Bloom-filter based IP-CHOCK detection scheme for denial of service attacks in VANET. 864-878
Volume 8, Number 6, April 2015
- Liao Zhenhua, Wang Jinmiao, Lang Bo:

A ciphertext-policy hidden vector encryption scheme supporting multiuser keyword search. 879-887 - Guang-Gang Geng

, Xiao-Dong Lee, Yan-Ming Zhang:
Combating phishing attacks via brand identity and authorization features. 888-898 - Chuan Qin

, Chin-Chen Chang, Gwoboa Horng, Ying-Hsuan Huang, Yen-Chang Chen:
Reversible data embedding for vector quantization compressed images using search-order coding and index parity matching. 899-906 - Xiaoming Hu, Jian Wang, Huajie Xu, WenAn Tan:

A short and highly efficient identity-based designated verifier proxy signature scheme. 907-916 - Mahdiyeh Ali Mohammadi, Ali A. Pouyan:

Defense mechanisms against Sybil attack in vehicular ad hoc network. 917-936 - Wenfang Zhang, Xiaomin Wang, Muhammad Khurram Khan

:
A virtual bridge certificate authority-based cross-domain authentication mechanism for distributed collaborative manufacturing systems. 937-951 - Yuede Ji, Qiang Li

, Yukun He, Dong Guo:
BotCatch: leveraging signature and behavior for bot detection. 952-969 - Chun-Ying Huang

, Ying-Dar Lin, Peng-Yu Liao, Yuan-Cheng Lai:
Stateful traffic replay for web application proxies. 970-981 - Chandramohan Dhasarathan

, Vengattaraman Thirumal
, Dhavachelvan Ponnurangam:
Data privacy breach prevention framework for the cloud service. 982-1005 - Hao Zhang, Nenghai Yu, Yonggang Wen:

Mobile cloud computing based privacy protection in location-based information survey applications. 1006-1025 - Rong Jiang

, Rongxing Lu, Jun Luo, Chengzhe Lai, Xuemin Sherman Shen
:
Efficient self-healing group key management with dynamic revocation and collusion resistance for SCADA in smart grid. 1026-1039 - Seyed Hossein Erfani

, Hamid Haj Seyyed Javadi
, Amir Masoud Rahmani
:
A dynamic key management scheme for dynamic wireless sensor networks. 1040-1049 - R. Kumar, G. Kousalya

:
Transactions based secure routing in wireless networks: a cognitive science approach. 1050-1062 - Mohammad Masdari, Sam Jabbehdari

, Jamshid Bagherzadeh
:
Secure publish/subscribe-based certificate status validations in mobile ad hoc networks. 1063-1076 - Ali Noorollahi Ravari, Mehran S. Fallah:

A nonmonotonic modal authorization logic for pervasive computing. 1077-1091 - Ismail Adel Al-Taharwa

, Hahn-Ming Lee, Albert B. Jeng, Kuo-Ping Wu, Cheng-Seen Ho, Shyi-Ming Chen
:
JSOD: JavaScript obfuscation detector. 1092-1107 - Yuesheng Zhu, Limin Ma, Jinjiang Zhang:

An enhanced Kerberos protocol with non-interactive zero-knowledge proof. 1108-1117 - Zheng Yang

, Wu Yang:
A practical strongly secure one-round authenticated key exchange protocol without random oracles. 1118-1131 - Tao Feng, Shining Han, Xian Guo, Donglin Ma:

A new method of formalizing anonymity based on protocol composition logic. 1132-1140
- Hani Mahmoud Almimi

, Azman Samsudin
, Shahram Jahani:
Elliptic-curve scalar multiplication algorithm using ZOT structure. 1141-1154
Volume 8, Number 7, May 2015
- Fangyong Hou, Hongjun He:

Ultra simple way to encrypt non-volatile main memory. 1155-1168 - Seonho Choi, Kun Sun, Hyeonsang Eom, Edward Jung:

Multi-source broadcast authentication with Combined Key Chains for wireless ad hoc networks. 1169-1178 - Abdelfattah Amamra, Jean-Marc Robert

, Chamseddine Talhi:
Enhancing malware detection for Android systems using a system call filtering and abstraction process. 1179-1192 - Abdelouahid Derhab, Abdelghani Bouras

:
Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems. 1193-1212 - Hui Zhu, Xiaodong Lin, Yun Zhang, Rongxing Lu:

Duth: a user-friendly dual-factor authentication for Android smartphone devices. 1213-1222 - Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo

:
A provably secure identity-based proxy ring signature based on RSA. 1223-1236
- Alfredo De Santis

, Giancarlo De Maio, Umberto Ferraro Petrillo:
Using HTML5 to prevent detection of drive-by-download web malware. 1237-1255
- Jun-Po Yang, Wei-Guo Zhang:

Generating highly nonlinear resilient Boolean functions resistance against algebraic and fast algebraic attacks. 1256-1264 - Sevil Sen

:
Sequence-based masquerade detection for different user groups. 1265-1278 - Yao Shen, Liusheng Huang, Xiaorong Lu, Wei Yang:

A novel comprehensive steganalysis of transmission control protocol/Internet protocol covert channels based on protocol behaviors and support vector machine. 1279-1290 - Le Chen, Rongxing Lu, Khalid Nawaf Alharbi, Xiaodong Lin, Zhenfu Cao

:
ReDD: recommendation-based data dissemination in privacy-preserving mobile social networks. 1291-1305 - Atefeh Asayesh, Mohammad Ali Hadavi, Rasool Jalili:

(t, k)-Hypergraph anonymization: an approach for secure data publishing. 1306-1317 - Sang-Ho Na, Eui-Nam Huh:

A broker-based cooperative security-SLA evaluation methodology for personal cloud computing. 1318-1331 - Chia-Hui Liu, Fong-Qi Lin

, Chin-Sheng Chen, Tzer-Shyong Chen
:
Design of secure access control scheme for personal health record-based cloud healthcare service. 1332-1346 - Orhan Ermis, Serif Bahtiyar

, Emin Anarim
, M. Ufuk Çaglayan
:
An improved conference-key agreement protocol for dynamic groups with efficient fault correction. 1347-1359 - Salima Smaoui, Mohammad S. Obaidat

, Faouzi Zarai
, Kuei-Fang Hsiao:
A new secure and efficient scheme for network mobility management. 1360-1377
- Rajeev Singh, Teek Parval Sharma

:
On the IEEE 802.11i security: a denial-of-service perspective. 1378-1407 - Xing-Tian Wang, Mingchu Li, Szu-Ting Wang, Chin-Chen Chang:

Reversible data hiding exploiting high-correlation regulation for high-quality images. 1408-1421 - Yeu-Pong Lai, Wei-Feng Wu:

The defense in-depth approach to the protection for browsing users against drive-by cache attacks. 1422-1430
Volume 8, Number 8, May 2015
- Yang Ming, Yumin Wang:

Proxy signcryption scheme in the standard model. 1431-1446
- Shyh-Yih Wang, Wu-Chuan Yang, Ying-Jen Lin:

Balanced double subset difference broadcast encryption scheme. 1447-1460 - Zheng Yang

:
An efficient strongly secure authenticated key exchange protocol without random oracles. 1461-1473 - Qingkuan Dong, Wenxiu Ding

, Lili Wei:
Improvement and optimized implementation of cryptoGPS protocol for low-cost radio-frequency identification authentication. 1474-1484
- Zhenhua Chen, Shundong Li, Qianhong Wu, Qiong Huang:

A distributed secret share update scheme with public verifiability for ad hoc network. 1485-1493
- Xiuxia Tian, Ling Huang, Yong Wang, Chaofeng Sha, Xiaoling Wang:

DualAcE: fine-grained dual access control enforcement with multi-privacy guarantee in DaaS. 1494-1508 - Jianhong Zhang, Wenjing Tang:

On the security of Kim et al. two ID-based broadcast signcryption schemes. 1509-1514 - Masoud Afrakhteh, Jeong-A Lee

:
Parallel modular steganography using error images. 1515-1524 - Jinyong Chang, Rui Xue:

Practical key-dependent message chosen-ciphertext security based on decisional composite residuosity and quadratic residuosity assumptions. 1525-1536 - Hong Zhu

, Zhipeng Wang, Kevin Lü
, Meiyi Xie, Xiang Zou, Bing Chen:
A distributed scheme for row-based computational private information retrieval. 1537-1546 - Keita Emura

, Atsuko Miyaji
, Mohammad Shahriar Rahman
, Kazumasa Omote:
Generic constructions of secure-channel free searchable encryption with adaptive security. 1547-1560 - Tooska Dargahi

, Hamid H. S. Javadi
, Mehdi Hosseinzadeh
:
Application-specific hybrid symmetric design of key pre-distribution for wireless sensor networks. 1561-1574 - Miaomiao Tian, Liusheng Huang:

Certificateless and certificate-based signatures from lattices. 1575-1586 - Hassan Asgharian, Ahmad Akbari

, Bijan Raahemi:
Feature engineering for detection of Denial of Service attacks in session initiation protocol. 1587-1601 - Chin-Chen Chang, Hai-Duong Le:

A provably secure smart card-based authenticated group key exchange protocol. 1602-1607 - Chi-Tung Chen, Cheng-Chi Lee

:
A two-factor authentication scheme with anonymity for multi-server environments. 1608-1625
Volume 8, Number 9, June 2015
- Mubashar Khan

, Naveed Ahmed Azam:
Right translated AES gray S-boxes. 1627-1635 - Weiwei Liu

, Guangjie Liu, Yuewei Dai:
Damage-resistance matrix embedding framework: the contradiction between robustness and embedding efficiency. 1636-1647 - Rong Cheng, Fangguo Zhang

:
Lattice-based obfuscation for re-encryption functions. 1648-1658 - Maryam Asadzadeh Kaljahi, Ali Payandeh, Mohammad Bagher Ghaznavi Ghoushchi

:
TSSL: improving SSL/TLS protocol by trust model. 1659-1671 - Wioletta Wójtowicz, Marek R. Ogiela

:
Biometric watermarks based on face recognition methods for authentication of digital images. 1672-1687 - Hongli Zhang, Dongliang Xu, Zhihong Tian, Yujian Fan:

An efficient parallel algorithm for exact multi-pattern matching. 1688-1697 - Sasan Adibi:

A multilayer non-repudiation system: a Suite-B approach. 1698-1706 - Songlin Sun, Bo Rong, Yi Qian:

Artificial frequency selective channel for covert cyclic delay diversity orthogonal frequency division multiplexing transmission. 1707-1716 - Hsiao-Ching Lin, Chinyang Henry Tseng, Hui-Tang Lin:

MoTIVE: mobile two-hop integrity validation for emergency vehicle routing. 1717-1724 - Dur-e-Shahwar Kundi, Arshad Aziz, Majida Kazmi:

An efficient single unit T-box/T-1-box implementation for 128-bit AES on FPGA. 1725-1731 - Vanga Odelu

, Ashok Kumar Das, Adrijit Goswami:
A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks. 1732-1751 - Santanu Chatterjee, Ashok Kumar Das:

An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks. 1752-1771 - Sina Khoshabi Nobar, Javad Musevi Niya

:
Robust mitigation of selfish misbehavior in wireless networks. 1772-1779 - Yih-Jou Tzang, Hong-Yi Chang, Chih-Hsuan Tzang:

Enhancing the performance and security against media-access-control table overflow vulnerability attacks. 1780-1793 - Lein Harn, Guang Gong:

Conference key establishment protocol using a multivariate polynomial and its applications. 1794-1800 - Kai Zhang

, Jie Guan, Xuliang Fei:
Improved conditional differential cryptanalysis. 1801-1811
- Yue Wu, Yimeng Zhao, Michel Riguidel, Guanghao Wang, Ping Yi:

Security and trust management in opportunistic networks: a survey. 1812-1827
Volume 8, Number 10, July 2015
Editorial
- Jinshu Su

, Xiaofeng Wang, Weisong Shi
, Indrakshi Ray:
Security, trust, and resilience of distributed networks and systems. 1829-1830
- Sheng Wen

, Di Wu
, Ping Li, Yang Xiang
, Wanlei Zhou
, Guiyi Wei:
Detecting stepping stones by abnormal causality probability. 1831-1844 - Sun Hao, Wen Wang, Huabiao Lu, Peige Ren:

AutoMal: automatic clustering and signature generation for malwares based on the network flow. 1845-1854 - Tong Zhao, Shanbo Lu, Wei Yan, Xiaoming Li:

A connectivity resilient dynamic multi-channel assignment method for VANET. 1855-1864 - Wenzhong Guo, Jia Ye Chen, Guolong Chen

, Haifeng Zheng:
Trust dynamic task allocation algorithm with Nash equilibrium for heterogeneous wireless sensor network. 1865-1877 - Xiaohui Kuang, Li Liu, Qiang Liu, Xiang Li:

A clustering approach based on convergence degree chain for wireless sensor networks. 1878-1889 - Kai Shuang, Peng Zhang, Sen Su:

Comb: a resilient and efficient two-hop lookup service for distributed communication system. 1890-1903 - Yang Luo, Chunhe Xia, Liangshuang Lv, Zhao Wei, Yazhuo Li:

Modeling, conflict detection, and verification of a new virtualization role-based access control framework. 1904-1925 - Pingping Lin, Jun Bi, Yangyang Wang:

WEBridge: west-east bridge for distributed heterogeneous SDN NOSes peering. 1926-1942 - Ning Hu, BaoSheng Wang, Xin Liu:

Cooperative monitoring BGP among autonomous systems. 1943-1957 - René Mayrhofer

:
An architecture for secure mobile devices. 1958-1970
Volume 8, Number 11, July 2015
- Jia-Lun Tsai, Nai-Wei Lo:

Secure chaotic maps-based authenticated key agreement protocol without smartcard for multi-server environments. 1971-1978 - Jiguo Li, Jingjing Zhao, Yichen Zhang:

Certificateless online/offline signcryption scheme. 1979-1990 - Mansour Alsaleh, Abdulrahman Alarifi, Abdullah Alqahtani, AbdulMalik S. Al-Salman

:
Visualizing web server attacks: patterns in PHPIDS logs‡. 1991-2003 - Ying-Dar Lin, Yuan-Cheng Lai, Chun-Nan Lu, Peng-Kai Hsu, Chia-Yin Lee:

Three-phase behavior-based detection and classification of known and unknown malware. 2004-2015 - Charalampos Manifavas, Konstantinos Fysarakis

, Alexandros Papanikolaou
, Ioannis Papaefstathiou
:
Embedded Systems Security: A Survey of EU Research Efforts. 2016-2036
- Muhammad Aamir, Syed Mustafa Ali Zaidi:

Denial-of-service in content centric (named data) networking: a tutorial and state-of-the-art survey. 2037-2059
Volume 8, Number 12, August 2015
- Fábio Borges

, Raqueline A. M. Santos
, Franklin L. Marquezino
:
Preserving privacy in a smart grid scenario using quantum mechanics. 2061-2069 - S. Mobarakeh Moosavirad, Peyman Kabiri

, Hamidreza Mahini
:
Rashnu: a Wi-Fi intrusion response scheme. 2070-2078 - Shihong Zou, Jing Zhang, Xiaodong Lin:

An effective behavior-based Android malware detection system. 2079-2089 - Simona Ramanauskaite

, Nikolaj Goranin
, Antanas Cenys
, Jonas Juknius:
Modelling influence of Botnet features on effectiveness of DDoS attacks. 2090-2101 - Wei Fei, Gaobo Yang, Leida Li, Ming Xia, Dengyong Zhang:

Detection of seam carving-based video retargeting using forensics hash. 2102-2113 - Young-joo Shin

, Kwangjo Kim:
Differentially private client-side data deduplication protocol for cloud storage services. 2114-2123 - Pablo Picazo-Sanchez

, Lara Ortiz-Martin, Pedro Peris-Lopez
, Nasour Bagheri
:
Weaknesses of fingerprint-based mutual authentication protocol. 2124-2134
- Mohammad Moradi

, Mohammad Reza Keyvanpour
:
CAPTCHA and its Alternatives: A Review. 2135-2156
Volume 8, Number 13, September 2015
- Qiqi Lai, Yupu Hu, Yuan Chen, Baocang Wang, Fenghe Wang:

New method of key-dependent message security for asymmetric encryption. 2157-2170
- Hailun Tan, Wen Hu

, Sanjay Jha
:
A remote attestation protocol with Trusted Platform Modules (TPMs) in wireless sensor networks. 2171-2188
- Jikai Teng, Chuankun Wu:

A collusion attack on asymmetric group key exchange. 2189-2193 - Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba

:
New packing method in somewhat homomorphic encryption and its applications. 2194-2213 - SK Hafizul Islam

, Muhammad Khurram Khan
, Ali M. Al-Khouri:
Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing. 2214-2231 - Yu-Chi Chen

, Raylin Tso
, Masahiro Mambo, Kaibin Huang, Gwoboa Horng:
Certificateless aggregate signature with efficient verification. 2232-2243 - Chien-Hua Tsai

, Pin-Chang Su:
Multi-document threshold signcryption scheme. 2244-2256 - Xueping Wu, Dafang Zhang, Xin Su, Wenwei Li:

Detect repackaged Android application based on HTTP traffic similarity. 2257-2266 - Cong Wang, Maode Ma, Zenghua Zhao:

An enhanced authentication protocol for WRANs in TV white space. 2267-2278 - Ibrahim F. Elashry, Yi Mu, Willy Susilo

:
A resilient identity-based authenticated key exchange protocol. 2279-2290 - Teodor Sommestad, Ulrik Franke

:
A test of intrusion alert filtering based on network information. 2291-2301 - Jun Tao, Limin Zhu, Le Chang, Jin Liu, Xiaoxiao Wang, Yaodan Hu:

Joint anti-attack scheme for channel assignment in multi-radio multi-channel wireless mesh networks. 2302-2316 - Xiaopu Ma, Ruixuan Li, Hongwei Wang, Huaqing Li:

Role mining based on permission cardinality constraint and user cardinality constraint. 2317-2328 - Jingjing Huang, Ting Jiang:

Secret key generation exploiting Ultra-wideband indoor wireless channel characteristics. 2329-2337 - Jianliang Wu

, Tingting Cui, Tao Ban, Shanqing Guo, Lizhen Cui:
PaddyFrog: systematically detecting confused deputy vulnerability in Android applications. 2338-2349 - Hongfeng Zhu:

One-time identity-password authenticated key agreement scheme based on biometrics. 2350-2360 - Michael Farcasin, Eric Chan-Tin:

Why we hate IT: two surveys on pre-generated and expiring passwords in an academic setting. 2361-2373 - V. Thanikaiselvan

, Pachiyappan Arulmozhivarman
:
RAND - STEG: an integer wavelet transform domain digital image random steganography using knight's tour. 2374-2382
Volume 8, Number 14, September 2015
Editorial
- Qilian Liang, Jian Ren, Jing Liang, Baoju Zhang, Yiming Pi, Chenglin Zhao:

Security in big data. 2383-2385
- Yujin Zhang, Chenglin Zhao, Yiming Pi, Shenghong Li, Shilin Wang:

Image-splicing forgery detection based on local binary patterns of DCT coefficients. 2386-2395 - Rong Du, Chenglin Zhao, Feng Zhao

, Shenghong Li:
Strategies of network coding against nodes conspiracy attack. 2396-2403 - Zhuo Li, Qilian Liang, Jiasong Mu, Wei Wang, Baoju Zhang:

The hybrid architecture of wireless and power line communications in HANs for Smart Grid security. 2404-2410 - Xin Yin, Yaqiu Sun:

Secure and efficient integration of big data for multi-cells based on micro images. 2411-2415 - Baoju Zhang, Qing Lei, Wei Wang, Jiasong Mu:

Distributed video coding of secure compressed sensing. 2416-2419 - Sheng Su, Haijie Yu:

Secure and efficient data collection in wireless image sensor network based on ellipse batch dispersive routing. 2420-2430 - Xin Wang, Qilian Liang, Jiasong Mu, Wei Wang, Baoju Zhang:

Physical layer security in wireless smart grid. 2431-2439 - Shitong Yuan, Jing Liang

:
Energy efficient comparator for successive approximation register ADCs with application to encryption schemes in wireless communication. 2440-2446 - Junjie Chen, Qilian Liang, Jie Wang:

Secure transmission for big data based on nested sampling and coprime sampling with spectrum efficiency. 2447-2456 - Chao Yang, Jian Ren, Jianfeng Ma:

Provable ownership of files in deduplication cloud storage. 2457-2468 - Wei Wang, Xin Zhou, Baoju Zhang, Jiasong Mu:

Anomaly detection in big data from UWB radars. 2469-2475
Volume 8, Number 15, October 2015
- Ouissem Ben Fredj:

A realistic graph-based alert correlation system. 2477-2493 - Chen Li, Rongxing Lu, Hui Li, Le Chen, Jie Chen:

PDA: a privacy-preserving dual-functional aggregation scheme for smart grid communications. 2494-2506 - Qiuhua Wang, Xiaojun Wang, Qiuyun Lv, Xueyi Ye, Yi Luo, Lin You:

Analysis of the information theoretically secret key agreement by public discussion. 2507-2523 - Jung Yeon Hwang, Dooho Choi

, Hyun Sook Cho, Boyeon Song:
New efficient batch verification for an identity-based signature scheme. 2524-2535
- Yi Sun, Qiaoyan Wen:

A general two-party bi-input private function evaluation protocol. 2536-2544
- Wes Masri, Sam Sleiman:

SQLPIL: SQL injection prevention by input labeling. 2545-2560
- Ángel Martín del Rey:

Mathematical modeling of the propagation of malware: a review. 2561-2579 - Saman Iftikhar

, Muhammad Kamran
, Zahid Anwar:
A survey on reversible watermarking techniques for relational databases. 2580-2603
Volume 8, Number 16, November 2015
- Padmini Jaikumar, Avinash C. Kak:

A graph-theoretic framework for isolating botnets in a network. 2605-2623 - Hui Feng

, Hefei Ling, Fuhao Zou, Zhengding Lu:
SVM-based anti-forensic method for spread-spectrum fingerprinting. 2624-2634 - Michael Zuba, Zhijie Shi, Zheng Peng

, Jun-Hong Cui, Shengli Zhou:
Vulnerabilities of underwater acoustic networks to denial-of-service jamming attacks. 2635-2645 - Arif Jamal Malik, Waseem Shahzad, Farrukh Aslam Khan

:
Network intrusion detection using hybrid binary PSO and random forests algorithm. 2646-2660 - Jing Liang:

Geolocation-aware security in a netcentric small unmanned-aerial-system for RF emitters. 2661-2670 - Zhen Zhong, Chenglin Zhao, Yiming Pi, Lingming Wang:

Security assurance in wireless acoustic sensors via event forecasting and detection. 2671-2677 - Xuebin Sun, Shuang Men, Chenglin Zhao, Zheng Zhou:

A security authentication scheme in machine-to-machine home network service. 2678-2686 - Junwei Zhang, Jianfeng Ma, Chao Yang:

Protocol Derivation System for the Needham-Schroeder family. 2687-2703 - Ting Jiang, Ming Yang, Yi Zhang:

Research and implementation of M2M smart home and security system. 2704-2711 - Zongjie Cao, Lijia Chen:

Security in application layer of radar sensor networks: detect friends or foe. 2712-2722 - Xin Wang, Lijun Zhang, Amit Deokar, Qilian Liang:

Enhanced security and reliability with MIMO communications for smart grid. 2723-2729 - Monther Aldwairi

, Yaser M. Khamayseh
, Mohammad Al-Masri:
Application of artificial bee colony for intrusion detection systems. 2730-2740 - Mrutyunjaya Panda, Ajith Abraham, Manas Ranjan Patra:

Hybrid intelligent systems for detecting network intrusions. 2741-2749 - Carmen Torrano-Gimenez, Hai Thanh Nguyen, Gonzalo Álvarez

, Katrin Franke:
Combining expert knowledge with automatic feature extraction for reliable web attack detection. 2750-2767 - Engin Deveci, Mehmet Ufuk Çaglayan

:
Model driven security framework for software design and verification. 2768-2792 - Gang Liu, Jing Zhang, Jinhui Liu, Yuan Zhang:

Improved Biba model based on trusted computing. 2793-2797 - Abdelnaser Rashwan, Honggang Wang

, Dalei Wu
, Xinming Huang:
Security-quality aware routing for wireless multimedia sensor networks using secret sharing. 2798-2812 - Zahid Anwar

, Waqas Ahmad Khan:
Guess who is listening in to the board meeting: on the use of mobile device applications as roving spy bugs. 2813-2825 - Danping Shi, Lei Hu, Ling Song, Siwei Sun:

Differential fault attack on Zorro block cipher. 2826-2835 - Anjia Yang

, Kaitai Liang
, Yunhui Zhuang, Duncan S. Wong, Xiaohua Jia
:
A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction. 2836-2849 - Gefei Zhang, Dan Fan, Yuqing Zhang, Xiaowei Li

, Xuefeng Liu:
A privacy preserving authentication scheme for roaming services in global mobility networks. 2850-2859 - Shiwei Chen, Chenhui Jin:

A second preimage attack on zipper hash. 2860-2866 - Hongying Zheng, Quan Yuan, Jianyong Chen:

A framework for protecting personal information and privacy. 2867-2874 - Guangyao Zhao, Bing Sun, Chao Li, Jinshu Su

:
Truncated differential cryptanalysis of PRINCE. 2875-2887 - Celine Mary Stuart, Deepthi P. Pattathil

:
A novel low-complexity scheme for improving security of NLFG-based symmetric key cryptosystem using secure concatenated RS-QCLDPC code. 2888-2900 - Feng Ye, Yi Qian, Rose Qingyang Hu:

HIBaSS: hierarchical identity-based signature scheme for AMI downlink transmission. 2901-2908 - Luyang Li, Wei-Guo Zhang:

Construction of resilient Boolean functions with high nonlinearity and good algebraic degree. 2909-2916 - Mehran Alidoost Nia

, Reza Ebrahimi Atani
, Antonio Ruiz-Martínez
:
Privacy enhancement in anonymous network channels using multimodality injection. 2917-2932 - Alessandro Aldini

:
Modeling and verification of trust and reputation systems. 2933-2946 - Mehdi Fallahpour, Shervin Shirmohammadi

, Mohammad Ghanbari
:
A high capacity data hiding algorithm for H.264/AVC video. 2947-2955
Volume 8, Number 17, November 2015
- Vahid Rafe, Ramin Hosseinpouri:

A security framework for developing service-oriented software architectures. 2957-2972 - Chris DelBello, Kazi Raihan, Tao Zhang:

Reducing energy consumption of mobile phones during data transmission and encryption for wireless body area network applications. 2973-2980 - Hongfeng Zhu:

Cryptanalysis and provable improvement of a chaotic maps-based mobile dynamic ID authenticated key agreement scheme. 2981-2991 - Habib Allah Yajam, Javad Mohajeri, Mahmoud Salmasizadeh:

Identity-based universal re-encryption for mixnets. 2992-3001 - Yaping Liu, Wenping Deng, Zhihong Liu, Feng Huang:

3S: three-signature path authentication for BGP security. 3002-3014 - Mohaddeseh Zakeri, Fatemeh Faraji Daneshgar, Maghsoud Abbaspour

:
A static heuristic approach to detecting malware targets. 3015-3027
- Jin Wook Byun:

Privacy preserving smartcard-based authentication system with provable security. 3028-3044
- Hiroshi Fujinoki:

Designs, analyses, and optimizations for attribute-shuffling obfuscation to protect information from malicious cloud administrators. 3045-3066
- Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng

, Yuan Zhou:
Signcryption KEM/tag-KEM, revisited. 3067-3082
- Mingchu Li, Shu Ma, Cheng Guo:

A novel weighted threshold secret image sharing scheme†. 3083-3093 - Wun-She Yap

, Joseph K. Liu
, Syh-Yuan Tan
, Bok-Min Goi
:
On the security of a lightweight authentication and encryption scheme for mobile ad hoc network. 3094-3098 - Yulong Wang, Yi Li:

An efficient and tunable matrix-disguising method toward privacy-preserving computation. 3099-3110 - Qin Liao

, Hong Li, Songlin Kang, Chuchu Liu:
Application layer DDoS attack detection using cluster with label based on sparse vector decomposition and rhythm matching. 3111-3120 - Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim:

Karatsuba-Block-Comb technique for elliptic curve cryptography over binary fields. 3121-3130 - Benchaa Djellali, Kheira Belarbi, Abdallah Chouarfia, Pascal Lorenz

:
User authentication scheme preserving anonymity for ubiquitous devices. 3131-3141 - Xiaopeng Yang, Wenping Ma, Chengli Zhang:

Group authenticated key exchange schemes via learning with errors. 3142-3156 - Jingyu Feng, Yuqing Zhang, Guangyue Lu, Wenxiu Zheng:

Securing cooperative spectrum sensing against ISSDF attack using dynamic trust evaluation in cognitive radio networks. 3157-3166 - Haiyan Sun, Qiaoyan Wen, Hua Zhang, Zhengping Jin:

A strongly secure identity-based authenticated key agreement protocol without pairings under the GDH assumption. 3167-3179 - Panos Kampanakis, Attila Altay Yavuz

:
BAFi: a practical cryptographic secure audit logging scheme for digital forensics. 3180-3190
- Gaoxiang Li, Di Wu, Junfeng Shen, Tingting Li:

Deciphering privacy leakage in microblogging social networks: a measurement study. 3191-3204
- Xiang Cheng, Sen Su, Yiping Teng, Ke Xiao:

Enabling secure and efficient kNN query processing over encrypted spatial data in the cloud. 3205-3218
- Yanrong Lu, Lixiang Li

, Haipeng Peng, Yixian Yang:
A biometrics and smart cards-based authentication scheme for multi-server environments. 3219-3228 - Longqi Yang

, Guyu Hu, Dong Li, Yibing Wang, Bo Jia, Zhisong Pan:
Anomaly detection based on efficient Euclidean projection. 3229-3237
- Yao Du, Xiaoqing Wang, Junfeng Wang:

A static Android malicious code detection method based on multi-source fusion. 3238-3246
- Mehdi Afsar:

A comprehensive fault-tolerant framework for wireless sensor networks. 3247-3261
- Nan Li

, Yi Mu, Willy Susilo
, Fuchun Guo
, Vijay Varadharajan
:
Vulnerabilities of an ECC-based RFID authentication scheme. 3262-3270 - Khaled Rabieh, Mohamed M. E. A. Mahmoud, Marianne Azer

, Mahmoud Allam:
A secure and privacy-preserving event reporting scheme for vehicular Ad Hoc networks. 3271-3281 - Jin Cao, Maode Ma, Hui Li:

GBAAM: group-based access authentication for MTC in LTE networks. 3282-3299
Volume 8, Number 18, December 2015
- Zhe Liu, Hwajeong Seo, Qiuliang Xu:

Performance evaluation of twisted Edwards-form elliptic curve cryptography for wireless sensor nodes. 3301-3310 - Masoud Narouei, Mansour Ahmadi, Giorgio Giacinto

, Hassan Takabi, Ashkan Sami
:
DLLMiner: structural mining for malware detection. 3311-3322 - Yuan Chen, Qingkuan Dong:

Achieving CCA security from DCCA security more efficiently by using the KEM+DEM hybrid paradigm. 3323-3334 - Padmapriya Praveenkumar

, Rengarajan Amirtharajan
, Karuppuswamy Thenmozhi
, John Bosco Balaguru Rayappan
:
Triple chaotic image scrambling on RGB - a random image encryption approach. 3335-3345 - Qihong Yu, Jiguo Li, Yichen Zhang:

Leakage-resilient certificate-based encryption. 3346-3355 - Zheng Yang

, Wu Yang, Lingyun Zhu, Daigu Zhang:
Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation. 3356-3371 - Chun-Ta Li

, Cheng-Chi Lee
, Chi-Yao Weng:
A dynamic identity-based user authentication scheme for remote login systems. 3372-3382 - Ashok Kumar Das

, Dheerendra Mishra
, Sourav Mukhopadhyay:
An anonymous and secure biometric-based enterprise digital rights management system for mobile environment. 3383-3404 - Masaya Yasuda, Yuka Sugimura:

Biometric key-binding using lattice masking†. 3405-3414 - Jaydeep Howlader, Ashis Kumar Mal:

Sealed-bid auction: a cryptographic solution to bid-rigging attack in the collusive environment. 3415-3440 - Alampallam Ramaswamy Vasudevan, Subramanian Selvakumar

:
Intraclass and interclass correlation coefficient-based feature selection in NIDS dataset. 3441-3458 - Sangeeta Bhattacharya, Subramanian Selvakumar

:
LAWRA: a layered wrapper feature selection approach for network attack detection. 3459-3468 - Fatma Hachmi, Khadouja Boujenfa, Mohamed Limam:

An optimization process to identify outliers generated by intrusion detection systems. 3469-3480 - Tytus Kurek

, Artur Lason, Marcin Niemiec
:
First step towards preserving the privacy of cloud-based IDS security policies. 3481-3491 - Yung-Ting Chuang

:
An adaptable and scalable membership management for the iTrust information search and retrieval system. 3492-3510 - Xianping Mao, Junzuo Lai, Kefei Chen, Jian Weng

, Qixiang Mei:
Efficient revocable identity-based encryption from multilinear maps. 3511-3522 - Lei Zeng, Yang Xiao

, Hui Chen
:
Auditing overhead, auditing adaptation, and benchmark evaluation in Linux. 3523-3534 - Lei Zheng, Shao-Wu Zhang:

FFT-based multidimensional linear attack on PRESENT using the 2-bit-fixed characteristic. 3535-3545 - Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim:

Optimized Karatsuba squaring on 8-bit AVR processors. 3546-3554 - Devrim Sipahi, Gökhan Dalkiliç

, Mehmet Hilal Özcanhan
:
Detecting spam through their Sender Policy Framework records. 3555-3563 - Mickaël Cazorla, Sylvain Gourgeon, Kevin Marquet, Marine Minier:

Survey and benchmark of lightweight block ciphers for MSP430 16-bit microcontroller. 3564-3579 - Guanglu Yan, Senlin Luo, Fan Feng, Limin Pan, Qamas Gul Khan Safi:

MOSKG: countering kernel rootkits with a secure paging mechanism. 3580-3591 - Zhenhua Chen, Shundong Li, Youwen Zhu, Jianhua Yan, Xinli Xu:

A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem. 3592-3601 - Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Colin Boyd:

Identity-based proxy signatures: a generic construction and a concrete scheme from RSA. 3602-3614 - Vandana Guleria, Ratna Dutta:

Universally composable issuer-free adaptive oblivious transfer with access policy. 3615-3633 - Ilija Basicevic, Stanislav Ocovaj, Miroslav Popovic

:
Use of Tsallis entropy in detection of SYN flood DoS attacks. 3634-3640 - Feng Tian, Xiaolin Gui, Jian An, Pan Yang, Xuejun Zhang, Jianqiang Zhao:

A DCT-based privacy-preserving approach for efficient data mining. 3641-3652 - Feng Wang, You-sheng Zhou, Dao-feng Li:

Dynamic threshold changeable multi-policy secret sharing scheme. 3653-3658 - Xiaoling Huang, Guodong Ye, Huajin Chai, Ou Xie:

Compression and encryption for remote sensing image using chaotic system. 3659-3666 - Ting Chen, Xiaodong Lin, Jin Huang, Abel Bacchus, Xiaosong Zhang:

An empirical investigation into path divergences for concolic execution using CREST. 3667-3681 - Sedat Akleylek

, Baris Bülent Kirlar:
New methods for public key cryptosystems based on XTR. 3682-3689 - Yilei Wang, Duncan S. Wong, Willy Susilo

, Xiaofeng Chen, Qiuliang Xu:
Achieving fairness by sequential equilibrium in rational two-party computation under incomplete information. 3690-3700 - Ali A. Kanso

, Mohammad Ghebleh
, Hassan Noura
:
A variant of Baptista's encryption scheme. 3701-3712 - Tung-Tso Tsai, Yuh-Min Tseng, Sen-Shan Huang:

Efficient revocable certificateless public key encryption with a delegated revocation authority. 3713-3725 - Payingat Jilna

, Deepthi P. Pattathil
:
A key management technique based on elliptic curves for static wireless sensor networks. 3726-3738 - Pawel Szalachowski, Tiffany Hyun-Jin Kim:

Secure broadcast in distributed networks with strong adversaries. 3739-3750 - Jianhua Yan, Licheng Wang, Mianxiong Dong, Yixian Yang, Wenbin Yao:

Identity-based signcryption from lattices. 3751-3770 - Xueli Huang, Xiaojiang Du:

Achieving data privacy on hybrid cloud. 3771-3781 - Shehzad Ashraf Chaudhry

, Mohammad Sabzinejad Farash
, Husnain Naqvi, Saru Kumari
, Muhammad Khurram Khan
:
An enhanced privacy preserving remote user authentication scheme with provable security. 3782-3795 - Mingming Jiang, Yupu Hu, Baocang Wang, F. H. Wang, Qiqi Lai:

Lattice-based multi-use unidirectional proxy re-encryption. 3796-3803 - Artur Janicki

, Wojciech Mazurczyk
, Krzysztof Szczypiorski
:
On the undetectability of transcoding steganography. 3804-3814 - Mehmet Simsek:

A new metric for flow-level filtering of low-rate DDoS attacks. 3815-3825 - Malek Al-Zewairi

, Ja'far Alqatawna, Jalal Atoum:
Risk adaptive hybrid RFID access control system. 3826-3835 - Jan Hajny, Petr Dzurenda

, Lukas Malina
:
Attribute-based credentials with cryptographic collusion prevention. 3836-3846 - Fan Wu

, Lili Xu, Saru Kumari
, Xiong Li
, Abdulhameed Alelaiwi:
A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof. 3847-3863 - Chuan-Gang Liu, I-Hsien Liu

, Wun-Sheng Yao, Jung-Shian Li:
K-anonymity against neighborhood attacks in weighted social networks. 3864-3882 - Weizhi Meng

, Wenjuan Li
, Lam-for Kwok
:
Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detection. 3883-3895 - Zhenbin Zhang, Liji Wu, An Wang, Zhaoli Mu, Xiangmin Zhang:

A novel bit scalable leakage model based on genetic algorithm. 3896-3905 - Runhua Shi, Hong Zhong, Jie Cui, Shun Zhang:

A novel one-to-many and many-to-one asymmetric encryption model and its algorithms. 3906-3913 - Reena Singh

, Timothy A. Gonsalves:
A pragmatic approach towards secure sharing of digital objects. 3914-3926 - Jiyoung Shin, S. Kancharlapalli, Michael Farcasin, Eric Chan-Tin:

SmartPass: a smarter geolocation-based authentication scheme. 3927-3938 - Tzonelih Hwang, Prosanta Gope:

IAR-CTR and IAR-CFB: integrity aware real-time based counter and cipher feedback modes. 3939-3952 - Tiago Cruz

, Paulo Simões
, Edmundo Monteiro
, Fernando Bastos, Alexandre Laranjeira:
Cooperative security management for broadband network environments. 3953-3977 - Victor Sucasas

, Saud Althunibat
, Ayman Radwan
, Hugo Marques
, Jonathan Rodriguez, Seiamak Vahid, Rahim Tafazolli
, Fabrizio Granelli
:
Lightweight security against combined IE and SSDF attacks in cooperative spectrum sensing for cognitive radio networks. 3978-3994 - Rabih Al Nachar, Elie Inaty, Patrick J. Bonnin, Yasser Alayli:

Breaking down Captcha using edge corners and fuzzy logic segmentation/recognition technique. 3995-4012 - Kee Sung Kim, Ik Rae Jeong:

Efficient verifiable data streaming. 4013-4018 - K. K. Soundra Pandian

, Kailash Chandra Ray:
Non-singular sequence folding-based pseudorandom key generation algorithm for cryptographic processor. 4019-4027 - Mete Akgün, Ali Osman Bayrak, Mehmet Ufuk Çaglayan:

Attacks and improvements to chaotic map-based RFID authentication protocol. 4028-4040 - Sohail Abbas

, Madjid Merabti, David Llewellyn-Jones:
On the evaluation of reputation and trust-based schemes in mobile ad hoc networks. 4041-4052 - Chi Cheng, Tao Jiang, Yining Liu, Mingwu Zhang:

Security analysis of a homomorphic signature scheme for network coding. 4053-4060 - Subhadeep Banik

, Sonu Jha:
Some security results of the RC4+ stream cipher. 4061-4072 - Lvchen Cao, Yuling Luo

, Jinjie Bi, Senhui Qiu, Zhenkun Lu, Jim Harkin
, Liam McDaid:
An authentication strategy based on spatiotemporal chaos for software copyright protection. 4073-4086 - Lintao Li, Jianping An, Zhongyong Wang, Xiangming Li:

Under-sampling spectrum-sparse signals based on active aliasing for low probability detection. 4087-4097 - Qi Li, Jianfeng Ma, Rui Li, Jinbo Xiong, Ximeng Liu:

Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption. 4098-4109 - Hossein Jadidoleslamy:

TMS-HCW: a trust management system in hierarchical clustered wireless sensor networks. 4110-4122 - Mehmet Sabir Kiraz

, Ziya Alper Genç, Süleyman Kardas:
Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer. 4123-4135 - Vanga Odelu

, Ashok Kumar Das
, Adrijit Goswami:
An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards. 4136-4156 - Y. Sreenivasa Rao

, Ratna Dutta:
Fully secure bandwidth-efficient anonymous ciphertext-policy attribute-based encryption. 4157-4176 - Louis Sibomana, Hung Tran, Quang Anh Tran:

Impact of secondary user communication on security communication of primary user. 4177-4190 - Zheng Yang

:
On constructing practical multi-recipient key-encapsulation with short ciphertext and public key. 4191-4202 - Nerijus Paulauskas

, Azuolas Faustas Bagdonas:
Local outlier factor use for the network flow anomaly detection. 4203-4212 - Xiao Fu, Xiaojiang Du, Bin Luo:

Data correlation-based analysis methods for automatic memory forensic. 4213-4226 - Sami Zhioua

:
The web browser factor in traffic analysis attacks. 4227-4241 - Jayapalan Avila

, Karuppusamy Thenmozhi
:
Authentication scheme to combat a primary user emulation attack against cognitive radio users. 4242-4253 - Laura Gheorghe, Bogdan Marin, Gary Gibson, Lucian Mogosanu, Razvan Deaconescu

, Valentin-Gabriel Voiculescu
, Mihai Carabas:
Smart malware detection on Android. 4254-4272 - Xin Su, Dafang Zhang, Wenjia Li, Xiaofei Wang:

AndroGenerator: An automated and configurable android app network traffic generation system. 4273-4288 - N. Renugadevi

, C. Mala:
Pruned nodes in ternary key tree during batch rekeying in group key agreement for cognitive radio ad hoc networks. 4289-4307 - Songyang Wu, Yong Zhang:

Secure cloud storage using anonymous and blackbox traceable data access control. 4308-4318 - SK Hafizul Islam

, Mohammad S. Obaidat
:
Design of provably secure and efficient certificateless blind signature scheme using bilinear pairing. 4319-4332 - Mayssaa El Rifai, Kam Wai Clifford Chan, Pramode K. Verma:

Multi-stage quantum secure communication using polarization hopping. 4333-4342 - Milad Jafari Barani

, Peyman Ayubi
, Fooad Jalili, Milad Yousefi Valandar
, Ehsan Azariyun:
Image forgery detection in contourlet transform domain based on new chaotic cellular automata. 4343-4361 - Hassen Sallay

, Sami Bourouis
:
Intrusion detection alert management for high-speed networks: current researches and applications. 4362-4372 - Nasr addin Ahmed Salem Al-maweri

, Wan Azizun Wan Adnan, Abdul Rahman Ramli, Khairulmizam Samsudin
, Sharifah Mumtazah Syed Ahmad:
A hybrid digital image watermarking algorithm based on DCT-DWT and auto-thresholding. 4373-4395 - Mir Alireza Hakamian, Amir Masoud Rahmani

:
Evaluation of isolation in virtual machine environments encounter in effective attacks against memory. 4396-4406
- Danfeng Yan, Yuan Tian, Fangchun Yang:

Privacy-preserving authorization method for mashups. 4421-4435 - Intesab Hussain, Soufiene Djahel

, Zonghua Zhang, Farid Naït-Abdesselam:
A comprehensive study of flooding attack consequences and countermeasures in Session Initiation Protocol (SIP). 4436-4451

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














