


default search action
Security and Communication Networks, Volume 9
Volume 9, Number 1, January 2016
- Yongming Xie, Yan Zhang:

A secure, service priority-based incentive scheme for delay tolerant networks. 5-18 - Mohsen Toorani

:
Cryptanalysis of a robust key agreement based on public key authentication. 19-26 - Mohammad Hossein Faghihi Sereshgi

, Mohammad Dakhilalian
, Mohsen Shakiba:
Biclique cryptanalysis of MIBS-80 and PRESENT-80 block ciphers. 27-33 - Changhui Hu, Lidong Han, Siu-Ming Yiu:

Efficient and secure multi-functional searchable symmetric encryption schemes. 34-42 - Yushu Zhang, Di Xiao, Kwok-Wo Wong, Jiantao Zhou, Sen Bai, Moting Su:

Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization. 43-53 - Jianhong Zhang, Xubing Zhao, Jian Mao:

Attack on Chen et al.'s certificateless aggregate signature scheme. 54-59 - Xuping Zhang, Feng Ye, Sucheng Fan, Jinghong Guo, Guoliang Xu, Yi Qian:

An adaptive security protocol for a wireless sensor-based monitoring network in smart grid transmission lines. 60-71
Volume 9, Number 2, January 2016
- Edith C. H. Ngai:

On providing sink anonymity for wireless sensor networks. 77-86 - Geoffrey Ottoy, Tom Hamelinckx, Bart Preneel

, Lieven De Strycker
, Jean-Pierre Goemaere:
On the choice of the appropriate AES data encryption method for ZigBee nodes. 87-93 - Emmanouil Magkos, Panayiotis Kotzanikolaou

:
SCN-SI-021 achieving privacy and access control in pervasive computing environments. 94-105 - Jan Vossaert, Jorn Lapon

, Bart De Decker, Vincent Naessens:
Symmetric key infrastructure for authenticated key establishment between resource constrained nodes and powerful devices. 106-117 - Krzysztof Szczypiorski

, Wojciech Mazurczyk
:
Steganography in IEEE 802.11 OFDM symbols. 118-129 - Martin Werner

:
Privacy-protected communication for location-based services. 130-138 - Chin-Feng Lee, Chi-Yao Weng, Aneesh Sharma:

Steganographic access control in data hiding using run-length encoding and modulo-operations. 139-148 - Christophe Huygens

, Nelson Matthys, Wouter Joosen:
Optimizing resource and data security in shared sensor networks. 149-165 - Zhiwei Wang:

Improvement on the fault-tolerant group key agreement protocol of Zhao et al. 166-170 - Binod Vaidya, Dimitrios Makrakis, Hussein T. Mouftah:

Two-factor mutual authentication with key agreement in wireless sensor networks. 171-183
Volume 9, Number 3, February 2016
- Ki Tak Kim, Jong Hwan Park, Dong Hoon Lee:

Selectively chosen ciphertext security in threshold public-key encryption. 189-200 - Kumar Sridharamurthy, Abhilash Pernaje Govinda, Jyothi D. Gopal, Golla Varaprasad:

Violation detection method for vehicular ad hoc networking. 201-207 - Pedro Javier Fernández Ruiz, Fernando Bernal-Hidalgo, Cristian A. Nieto Guerra, Antonio Fernandez Gómez-Skarmeta

:
Mobility and security in a real VANET deployed in a heterogeneous networks. 208-219 - Leron Lightfoot, Yun Li, Jian Ren:

STaR: design and quantitative measurement of source-location privacy for wireless sensor networks. 220-228 - Jian Ren, Yun Li, Tingting Jiang, Tongtong Li:

Anonymous communication in overlay networks. 229-240 - Ming-Huang Guo, Horng-Twu Liaw, Meng-Yu Chiu, Der-Jiunn Deng:

On decentralized group key management mechanism for vehicular ad hoc networks. 241-247 - Jungha Paik, Kwantae Cho, Boo Geum Jung, Dong Hoon Lee:

Client cloud Web service: reducing traffic consumption. 248-261 - Paria Jokar, Nasim Arianpoo, Victor C. M. Leung:

A survey on security issues in smart grids. 262-273
Volume 9, Number 4, March 2016
- Noureddine Chaib, Nasreddine Lagraa, Mohamed Bachir Yagoubi, Abderrahmane Lakas

:
SDRP: a secure distributed revocation protocol for vehicular environments. 279-289 - Zhifeng Xiao, Nandhakumar Kathiresshan, Yang Xiao

:
A survey of accountability in computer networks and distributed systems. 290-315 - Fernando Sanchez, Zhenhai Duan, Yingfei Dong:

Blocking spam by separating end-user machines from legitimate mail server machines. 316-326 - Tiago A. Almeida

, Akebo Yamakami
:
Compression-based spam filter. 327-335 - Olivier Thonnard, Pierre-Antoine Vervier, Marc Dacier

:
Spammers operations: a multifaceted strategic analysis. 336-356 - Jinwei Wang, Leiming Yan, Jin Han, Yuxiang Wang:

Secure hybrid multibit multiplicative watermarking for media distribution over mobile Internet. 357-365
Volume 9, Number 5, March 2016
- Ji Wu, Wei Wang, Qilian Liang, Xiaorong Wu, Baoju Zhang:

Compressive sensing-based data encryption system with application to sense-through-wall UWB noise radar. 371-379 - Chun-I Fan, Yu-Kuang Liang, Chien-Nan Wu:

Privacy enhancement for fair PayWord-based micropayment. 380-388 - Peter Teufl, Michaela Ferk, Andreas Fitzek, Daniel M. Hein, Stefan Kraxberger, Clemens Orthacker:

Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play). 389-419 - Isaac Woungang, Sanjay Kumar Dhurandher, Mohammad S. Obaidat

, Rajender Dheeraj Peddi:
A DSR-based routing protocol for mitigating blackhole attacks on mobile ad hoc networks. 420-428 - Nils Ulltveit-Moe, Vladimir A. Oleshchuk:

Enforcing mobile security with location-aware role-based access control. 429-439 - Geir M. Køien:

A privacy enhanced device access protocol for an IoT context. 440-450
Volume 9, Number 6, April 2016
- Jong Hyuk Park, Stefanos Gritzalis

, Bo-Chao Cheng, Ning Zhang:
Challenges and opportunities in next-generation cyberspace security. 455-456
- Yuxue Piao, Jin-Hyuk Jung, Jeong Hyun Yi

:
Server-based code obfuscation scheme for APK tamper detection. 457-467 - Wei-Chen Wu

, Horng-Twu Liaw:
An authentication, authorization, and accounting mechanism for 3G/WLAN networks. 468-480 - Haider Abbas

, Moeen Qaemi Mahmoodzadeh, Farrukh Aslam Khan
, Maruf Pasha:
Identifying an OpenID anti-phishing scheme for cyberspace. 481-491 - Aziz Nasridinov, Young-Sik Jeong, JeongYong Byun, Young-Ho Park:

A histogram-based method for efficient detection of rewriting attacks in simple object access protocol messages. 492-499 - Namje Park

, Hyo-Chan Bang:
Mobile middleware platform for secure vessel traffic system in IoT service environment. 500-512 - Hisain Elshaafi

, Dmitri Botvich:
Optimisation-based collaborative determination of component trustworthiness in service compositions. 513-527 - Jong Hyuk Park, Dohyun Kim

, Ji Soo Park, Sangjin Lee:
An enhanced security framework for reliable Android operating system. 528-534 - Sang-Ho Seo, Byung-Ok Jung, Byung-Su Koh, James Jeong:

A study on SW-Blackbox to ensure the reliability of content distribution using file system event monitoring of online service providers. 535-541 - Georgios Kambourakis, Dimitrios Damopoulos, Dimitrios Papamartzivanos, Emmanouil Pavlidakis:

Introducing touchstroke: keystroke-based authentication system for smartphones. 542-554 - Jong-Ho Kim, Jun-Jae Park, Sang-Ho Ahn, Deok-Gyu Lee, Daesung Moon, Sang-Kyoon Kim:

Small target detection using morphology and modified Gaussian distance function. 555-560 - Geon Woo Kim, Jong Wook Han, Deok-Gyu Lee, Sang Wook Kim:

Single authentication through in convergence space using collaborative smart cameras. 561-570 - Nikolaos Marangos, Panagiotis Rizomiliotis, Lilian Mitrou:

Time synchronization: pivotal element in cloud forensics. 571-582
Volume 9, Number 7, May 2016
- Junjie Lv

, Chen Zhao:
Security analysis of online digital goods business based on stochastic game net model. 587-598 - Lukas Malina

, Jan Hajny, Vaclav Zeman:
Light-weight group signatures with time-bound membership. 599-612 - Wei Luo

, Wenping Ma, Qiang Gao:
A dynamic trust management system for wireless sensor networks. 613-621 - Donglai Fu, Xinguang Peng, Yuli Yang:

Unbalanced tree-formed verification data for trusted platforms. 622-633 - Brindha Murugan

, Ammasai Gounden Nanjappa Gounder, Sriram Manohar:
A hybrid image encryption algorithm using chaos and Conway's game-of-life cellular automata. 634-651 - Tzer-Long Chen, Yu-Ting Liao, Yi-Fan Chang, Jen-Hung Hwang:

Security approach to controlling access to personal health records in healthcare service. 652-666 - Tzonelih Hwang, Prosanta Gope:

Robust stream-cipher mode of authenticated encryption for secure communication in wireless sensor network. 667-679 - Fuzhi Zhang, Honghong Chen:

An ensemble method for detecting shilling attacks based on ordered item sequences. 680-696
- Yilei Wang, Zhe Liu, Qiuliang Xu:

Corrigendum to "New Rational Parties Relying on Reputation". 697
Volume 9, Number 8, May 2016
- Wojciech Mazurczyk

, Krzysztof Szczypiorski
, Artur Janicki
, Hui Tian
:
Trends in modern information hiding: techniques, applications, and detection. 703-704
- Emanuele Maiorana

, Patrizio Campisi:
Multi-bit watermarking of high dynamic range images based on perceptual models. 705-720 - Zhao-Xia Yin, Bin Luo

:
MDE-based image steganography with large embedding capacity. 721-728 - Fengyong Li, Xinpeng Zhang, Hang Cheng, Jiang Yu:

Digital image steganalysis based on local textural features and double dimensionality reduction. 729-736 - Qilin Qi, Aaron Sharp, Dongming Peng, Hamid Sharif:

Real-time audio steganography attack based on automatic objective quality feedback. 737-746 - Shanyu Tang, Qing Chen, Wei Zhang, Yongfeng Huang:

Universal steganography model for low bit-rate speech codec. 747-754 - Rennie Archibald, Dipak Ghosal

:
Design and performance evaluation of a covert timing channel. 755-770 - Pawel Laka

, Lukasz Maksymiuk:
Steganographic transmission in optical networks with the use of direct spread spectrum technique. 771-780 - Wojciech Mazurczyk

, Steffen Wendzel
, Ignacio Azagra Villares, Krzysztof Szczypiorski
:
On importance of steganographic cost for network steganography. 781-790 - Weiwei Liu

, Guangjie Liu, Yuewei Dai:
Matrix embedding in multicast steganography: analysis in privacy, security and immediacy. 791-802
Volume 9, Number 9, June 2016
Editorial
- Shaoen Wu, Honggang Wang

, Dalei Wu
, Periklis Chatzimisios
, Zhigang Chen:
Security and networking for cyber-physical systems. 807
- Todd Baumeister, Yingfei Dong:

Towards secure identity management for the smart grid. 808-822 - Mi Wen, Kuan Zhang

, Jingsheng Lei, Xiaohui Liang
, Ruilong Deng
, Xuemin (Sherman) Shen
:
CIT: A credit-based incentive tariff scheme with fraud-traceability for smart grid. 823-832 - Qingyu Yang, Liguo Chang, Wei Yu

:
On false data injection attacks against Kalman filtering in power system dynamic state estimation. 833-849 - Pengbo Si, Jia Liu, Yanhua Sun, Yanhua Zhang:

Quality of service-aware and security-aware dynamic spectrum management in cyber-physical surveillance systems for transportation. 850-861 - Wei An

, Song Ci, Haiyan Luo, Yanni Han, Tao Lin, Ding Tang, Ying Qi:
Vulnerability-constrained multiple minimum cost paths for multi-source wireless sensor networks. 862-873 - Mohammed Raza Kanjee, Hong Liu:

Authentication and key relay in medical cyber-physical systems. 874-885 - Qing Yang, Alvin S. Lim, Xiaojun Ruan, Xiao Qin

, Dongjin Kim:
Location-preserved contention-based routing in vehicular ad hoc networks. 886-898 - Wen-Yong Wang, Li-Sheng Huang, Chang-Chun Li, Xin Wang:

TCP-polite rate control based on cooperative measurement. 899-909 - Suryakant Bhandare, Taha Ben Brahim, Saad Biaz, Prathima Agrawal:

Performance evaluation of collision avoidance schemes in ad hoc networks. 910-937
Volume 9, Number 10, July 2016
- Ruo Jun Cai, Xue Jun Li

, Peter Han Joo Chong
:
A novel self-checking ad hoc routing scheme against active black hole attacks. 943-957 - Ilija Basicevic, Stanislav Ocovaj, Miroslav Popovic

:
The value of flow size distribution in entropy-based detection of DoS attacks. 958-965 - Liaojun Pang

, Deyu Miao, Chunfeng Lian:
User-friendly random-grid-based visual secret sharing for general access structures. 966-976 - Eric McCary, Yang Xiao

:
Home area network accountability with varying consumption devices in smart grid. 977-995 - Kunpeng Bai, Chuankun Wu:

A secure white-box SM4 implementation. 996-1006 - Hong Zhong, Jie Cui, Runhua Shi, Chao Xia:

Many-to-one homomorphic encryption scheme. 1007-1015 - Jiguo Li, Yuyan Guo, Qihong Yu, Yang Lu, Yichen Zhang:

Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage. 1016-1024 - Bhawana Rudra, Om Prakash Vyas:

Investigation of security issues for service-oriented network architecture. 1025-1039 - Wenli Shang, Peng Zeng

, Ming Wan, Lin Li, Panfeng An:
Intrusion detection algorithm based on OCSVM in industrial control system. 1040-1049 - Tonko Kovacevic, Toni Perkovic

, Mario Cagalj:
Flashing displays: user-friendly solution for bootstrapping secure associations between multiple constrained wireless devices. 1050-1071 - Zohreh Saffarian Eidgahi, Vahid Rafe:

Security analysis of network protocols through model checking: a case study on mobile IPv6. 1072-1084 - Vankamamidi Srinivasa Naresh

, Nistala V. E. S. Murthy:
Provably secure group key agreement protocol based on ECDH with integrated signature. 1085-1102 - Tala Tafazzoli, Babak Sadeghiyan:

A stochastic model for the size of worm origin. 1103-1118 - Boris Damjanovic, Dejan Simic:

Tweakable parallel OFB mode of operation with delayed thread synchronization. 1119-1131 - Qussai Yaseen

, Qutaibah Althebyan
, Brajendra Panda, Yaser Jararweh
:
Mitigating insider threat in cloud relational databases. 1132-1145 - Shuo Chen, Maode Ma, Zhenxing Luo:

An authentication scheme with identity-based cryptography for M2M security in cyber-physical systems. 1146-1157 - Shaghayegh Bakhtiari Chehelcheshmeh

, Mehdi Hosseinzadeh
:
Quantum-resistance authentication in centralized cognitive radio networks. 1158-1172 - Yibin Dai, Shaozhen Chen:

Security analysis of Khudra: a lightweight block cipher for FPGAs. 1173-1185 - Tzonelih Hwang, Prosanta Gope:

PFX: an essence of authencryption for block-cipher security. 1186-1197 - Madhusanka Liyanage

, Pardeep Kumar
, Mika Ylianttila
, Andrei V. Gurtov
:
Novel secure VPN architectures for LTE backhaul networks. 1198-1215 - Yilmaz Kaya, Ömer Faruk Ertugrul:

A novel approach for spam email detection based on shifted binary patterns. 1216-1225
- Charalampos Manifavas, George Hatzivasilis

, Konstantinos Fysarakis
, Yannis Papaefstathiou
:
A survey of lightweight stream ciphers for embedded systems. 1226-1246 - Yefeng Ruan, Sivapriya Kalyanasundaram, Xukai Zou:

Survey of return-oriented programming defense mechanisms. 1247-1265
Volume 9, Number 11, July 2016
- Yacine Rebahi, Mateusz Khalil, Simon Hohberg, Pascal Lorenz

:
An Android based new German eID solution for policy making processes. 1271-1284 - Ünal Çavusoglu, Akif Akgul

, Sezgin Kaçar, Ihsan Pehlivan
, Ahmet Zengin:
A novel chaos-based encryption algorithm over TCP data packet for secure communication. 1285-1296 - Eunsoo Seo, Gulustan Dogan, Tarek F. Abdelzaher, Theodore Brown:

Root cause diagnosis in error-propagating networks. 1297-1308 - Hui Zhu, Xiaoxia Liu, Rongxing Lu, Hui Li:

EPCS: an efficient and privacy-preserving classification service query framework for SVM. 1309-1320 - Yanrong Lu, Lixiang Li

, Haipeng Peng, Yixian Yang:
Cryptanalysis and improvement of a chaotic maps-based anonymous authenticated key agreement protocol for multiserver architecture. 1321-1330 - Yanrong Lu, Lixiang Li

, Haipeng Peng, Yixian Yang:
Robust anonymous two-factor authenticated key exchange scheme for mobile client-server environment. 1331-1339 - Mingchu Li, Xiaodong Xu, Cheng Guo, Xing Tan:

AD-ASGKA - authenticated dynamic protocols for asymmetric group key agreement. 1340-1352 - Liangliang Wang, Kefei Chen, Yu Long, Huige Wang:

Cryptanalysis of a certificateless aggregate signature scheme. 1353-1358 - Ziwen Sun, Yao Wang, Gang Qu, Zhiping Zhou:

A 3-D hand gesture signature based biometric authentication system for smartphones. 1359-1373 - Kamal Adli Mehr

, Javad Musevi Niya
:
Security bootstrapping of mobile ad hoc networks using identity-based cryptography. 1374-1383 - Zuowen Tan:

A privacy-preserving multi-server authenticated key-agreement scheme based on Chebyshev chaotic maps. 1384-1397 - Nan Run Zhou, Xiao Rong Liang, Zhihong Zhou, Ahmed Farouk

:
Relay selection scheme for amplify-and-forward cooperative communication system with artificial noise. 1398-1404 - Hai-Cheng Chu, Han-Chieh Chao

:
Testifying the digital artifacts for line application program under Mac OS X from the aspects of witness experts. 1405-1416 - Shifeng Sun, Dawu Gu, Shengli Liu:

Efficient chosen ciphertext secure identity-based encryption against key leakage attacks. 1417-1434 - Junfeng Yu, Qingfeng Huang, Chee Hoo Yian:

DroidScreening: a practical framework for real-world Android malware analysis. 1435-1449 - Ahmad M. Manasrah, Basim Najim Al-Din

:
Mapping private keys into one public key using binary matrices and masonic cipher: Caesar cipher as a case study. 1450-1461 - Dongwoo Kang, Jaewook Jung, Jongho Mun, Donghoon Lee, Younsung Choi

, Dongho Won:
Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain. 1462-1476 - Shashank Gupta

, Brij Bhooshan Gupta
:
JS-SAN: defense mechanism for HTML5-based web applications against javascript code injection vulnerabilities. 1477-1495 - Minhui Xue

, Yong Liu
, Keith W. Ross, Haifeng Qian:
Thwarting location privacy protection in location-based social discovery services. 1496-1508 - Jiangtao Zhai, Mingqian Wang, Guangjie Liu, Yuewei Dai:

Detecting JitterBug covert timing channel with sparse embedding. 1509-1519 - Yao Wang

, Wan-Dong Cai, Pengcheng Wei:
A deep learning approach for detecting malicious JavaScript code. 1520-1534 - Ismail San

, Nuray At, Ibrahim Yakut
, Huseyin Polat:
Efficient paillier cryptoprocessor for privacy-preserving data mining. 1535-1546 - Hui Zhang:

Insecurity of a certificateless aggregate signature scheme. 1547-1552 - Sohail Khan

, Mohammad Nauman
, Abu Talib Othman, Shahrulniza Musa
, Toqeer Ali Syed
:
TSSDroid: realization of an efficient and usable TSS API for the Android software stack. 1553-1576 - Hsiao-Ling Wu, Chin-Chen Chang, Chin-Yu Sun:

A secure authentication scheme with provable correctness for pay-TV systems. 1577-1588 - Sumit Kumar Debnath

, Ratna Dutta:
Towards fair mutual private set intersection with linear complexity. 1589-1612 - Chengyu Hu, Rupeng Yang, Pengtao Liu, Zuoxia Yu, Yongbin Zhou, Qiuliang Xu:

Public-key encryption with keyword search secure against continual memory attacks. 1613-1629
Volume 9, Number 12, August 2016
Editorial
- Shaoquan Jiang, Tsuyoshi Takagi, Guilin Wang:

Special issue on provable security. 1635-1637
- Mingwu Zhang, Bo Yang:

Continual key leakage tolerant encryption from extensible set delegation. 1638-1649 - Sree Vivek Sivanandam, S. Sharmila Deva Selvi, Akshayaram Srinivasan, Chandrasekaran Pandu Rangan:

Stronger public key encryption system withstanding RAM scraper like attacks. 1650-1662 - Yutaka Kawai, Goichiro Hanaoka

, Kazuo Ohta, Noboru Kunihiro
:
A limitation on security evaluation of cryptographic primitives with fixed keys. 1663-1675 - Yoshikazu Hanatani, Goichiro Hanaoka

, Takahiro Matsuda
, Takashi Yamakawa:
Efficient key encapsulation mechanisms with tight security reductions to standard assumptions in the two security models. 1676-1697 - Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao

:
Generalized (identity-based) hash proof system and its applications. 1698-1716 - Takanori Suga, Takashi Nishide, Kouichi Sakurai:

Character-based symmetric searchable encryption and its implementation and experiment on mobile devices. 1717-1725 - Yoshinao Uchide, Noboru Kunihiro

:
Searchable symmetric encryption capable of searching for an arbitrary string. 1726-1736 - Mingwu Zhang, Yi Mu, Jian Shen, Xinyi Huang:

Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity. 1737-1747 - Suqing Lin, Rui Zhang, Mingsheng Wang:

Verifiable attribute-based proxy re-encryption for secure public cloud data sharing. 1748-1758 - Mohsen Alimomeni, Reihaneh Safavi-Naini:

Two-level security for message sequences. 1759-1768 - David Nuñez

, Isaac Agudo, Javier López:
On the application of generic CCA-secure transformations to proxy re-encryption. 1769-1785 - Satsuya Ohata, Kanta Matsuura

:
Proxy re-encryption via indistinguishability obfuscation. 1786-1795 - Dennis Y. W. Liu

, Duncan S. Wong:
One-move convertible nominative signature in the standard model. 1796-1809 - Shengke Zeng, Qinyi Li, Zhiguang Qin, Qing Lu:

Non-interactive deniable ring signature without random oracles. 1810-1819 - Haibo Tian, Fangguo Zhang

, Baodian Wei:
A lattice-based partially blind signature. 1820-1828 - Yuyu Wang, Keisuke Tanaka:

Generic transformations for existentially unforgeable signature schemes in the bounded leakage model. 1829-1842 - Yanfei Guo, Zhenfeng Zhang:

Authenticated key exchange with entities from different settings and varied groups. 1843-1863 - Teng Wu, Guang Gong:

Two new message authentication codes based on APN functions and stream ciphers. 1864-1871
Volume 9, Number 13, September 2016
- Aggeliki Sgora, Dimitrios D. Vergados

, Periklis Chatzimisios
:
A survey on security and privacy issues in Wireless Mesh Networks. 1877-1889 - Xudong Ni, Junzhou Luo, Boying Zhang, Jin Teng, Xiaole Bai, Bo Liu

, Dong Xuan:
A mobile phone-based physical-social location proof system for mobile social network service. 1890-1904 - Weiwei Jia, Haojin Zhu

, Suguo Du, Xiaolei Dong, Zhenfu Cao
:
Cloud-based privacy-preserving aggregation architecture in multi-domain wireless networks. 1905-1915 - Xiong Li

, Jianwei Niu
, Muhammad Khurram Khan
, Junguo Liao, Xiaoke Zhao:
Robust three-factor remote user authentication scheme with key agreement for multimedia systems. 1916-1927 - Charles Z. Liew, Raymond Shaw, Lanlan Li:

Protect biometric data with compound chaotic encryption. 1928-1943 - Letian Sha, Liwen He, Jianming Fu, Jing Sun, Pengwei Li:

SDN-based Sensitive Information (SI) protection: sensitivity-degree measurement in software and data lifetime supervisor in software defined network. 1944-1957 - Kostas Giotis, Georgios Androulidakis, Vasilis Maglaris

:
A scalable anomaly detection and mitigation architecture for legacy networks via an OpenFlow middlebox. 1958-1970 - Jiseong Noh, Seunghyeon Lee, Jaehyun Park, Seungwon Shin, Brent ByungHoon Kang:

Vulnerabilities of network OS and mitigation with state-based permission system. 1971-1982 - Mohammad Wazid

, Ashok Kumar Das, Saru Kumari
, Xiong Li
, Fan Wu
:
Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS. 1983-2001 - Anmin Fu

, Jianye Song, Shuai Li, Gongxuan Zhang, Yuqing Zhang:
A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks. 2002-2014 - Guodong Ye, Xiaoling Huang:

A secure image encryption algorithm based on chaotic maps and SHA-3. 2015-2023 - Mohamed Elhoseny

, Xiaohui Yuan
, Hamdy K. El-Minir, Alaa Mohamed Riad:
An energy efficient encryption method for secure dynamic WSN. 2024-2031 - Nazrul Hoque

, Dhruba K. Bhattacharyya
, Jugal K. Kalita:
FFSc: a novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysis. 2032-2041 - Tarek Moulahi

, Sami Touil, Salem Nasri, Hervé Guyennet:
Reliable relay-based broadcasting through formal concept analysis for WSNs. 2042-2050 - Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim:

Binary field multiplication on ARMv8. 2051-2058 - Cheng-Chi Lee

, Chun-Ta Li
, Shih-Ting Chiu, Shun-der Chen
:
Time-bound key-aggregate encryption for cloud storage. 2059-2069 - Ashok Kumar Das, Anil Kumar Sutrala

, Saru Kumari
, Vanga Odelu
, Mohammad Wazid
, Xiong Li
:
An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks. 2070-2092 - Weijia Xue

, Tingting Lin, Xin Shun, Fenglei Xue, Xuejia Lai:
On the estimation of the second largest eigenvalue of Markov ciphers. 2093-2099 - Daibin Wang, Hai Jin, Deqing Zou, Peng Xu, Tianqing Zhu, Gang Chen:

Taming transitive permission attack via bytecode rewriting on Android application. 2100-2114 - Yanxiao Liu:

Linear (k, n) secret sharing scheme with cheating detection. 2115-2121 - M. Prem Laxman Das

, Jothi Rangasamy
, R. Kabaleeshwaran
:
Refined Shacham-Waters ring signature scheme in Seo-Cheon framework. 2122-2134 - Rongrong Xi, Xiao-chun Yun, Zhiyu Hao, Yongzheng Zhang:

Quantitative threat situation assessment based on alert verification. 2135-2142 - Hong Zhu

, Zhuolin Mei, Meiyi Xie:
Identity-based key management for cloud computing. 2143-2156 - Yukun He, Guangyan Zhang, Jie Wu, Qiang Li

:
Understanding a prospective approach to designing malicious social bots. 2157-2172 - Abdulghani Ali Ahmed

, Ali Safa Sadiq
, Mohamad Fadli Bin Zolkipli
:
Traceback model for identifying sources of distributed attacks in real time. 2173-2185 - Senthil Madasamy Nallakannu

, Thiagarajan Revathi
:
PSO-based optimal peer selection approach for highly secure and trusted P2P system. 2186-2199 - Bassam Jamil Mohd, Thaier Hayajneh

, Zaid Abu Khalaf, Khalil Mustafa Ahmad Yousef
:
Modeling and optimization of the lightweight HIGHT block cipher design with FPGA implementation. 2200-2216 - Han Shen, Jianhua Chen, Jian Shen, Debiao He

:
Cryptanalysis of a certificateless aggregate signature scheme with efficient verification. 2217-2221
- Abhinav Bhandari

, Amrit Lal Sangal
, Krishan Kumar Saluja
:
Characterizing flash events and distributed denial-of-service attacks: an empirical investigation. 2222-2239
Volume 9, Number 14, September 2016
- Fatemeh Faraji Daneshgar, Maghsoud Abbaspour

:
Extracting fuzzy attack patterns using an online fuzzy adaptive alert correlation framework. 2245-2260 - Henry Carter

, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler
:
Outsourcing secure two-party computation as a black box. 2261-2275 - Chun-Ta Li

:
A secure chaotic maps-based privacy-protection scheme for multi-server environments. 2276-2290 - Hongyuan Wang, Liehuang Zhu, Chang Xu

, Yijia Lilong:
A universal method for realizing non-repudiable provable data possession in cloud storage. 2291-2301 - Peixin Chen, Jinshu Su

, Baokang Zhao, Xiaofeng Wang, Ilsun You:
An escrow-free online/offline HIBS scheme for privacy protection of people-centric sensing. 2302-2312 - Qilong Han, Bo Shao, Lijie Li, Zhiqiang Ma, Haitao Zhang, Xiaojiang Du:

Publishing histograms with outliers under data differential privacy. 2313-2322 - Adrián Sánchez-Carmona

, Sergi Robles
, Carlos Borrego
:
Identity-based access control for pro-active message's DTN. 2323-2337 - Dinhtu Truong

, Guang Cheng:
Detecting domain-flux botnet based on DNS traffic features in managed network. 2338-2347 - Hee-Sun Won, Sang-Pil Kim, Sanghun Lee, Mi-Jung Choi, Yang-Sae Moon:

Secure principal component analysis in multiple distributed nodes. 2348-2358 - Yuwen Qian, Ting Sun, Jun Li

, Chang Fan, Hua-ju Song:
Design and analysis of the covert channel implemented by behaviors of network users. 2359-2370 - Ming Li

, Di Xiao, Hong Liu
, Sen Bai:
A recoverable chaos-based fragile watermarking with high PSNR preservation. 2371-2386 - Zhiwei Wang, Wenyang Liu:

CP-ABE with outsourced decryption and directionally hidden policy. 2387-2396 - Yinghui Zhang

, Jin Li, Xiaofeng Chen, Hui Li:
Anonymous attribute-based proxy re-encryption for access control in cloud computing. 2397-2411 - Feng Wang, Chin-Chen Chang, Shih-Chang Chang:

Robust off-line e-cash scheme with recoverability and anonymity revocation. 2412-2421 - Zhenhua Liu, Xiangsong Zhang, Yupu Hu, Tsuyoshi Takagi:

Revocable and strongly unforgeable identity-based signature scheme in the standard model. 2422-2433 - Asif Iqbal Hajamydeen

, Nur Izura Udzir
:
A refined filter for UHAD to improve anomaly detection. 2434-2447 - Anfeng Liu, Xiao Liu, Yuxin Liu:

A comprehensive analysis for fair probability marking based traceback approach in WSNs. 2448-2475 - Chin-Chen Chang, Wei-yi Chen, Shih-Chang Chang:

A highly efficient and secure electronic cash system based on secure sharing in cloud environment. 2476-2483
- Sunil Kumar

, Kamlesh Dutta:
Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges. 2484-2556 - Hassan Alizadeh, André Zúquete

:
Traffic classification for managing Applications' networking profiles. 2557-2575
Volume 9, Number 15, October 2016
- Ching-Hsien Hsu, Shangguang Wang

, Daqiang Zhang, Hai-Cheng Chu, Ning Lu:
Efficient identity authentication and encryption technique for high throughput RFID system. 2581-2591 - Vandana Guleria, Ratna Dutta:

Efficient oblivious transfer with adaptive queries in UC framework. 2592-2611 - Avleen Kaur Malhi, Shalini Batra:

Genetic-based framework for prevention of masquerade and DDoS attacks in vehicular ad-hocnetworks. 2612-2626 - Guo-lin Shao, Xingshu Chen, Xue-yuan Yin, Xiaoming Ye:

A fuzzy detection approach toward different speed port scan attacks based on Dempster-Shafer evidence theory. 2627-2640
- Guangjie Han, Lei Shu

, Sammy Chan, Jiankun Hu
:
Security and privacy in Internet of things: methods, architectures, and solutions. 2641-2642
- Xiong Li

, Jianwei Niu
, Saru Kumari
, Junguo Liao, Wei Liang
, Muhammad Khurram Khan
:
A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. 2643-2655 - Ibrahim Ethem Bagci

, Shahid Raza
, Utz Roedig
, Thiemo Voigt:
Fusion: coalesced confidential storage and communication framework for the IoT. 2656-2673 - Ting-Yi Chang, Cheng-Jung Tsai, Wang-Jui Tsai, Chun-Cheng Peng, Han-Sing Wu:

A changeable personal identification number-based keystroke dynamics authentication system on smart phones. 2674-2685 - Xiaochen Fan, Panlong Yang, Qingyu Li, Dawei Liu, Chaocan Xiang, Yonggang Zhao:

SAFE-CROWD: secure task allocation for collaborative mobile social network. 2686-2695 - Béla Genge, Calin Enachescu:

ShoVAT: Shodan-based vulnerability assessment tool for Internet-facing services. 2696-2714 - Muhammad Altaf Khan, Shafiullah Khan, Bilal Shams, Jaime Lloret

:
Distributed flood attack detection mechanism using artificial neural network in wireless mesh networks. 2715-2729 - Bo Li, Jianxin Li, Lu Liu

, Chao Zhou:
Toward a flexible and fine-grained access control framework for infrastructure as a service clouds. 2730-2743 - Yanwen Wang

, Xiaoling Wu, Hainan Chen
:
An intrusion detection method for wireless sensor network based on mathematical morphology. 2744-2751
- Deqing Zou, Yang Xiang, Geyong Min:

Privacy preserving in cloud computing environment. 2752-2753
- Weiran Liu, Jianwei Liu

, Qianhong Wu, Willy Susilo
, Hua Deng, Bo Qin:
SAKE: scalable authenticated key exchange for mobile e-health networks. 2754-2765 - Weizhong Qiang, Changqing Jiang, Longbo Ran, Deqing Zou, Hai Jin:

CDMCR: multi-level fault-tolerant system for distributed applications in cloud. 2766-2778 - Shuai Fu, Jianfeng Ma, Hongtao Li, Qi Jiang

:
A robust and privacy-preserving aggregation scheme for secure smart grid communications in digital communities. 2779-2788 - Jun Song

, ChunJiao He, Fan Yang, Huanguo Zhang:
A privacy-preserving distance-based incentive scheme in opportunistic VANETs. 2789-2801 - Fajiang Yu, Huanguo Zhang, Bo Zhao, Juan Wang, Liqiang Zhang, Fei Yan, Zhenlin Chen:

A formal analysis of Trusted Platform Module 2.0 hash-based message authentication code authorization under digital rights management scenario. 2802-2815 - Guang Yang, Jiqiang Liu, Lei Han:

An ID-based node key management scheme based on PTPM in MANETs. 2816-2826 - Jinfu Chen, Jiamei Chen, Rubing Huang

, Yuchi Guo, Yongzhao Zhan:
An approach of security testing for third-party component based on state mutation. 2827-2842 - Gansen Zhao, Zhongjie Ba, Xinming Wang, Feng Zhang, Changqin Huang

, Yong Tang:
Constructing authentication web in cloud computing. 2843-2860
- Wojciech Mazurczyk

, Krzysztof Szczypiorski
, Zoran Duric, Dengpan Ye:
Cyber Crime. 2861-2863
- Nicholas Ayres, Leandros A. Maglaras

:
Cyberterrorism targeting the general public through social media. 2864-2875 - Sebastian Neuner, Martin Schmiedecker, Edgar R. Weippl:

Effectiveness of file-based deduplication in digital forensics. 2876-2885 - Jawwad A. Shamsi, Sherali Zeadally, Fareha Sheikh, Angelyn Flowers:

Attribution in cyberspace: techniques and legal implications. 2886-2900 - Rafal Kozik

, Michal Choras, Witold Holubowicz
:
Evolutionary-based packets classification for anomaly detection in web layer. 2901-2910 - Lukasz Saganowski

, Tomasz Andrysiak, Rafal Kozik
, Michal Choras:
DWT-based anomaly detection method for cyber security of wireless sensor networks. 2911-2922 - Artur Janicki

:
Pitch-based steganography for Speex voice codec. 2923-2933 - Hui Tian

, Yanpeng Wu, Chin-Chen Chang, Yongfeng Huang, Jin Liu, Tian Wang, Yonghong Chen, Yiqiao Cai:
Steganalysis of analysis-by-synthesis speech exploiting pulse-position distribution characteristics. 2934-2944 - Hasan Abdulrahman

, Marc Chaumont
, Philippe Montesinos, Baptiste Magnier:
Color images steganalysis using rgb channel geometric transformation measures. 2945-2956 - Yi Zhang, Xiangyang Luo, Chunfang Yang, Dengpan Ye, Fenlin Liu:

A framework of adaptive steganography resisting JPEG compression and detection. 2957-2971 - Matthias Naumann

, Steffen Wendzel
, Wojciech Mazurczyk
, Jörg Keller:
Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions. 2972-2985 - Jaspreet Kaur, Steffen Wendzel

, Omar Eissa, Jernej Tonejc, Michael Meier
:
Covert channel-internal control protocols: attacks and defense. 2986-2997 - Wojciech Fraczek, Krzysztof Szczypiorski

:
Perfect undetectability of network steganography. 2998-3010 - Félix Iglesias

, Robert Annessi, Tanja Zseby:
DAT detectors: uncovering TCP/IP covert channels by descriptive analytics. 3011-3029 - Artur Janicki

, Federico Alegre, Nicholas W. D. Evans:
An assessment of automatic speaker verification vulnerabilities to replay spoofing attacks. 3030-3044
Volume 9, Number 16, November 2016
- Keke Gai

, Meikang Qiu, Lixin Tao, Yongxin Zhu:
Intrusion detection techniques for mobile cloud computing in heterogeneous 5G. 3049-3058 - Zheng Yan

, Peng Zhang, Athanasios V. Vasilakos
:
A security and trust framework for virtualized networks and software-defined networking. 3059-3069 - Raimo Kantola, Jesus Llorente Santos, Nicklas Beijar:

Policy-based communications for 5G mobile with customer edge switching. 3070-3082 - Xin Huang, Paul Craig

, Hangyu Lin, Zheng Yan
:
SecIoT: a security framework for the Internet of Things. 3083-3094 - Kai Fan, Yuanyuan Gong, Chen Liang, Hui Li, Yintang Yang:

Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G. 3095-3104 - Satyanarayana Vollala, Krishnan Geetha, Natarajan Ramasubramanian:

Efficient modular exponential algorithms compatible with hardware implementation of public-key cryptography. 3105-3115 - Guangjun Fan

, Yongbin Zhou, Hailong Zhang, Dengguo Feng:
Towards optimal leakage exploitation rate in template attacks. 3116-3126 - Yichuan Wang, Jianfeng Ma, Liumei Zhang, Wenjiang Ji, Di Lu, Xinhong Hei:

Dynamic game model of botnet DDoS attack and defense. 3127-3140 - Haohao Nie, Yanping Li, Weifeng Chen, Yong Ding:

NCLAS: a novel and efficient certificateless aggregate signature scheme. 3141-3151 - Arjumand Fatima, Yumna Ghazi, Muhammad Awais Shibli, Abdul Ghafoor Abassi:

Towards Attribute-Centric Access Control: an ABAC versus RBAC argument. 3152-3166 - Hong Zhu

, Bin Wu, Meiyi Xie:
Privacy-preserving ranked neighbor query over encrypted graph data in the cloud. 3167-3177 - Zhongliu Zhuo, Xiaosong Zhang, Ruixing Li, Ting Chen, Jingzhong Zhang:

A multi-granularity heuristic-combining approach for censorship circumvention activity identification. 3178-3189 - Bogyu Jang, Jaeseung Lee, Manhee Lee:

Automatic system for measuring security risk of Android application from third party app store. 3190-3196 - Roger Jardí-Cedó, Jordi Castellà-Roca

, Alexandre Viejo
:
Privacy-preserving electronic road pricing system for low emission zones with dynamic pricing. 3197-3218 - A. S. M. Touhidul Hasan

, Qingshan Jiang, Jun Luo, Chengming Li, Lifei Chen:
An effective value swapping method for privacy preserving data publishing. 3219-3228 - SK Hafizul Islam

, Ashok Kumar Das, Muhammad Khurram Khan
:
Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor. 3229-3238 - Yangguang Tian, Guomin Yang

, Yi Mu:
Privacy-preserving grouping proof with key exchange in the multiple-party setting. 3239-3250 - Monowar H. Bhuyan, D. K. Bhattacharyya

, Jugal K. Kalita:
E-LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric. 3251-3270 - Rajesh P. Barnwal

, Soumya K. Ghosh:
KITE: an efficient scheme for trust estimation and detection of errant nodes in vehicular cyber-physical systems. 3271-3281 - Muzaffar Rao

, Thomas Newe
, Ian Andrew Grout, Avijit Mathur:
An FPGA-based reconfigurable IPSec AH core with efficient implementation of SHA-3 for high speed IoT applications. 3282-3295 - Yonglin Hao:

Cryptanalysis of the LSH hash functions. 3296-3308 - Jinyong Chang, Honglong Dai, Maozhi Xu, Rui Xue:

Security analysis of a TESLA-based homomorphic MAC scheme for authentication in P2P live streaming system. 3309-3313 - Satyajit Mondal, Sraban Kumar Mohanty

, Sukumar Nandi
:
Energy efficient secure communication architecture for wireless sensor network. 3314-3323 - Algimantas Venckauskas

, Vytautas Stuikys, Robertas Damasevicius, Nerijus Jusas:
Modelling of Internet of Things units for estimating security-energy-performance relationships for quality of service and environment awareness. 3324-3339 - Howard M. Heys

:
Error burst analysis of a statistical self-synchronizing mode of block ciphers. 3340-3352 - Gurbakshish Singh Toor, Maode Ma:

Security enhancement for dynamic key refreshment in neighborhood area network of smart grid. 3353-3364 - BalaSuyambu Jeyaram, R. Radha

, Raghavan Rama
:
New cellular automata-based image cryptosystem and a novel non-parametric pixel randomness test. 3365-3377 - Muhammad Muneer Umar

, Amjad Mehmood
, Houbing Song
:
SeCRoP: secure cluster head centered multi-hop routing protocol for mobile ad hoc networks. 3378-3387 - Fatemeh Tahmasbi, Neda Moghim, Mojtaba Mahdavi:

Adaptive ternary timing covert channel in IEEE 802.11. 3388-3400 - Chenghua Tang, Yang Xiang, Yu Wang

, Junyan Qian, Baohua Qiang:
Detection and classification of anomaly intrusion using hierarchy clustering and SVM. 3401-3411 - Mungyu Bae

, Jiyeon Lee, Suk Kyu Lee, Hwangnam Kim:
Securing mobile access with interactive image code and image key encryption. 3412-3427 - Lili Xu, Fan Wu

:
A novel three-factor authentication and key agreement scheme providing anonymity in global mobility networks. 3428-3443 - Dongmei Li

, Xiaolei Dong, Zhenfu Cao
:
Secure and privacy-preserving pattern matching in outsourced computing. 3444-3451 - Jing Chen, Lihong Zhang, Kun He, Min Chen

, Ruiying Du, Lina Wang:
Message-locked proof of ownership and retrievability with remote repairing in cloud. 3452-3466 - Samant Saurabh

, Ashok Singh Sairam
:
Increasing the effectiveness of packet marking schemes using wrap-around counting Bloom filter. 3467-3482 - Abdelfattah Amamra, Jean-Marc Robert

, Andrien Abraham, Chamseddine Talhi:
Generative versus discriminative classifiers for android anomaly-based detection system using system calls filtering and abstraction process. 3483-3495 - Aiqing Zhang, Abel Bacchus, Xiaodong Lin:

Consent-based access control for secure and privacy-preserving health information exchange. 3496-3508 - Mehran Alidoost Nia

, Reza Ebrahimi Atani
, Benjamin Fabian
, Eduard Babulak
:
On detecting unidentified network traffic using pattern-based random walk. 3509-3526 - Fan Wu

, Lili Xu, Saru Kumari
, Xiong Li
, Ashok Kumar Das, Muhammad Khurram Khan
, Marimuthu Karuppiah
, Renuka Baliyan:
A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. 3527-3542 - Lina Wang, Weijie Liu, Neeraj Kumar

, Debiao He
, Cheng Tan, Debin Gao
:
A novel covert channel detection method in cloud based on XSRM and improved event association algorithm. 3543-3557 - Sedat Akleylek

, Muharrem Tolga Sakalli, Emir Öztürk
, Andac Sahin Mesut, Gökhan Tuncay
:
Generating binary diffusion layers with maximum/high branch numbers and low search complexity. 3558-3569 - Shukai Liu, Xuexiong Yan, Qingxian Wang, Qi Xi:

A systematic study of content security policy in web applications. 3570-3584 - Zhide Chen, Jiyun Wu, Aniello Castiglione

, Wei Wu:
Human continuous activity recognition based on energy-efficient schemes considering cloud security technology. 3585-3601 - Xuelian Long, David Tipper

, Yi Qian:
A key management architecture and protocols for secure smart grid communications. 3602-3617 - Ayong Ye, Jianfei Sao, Qi Jian:

A robust location fingerprint based on differential signal strength and dynamic linear interpolation. 3618-3626 - Fenghe Wang, Zhenhua Liu:

Short and provable secure lattice-based signature scheme in the standard model. 3627-3632 - Yao Zhang, Zhiming Zheng, Pawel Szalachowski, Qi Wang

:
Collusion-resilient broadcast encryption based on dual-evolving one-way function trees. 3633-3645 - Shungan Zhou, Ruiying Du, Jing Chen, Debiao He

, Hua Deng:
ESDR: an efficient and secure data repairing paradigm in cloud storage. 3646-3657 - Liangliang Wang, Junzuo Lai, Hu Xiong, Kefei Chen, Yu Long:

Fuzzy certificateless signature. 3658-3669 - Ashok Kumar Das, Saru Kumari

, Vanga Odelu
, Xiong Li
, Fan Wu
, Xinyi Huang:
Provably secure user authentication and key agreement scheme for wireless sensor networks. 3670-3687 - Yinghui Zhang

, Dong Zheng, Qi Li, Jin Li, Hui Li:
Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing. 3688-3702 - Manoj Kumar

, Smita Agrawal
:
Reversible data hiding based on prediction error expansion using adjacent pixels. 3703-3712 - Changsheng Wan, Juan Zhang:

Identity-based key management for wireless sensor networks using lagrange interpolation. 3713-3723
- Mohammad Masdari, Marzie Jalali:

A survey and taxonomy of DoS attacks in cloud computing. 3724-3751 - Guoqiang Zhou, Kuang Wang, Chen Zhao, Guofu Zhou:

A dynamic trust evaluation mechanism based on affective intensity computing. 3752-3761
- Dheerendra Mishra

, Ashok Kumar Das, Sourav Mukhopadhyay:
An anonymous and secure biometric-based enterprise digital rights management system for mobile environment. 3762
- Xiuzhen Cheng, Miroslaw Kutylowski, Kuai Xu

, Haojin Zhu
:
Cyber security, crime, and forensics of wireless networks and applications. 3763-3764
- Jinguo Li, Mi Wen, Kejie Lu, Chunhua Gu:

PIMRS: achieving privacy and integrity-preserving multi-owner ranked-keyword search over encrypted cloud data. 3765-3776 - Lei Zhang, Lifei Wei, Dongmei Huang, Kai Zhang

, Mianxiong Dong, Kaoru Ota
:
MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing. 3777-3789 - Muhammad Irfan

, Haider Abbas
, Yunchuan Sun
, Anam Sajid, Maruf Pasha:
A framework for cloud forensics evidence collection and analysis using security information and event management. 3790-3807 - Yinbin Miao, Jiajia Liu

, Jianfeng Ma:
Efficient keyword search over encrypted data in multi-cloud setting. 3808-3820 - Kuai Xu

, Feng Wang, Xiaohua Jia:
Secure the Internet, one home at a time. 3821-3832 - Wei Li, Maya Larson, Chunqiang Hu, Ruinian Li, Xiuzhen Cheng, Rongfang Bie:

Secure multi-unit sealed first-price auction mechanisms. 3833-3843 - Lichen Zhang

, Xiaoming Wang, Junling Lu, Peng Li, Zhipeng Cai
:
An efficient privacy preserving data aggregation approach for mobile sensing. 3844-3853 - Chengzhe Lai, Rongxing Lu, Dong Zheng:

SPGS: a secure and privacy-preserving group setup framework for platoon-based vehicular cyber-physical systems. 3854-3867 - Qingshui Xue, Fengying Li, Huafeng Chen, Huajun Zhang, Zhenfu Cao

:
Multi-proxy multi-signature binding positioning protocol. 3868-3879 - Qilin Qi, Aaron Sharp, Dongming Peng, Yaoqing Yang, Hamid Sharif:

Generic attack against robust steganography based on spring transform and geometrization. 3880-3892 - Datong Xu, Pinyi Ren, Qinghe Du, Li Sun

:
Active jamming for multi-user information security improvement with the access statuses of users. 3893-3910 - Chaoqun Yang, Heng Zhang, Fengzhong Qu

, Zhiguo Shi:
Secured measurement fusion scheme against deceptive ECM attack in radar network. 3911-3921
Volume 9, Number 17, November 2016
- Hacène Fouchal

, Philippe Hunel, Cédric Ramassamy:
Towards efficient deployment of wireless sensor networks. 3927-3943 - Yuanyuan Zhang, Neeraj Kumar

, Jianhua Chen, Joel J. P. C. Rodrigues:
A secure energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography. 3944-3951 - Pandi Vijayakumar

, Ramu Naresh, Lazarus Jegatha Deborah, SK Hafizul Islam
:
An efficient group key agreement protocol for secure P2P communication. 3952-3965 - Shashank Gupta

, Brij Bhooshan Gupta
:
XSS-immune: a Google chrome extension-based XSS defensive framework for contemporary platforms of web applications. 3966-3986 - Jui-Di Wu, Yuh-Min Tseng, Sen-Shan Huang:

Leakage-resilient ID-based signature scheme in the generic bilinear group model. 3987-4001 - Qi Liu, Weidong Cai, Jian Shen

, Zhangjie Fu, Xiaodong Liu, Nigel Linge:
A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. 4002-4012 - Jyh-Jian Sheu, Yin-Kai Chen, Ko-Tsung Chu, Jih-Hsin Tang

, Wei-Pang Yang:
An intelligent three-phase spam filtering method based on decision tree data mining. 4013-4026 - Azzedine Boukerche, Noura Aljeri

, Kaouther Abrougui, Yan Wang:
Towards a secure hybrid adaptive gateway discovery mechanism for intelligent transportation systems. 4027-4047 - Vanga Odelu

, Ashok Kumar Das:
Design of a new CP-ABE with constant-size secret keys for lightweight devices using elliptic curve cryptography. 4048-4059 - Arijit Karati

, G. P. Biswas:
Efficient and provably secure random oracle-free adaptive identity-based encryption with short-signature scheme. 4060-4074 - Zhi-Hui Wang, Ya-Feng Di, Jianjun Li, Chin-Chen Chang, Hui Liu:

Progressive secret image sharing scheme using meaningful shadows. 4075-4088 - Saurabh Agarwal

, Satish Chand, Nikolay Skarbnik:
SPAM revisited for median filtering detection using higher-order difference. 4089-4102 - Mohammad Wazid

, Ashok Kumar Das, Saru Kumari
, Xiong Li
, Fan Wu
:
Provably secure biometric-based user authentication and key agreement scheme in cloud computing. 4103-4119 - Nishat Koti, B. R. Purushothama

:
Group-oriented encryption for dynamic groups with constant rekeying cost. 4120-4137 - Qihua Wang, Chang Wu Yu

, Fagen Li, Huaqun Wang, Lijie Cao:
A group key-policy attribute-based encryption with partial outsourcing decryption in wireless sensor networks. 4138-4150 - Chao Zou, Chunxiao Chigan:

Dynamic spectrum access-based cryptosystem for cognitive radio networks. 4151-4165 - Tanmoy Maitra

, Mohammad S. Obaidat
, SK Hafizul Islam
, Debasis Giri
, Ruhul Amin
:
Security analysis and design of an efficient ECC-based two-factor password authentication scheme. 4166-4181 - Mohanad Dawoud

, D. Turgay Altilar
:
HEADA: a low cost RFID authentication technique using homomorphic encryption for key generation. 4182-4191 - Marimuthu Karuppiah

, Saru Kumari
, Ashok Kumar Das, Xiong Li
, Fan Wu
, Sayantani Basu:
A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks. 4192-4209 - Kevin Nathanael Santoso, Suk-Hwan Lee

, Won-Joo Hwang, Ki-Ryong Kwon:
Sector-based DNA information hiding method. 4210-4226 - Jinrong Bai, Junfeng Wang:

Improving malware detection using multi-view ensemble learning. 4227-4241 - Kazim Yildiz, Ali Buldu, Hasan Saritas:

Elliptic curve coding technique application for digital signature. 4242-4254 - Saru Kumari

, Marimuthu Karuppiah
, Xiong Li
, Fan Wu
, Ashok Kumar Das, Vanga Odelu
:
An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks. 4255-4271 - Green Kim, Youngse Kim, Ung Heo, Keecheon Kim:

A lightweight authentication mechanism in MIP networks. 4272-4284 - Wenying Zhang, Wenyu Zhang:

Algebraic techniques on searching linear diffusion layers in block cipher. 4285-4294 - Atila Bostan

:
Implicit learning with certificate warning messages on SSL web pages: what are they teaching? 4295-4300 - Himani Agrawal, Monisha Sharma:

Calculation of complexity of NTRU and optimized NTRU using GA, ACO, and PSO algorithm. 4301-4318 - Vinothkumar Muthurajan, Balaji Narayanasamy

:
DKSM-DHT: privacy-preserving dynamic key sharing model in distributed cloud computing environment. 4319-4329 - Alex Oyler, Hossein Saiedian

:
Security in automotive telematics: a survey of threats and risk mitigation strategies to counter the existing and emerging attack vectors. 4330-4340 - Thankaraja Raja Sree, Somasundaram Mary Saira Bhanu:

HADM: detection of HTTP GET flooding attacks by using Analytical hierarchical process and Dempster-Shafer theory with MapReduce. 4341-4357 - Abdalhossein Rezai, Parviz Keshavarzi

, Zahra Moravej:
Advance hybrid key management architecture for SCADA network security. 4358-4368 - Kamal Benzekki

, Abdeslam El Fergougui
, Abdelbaki El Alaoui El Belrhiti
:
Devolving IEEE 802.1X authentication capability to data plane in software-defined networking (SDN) architecture. 4369-4377 - Chin-Ling Chen, Yu-Fan Lin, Aniello Castiglione

, Francesco Palmieri:
A secure payment system for multimedia on demand on mobile VANET clouds. 4378-4390 - K. K. Soundra Pandian

, Kailash Chandra Ray:
Dynamic Hash key-based stream cipher for secure transmission of real time ECG signal. 4391-4402 - Manish Kumar Thukral

, Karma Sonam Sherpa, Kumkum Garg:
Design of a robust receiver for chaotic switching maps of DC-DC power electronics transmitter converters for secure communication. 4403-4415 - Oguzhan Ersoy

, Thomas Brochmann Pedersen, Kamer Kaya, Ali Aydin Selçuk
, Emin Anarim
:
A CRT-based verifiable secret sharing scheme secure against unbounded adversaries. 4416-4427 - Chaker Abdelaziz Kerrache

, Carlos T. Calafate
, Nasreddine Lagraa, Juan-Carlos Cano, Pietro Manzoni
:
RITA: RIsk-aware Trust-based Architecture for collaborative multi-hop vehicular communications. 4428-4442 - Auqib Hamid Lone, Aqeel Khalique

:
Generalized RSA using 2k prime numbers with secure key generation. 4443-4450 - Nishant Doshi

, Devesh C. Jinwala
:
A novel approach for privacy homomorphism using attribute-based encryption. 4451-4467 - Rup Kumar Deka

, Dhruba K. Bhattacharyya
:
Self-similarity based DDoS attack detection using Hurst parameter. 4468-4481 - Xiruo Liu, Wade Trappe:

Overlay tunneling as a policy tool for defending mobile ad hoc networks. 4482-4494 - Samaneh Mashhadi

:
Share secrets stage by stage with homogeneous linear feedback shift register in the standard model. 4495-4504 - Yanwei Zhou, Bo Yang, Wenzheng Zhang, Yi Mu:

CCA2 secure public-key encryption scheme tolerating continual leakage attacks. 4505-4519 - Lishi Fu, Chenhui Jin, Xinran Li:

Multidimensional zero-correlation linear cryptanalysis of lightweight block cipher Piccolo-128. 4520-4535 - Xiaofen Wang, Yi Mu, Rongmao Chen:

An efficient privacy-preserving aggregation and billing protocol for smart grid. 4536-4547 - Zhaohong Li, Zhenzhen Zhang, Sheng Guo, Jinwei Wang:

Video inter-frame forgery identification based on the consistency of quotient of MSSIM. 4548-4556 - Ming Ying, Shu Qin Li:

CSP adoption: current status and future prospects. 4557-4573 - Yahong Li, Caifen Wang, Yulei Zhang

, Shufen Niu:
Privacy-preserving multi-receiver signcryption scheme for heterogeneous systems. 4574-4584 - Wafa Neji, Kaouther Blibech Sinaoui, Narjes Ben Rajeb:

Distributed key generation protocol with a new complaint management strategy. 4585-4595 - Mohammad Wazid

, Ashok Kumar Das
, Saru Kumari
, Muhammad Khurram Khan
:
Design of sinkhole node detection mechanism for hierarchical wireless sensor networks. 4596-4614 - Tanmoy Maitra

, SK Hafizul Islam
, Ruhul Amin
, Debasis Giri
, Muhammad Khurram Khan
, Neeraj Kumar
:
An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design. 4615-4638 - Kok-Seng Wong

, Myung Ho Kim
:
An enhanced user authentication solution for mobile payment systems using wearables. 4639-4649 - Ruhul Amin

, SK Hafizul Islam
, G. P. Biswas, Debasis Giri
, Muhammad Khurram Khan
, Neeraj Kumar
:
A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments. 4650-4666 - Mark Glenn Evans, Leandros A. Maglaras

, Ying He
, Helge Janicke
:
Human behaviour as an aspect of cybersecurity assurance. 4667-4679 - Yilmaz Kaya, Ömer Faruk Ertugrul:

A novel feature extraction approach in SMS spam filtering for mobile communication: one-dimensional ternary patterns. 4680-4690 - Rangkun Li, Shuzheng Xu, Bo Rong, Huazhong Yang:

Host cancelation-based spread spectrum watermarking for audio anti-piracy over Internet. 4691-4702
- Kamal Ali Alezabi, Fazirulhisyam Hashim, Shaiful Jahari Hashim

, Borhanuddin Mohd Ali, Abbas Jamalipour
:
Authentication process enhancements in WiMAX networks. 4703-4725 - Salman Iqbal, Miss Laiha Mat Kiah

, Nor Badrul Anuar
, Babak Daghighi, Ainuddin Wahid Abdul Wahab
, Suleman Khan:
Service delivery models of cloud computing: security issues and open challenges. 4726-4750 - Ali Ahmadian Ramaki, Reza Ebrahimi Atani

:
A survey of IT early warning systems: architectures, challenges, and solutions. 4751-4776 - Mohammad Masdari, Safiyeh Ahmadzadeh:

Comprehensive analysis of the authentication methods in wireless body area networks. 4777-4803 - Lei Zeng, Yang Xiao

, Hui Chen
, Bo Sun, Wenlin Han:
Computer operating system logging and security issues: a survey. 4804-4821
- Wenli Shang, Peng Zeng

, Ming Wan, Lin Li, Panfeng An:
Corrigendum to "Intrusion detection algorithm based on OCSVM in industrial control system". 4822
Volume 9, Number 18, December 2016
- Muhammad Ajmal Azad

, Ricardo Morla
, Junaid Arshad, Khaled Salah:
Clustering VoIP caller for SPIT identification. 4827-4838 - Youngse Kim, Ung Heo, Keecheon Kim:

Improved hash and transmission method for larger packets in the RADIUS protocol. 4839-4851 - Yuyan Guo, Jiguo Li, Yichen Zhang, Jian Shen

:
Hierarchical attribute-based encryption with continuous auxiliary inputs leakage. 4852-4862 - Basant Subba

, Santosh Biswas, Sushanta Karmakar:
False alarm reduction in signature-based IDS: game theory approach. 4863-4881 - Shuang Qiu, Rui Zhang, Yuchen Cao, Wei Yang, Yongbin Zhou, Tian Ding:

A statistical model for DPA when algorithmic noise is dependent on target. 4882-4896 - Lixian Liu, Junzuo Lai, Robert H. Deng

, Yingjiu Li:
Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment. 4897-4913 - Haibin Zheng, Jing Qin

, Jiankun Hu
, Qianhong Wu:
Threshold attribute-based signcryption and its application to authenticated key agreement. 4914-4923 - Mustapha Benssalah, Mustapha Djeddou, Karim Drouiche:

Dual cooperative RFID-telecare medicine information system authentication protocol for healthcare environments. 4924-4948 - Aymen Ghilen

, Mostafa Azizi, Ridha Bouallègue
:
Upgrade of a quantum scheme for authentication and key distribution along with a formal verification based on model checking technique. 4949-4956 - Sara Nazari

, Mohammad Shahram Moin
, Hamidreza Rashidy Kanan:
A face template protection approach using chaos and GRP permutation. 4957-4972 - Ziba Eslami, Nasrollah Pakniat

, Mehrdad Nojoumian:
Ideal social secret sharing using Birkhoff interpolation method. 4973-4982 - Ali Mahmoodi, Javad Mohajeri, Mahmoud Salmasizadeh:

A certificate-based proxy signature with message recovery without bilinear pairing. 4983-4991 - Utku Gülen

, Selçuk Baktir
:
Elliptic-curve cryptography for wireless sensor network nodes without hardware multiplier support. 4992-5002 - Ye Yang, Jinguang Han

, Willy Susilo
, Tsz Hon Yuen
, Jiguo Li:
ABKS-CSC: attribute-based keyword search with constant-size ciphertexts. 5003-5015 - Shehzad Ashraf Chaudhry

, Imran Khan
, Azeem Irshad
, Muhammad Usman Ashraf
, Muhammad Khurram Khan
, Hafiz Farooq Ahmad:
A provably secure anonymous authentication scheme for Session Initiation Protocol. 5016-5027 - Xingyuan Wang, Siwei Wang, Zhanjie Wang, Mengcan Zhang:

A new key agreement protocol based on Chebyshev chaotic maps. 5028-5035 - Osama Hosam

, Nadhir Ben Halima
:
Adaptive block-based pixel value differencing steganography. 5036-5050 - Süleyman Kardas, Mehmet Sabir Kiraz

, Muhammed Ali Bingöl
, Fatih Birinci:
Norwegian internet voting protocol revisited: ballot box and receipt generator are allowed to collude. 5051-5063 - Peng Jiang

, Yi Mu, Fuchun Guo
, Xiaofen Wang, Jianchang Lai:
Centralized keyword search on encrypted data for cloud applications. 5064-5084 - Pandi Vijayakumar

, Ramu Naresh, SK Hafizul Islam
, Lazarus Jegatha Deborah
:
An effective key distribution for secure internet pay-TV using access key hierarchies. 5085-5097 - Maryam Mouzarani, Babak Sadeghiyan, Mohammad Zolfaghari:

A smart fuzzing method for detecting heap-based vulnerabilities in executable codes. 5098-5115 - Wenlin Han, Yang Xiao

:
Design a fast Non-Technical Loss fraud detector for smart grid. 5116-5132 - Pei Zhang, Yiliang Liu

, Jianming Zhang, Liangmin Wang
:
Power allocation design and optimization for secure transmission in cognitive relay networks. 5133-5142 - Firoz Ahmed

, Young-Bae Ko:
Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks. 5143-5154 - Xiaoqiang Sun, Jianping Yu, Ting Wang, Zhiwei Sun, Peng Zhang:

Efficient identity-based leveled fully homomorphic encryption from RLWE. 5155-5165 - Hailong Zhang, Yongbin Zhou, Dengguo Feng:

Theoretical and practical aspects of multiple samples correlation power analysis. 5166-5177 - Fengxiao Huang, Zhangjie Fu, Xingming Sun, Ching-Nung Yang:

Privacy-preserving outsourced gene data search in encryption domain. 5178-5186 - Chin-Ling Chen, Kai-Wen Cheng:

Design of a VANET privacy and non-repudiation accident reporting system. 5187-5202 - Musab Ghadi

, Lamri Laouamer, Laurent Nana, Anca Pascu:
A novel zero-watermarking approach of medical images based on Jacobian matrix model. 5203-5218 - Maryam Asadzadeh Kaljahi, Mohsen Jahanshahi

:
A survey on security vulnerabilities in channel assignment algorithms of multi-interface wireless mesh networks. 5219-5237 - Gaurav Bansod, Abhijit Patil, Swapnil Sutar

, Narayan Pisharoty:
ANU: an ultra lightweight cipher design for security in IoT. 5238-5251 - Yanhua Zhang, Yupu Hu, Jia Xie, Mingming Jiang:

Efficient ring signature schemes over NTRU Lattices. 5252-5261 - Feng Ye, Yi Qian, Rose Qingyang Hu:

Identity-based schemes for a secured big data and cloud ICT framework in smart grid system. 5262-5277 - Mustapha Benssalah, Mustapha Djeddou, Karim Drouiche:

Towards a complete chaotic map-based mobile RFID authentication protocol with efficient anticollision tag indexing. 5278-5294 - Khalifa Toumi, Hela Sfar, Joaquín García-Alfaro

:
Reputation trust mechanism under the organizational-based access control model. 5295-5310 - Shaun Mc Brearty, William Farrelly

, Kevin Curran
:
The performance cost of preserving data/query privacy using searchable symmetric encryption. 5311-5332 - Nor Shahriza Abdul Karim

, Arwa Albuolayan, Tanzila Saba
, Amjad Rehman
:
The practice of secure software development in SDLC: an investigation through existing model and a case study. 5333-5345 - Salwa Othmen, Malek Rekik, Faouzi Zarai

, Aymen Belghith
, Lotfi Kamoun:
Shortest and secure routing protocol for multi-hop cellular networks (SSRP-MCN). 5346-5362 - Aritro Sengupta, Utpal Kumar Ray:

Message mapping and reverse mapping in elliptic curve cryptosystem. 5363-5375 - Minh-Ha Le, Intae Kim

, Seong Oun Hwang:
Efficient certificate-based encryption schemes without pairing. 5376-5391 - Jinyong Chang, Honglong Dai, Maozhi Xu, Rui Xue:

Separations in circular security for arbitrary length key cycles, revisited. 5392-5400 - Hwajeong Seo, Zhe Liu, Johann Großschädl, Howon Kim:

Efficient arithmetic on ARM-NEON and its application for high-speed RSA implementation. 5401-5411 - Sravani Challa, Ashok Kumar Das, Saru Kumari

, Vanga Odelu
, Fan Wu
, Xiong Li
:
Provably secure three-factor authentication and key agreement scheme for session initiation protocol. 5412-5431 - Junyang Bai, Weiping Wang, Mingming Lu, Haodong Wang, Jianxin Wang:

TD-WS: a threat detection tool of WebSocket and Web Storage in HTML5 websites. 5432-5443 - Xiaotong Wu

, Meng Liu, Wan-Chun Dou, Shui Yu
:
DDoS attacks on data plane of software-defined network: are they possible? 5444-5459 - Yimin Wang

, Hong Zhong, Yan Xu, Jie Cui, Fuchun Guo
:
Efficient extensible conditional privacy-preserving authentication scheme supporting batch verification for VANETs. 5460-5471 - Hayfaa Abdulzahra Atee

, Robiah Ahmad, Norliza Mohd. Noor, Abdul Monem S. Rahma, Muhammad Samer Sallam:
A novel extreme learning machine-based cryptography system. 5472-5489 - Dong Xie, Haipeng Peng, Lixiang Li

, Yixian Yang:
Short lattice signatures with constant-size public keys. 5490-5501 - Chi Lin, Tie Qiu, Mohammad S. Obaidat

, Chang-Wu Yu
, Lin Yao, Guowei Wu:
MREA: a minimum resource expenditure node capture attack in wireless sensor networks. 5502-5517 - Han Yan, Xiang Cheng, Dezheng Wang, Sen Su, Qiying Zhang:

Authentication of spatio-textual similarity join queries in untrusted cloud environments. 5518-5532 - Azam Davahli, Seyed Morteza Babamir

:
Indefinite block ciphering based on variable and great length key. 5533-5546 - Jayashree Pougajendy

, Arun Raj Kumar Parthiban
:
CDAI: a novel collaborative detection approach for impersonation attacks in vehicular ad-hoc networks. 5547-5562 - Maged Hamada Ibrahim, Saru Kumari

, Ashok Kumar Das, Vanga Odelu
:
Jamming resistant non-interactive anonymous and unlinkable authentication scheme for mobile satellite networks. 5563-5580 - Samad Rostampour, Nasour Bagheri

, Mehdi Hosseinzadeh
, Ahmad Khademzadeh:
An authenticated encryption based grouping proof protocol for RFID systems. 5581-5590 - Sahel Alouneh

, Sa'ed Abed
, George Ghinea
:
Security of VoIP traffic over low or limited bandwidth networks. 5591-5599 - Huige Wang, Kefei Chen, Baodong Qin, Liangliang Wang:

Certificateless encryption secure against selective opening attack. 5600-5614 - Jia Xie, Yupu Hu, Juntao Gao:

Multi-use unidirectional lattice-based proxy re-signatures in standard model. 5615-5624 - Jing Chen, Bowen Zhang, Min Chen

, Quan Yuan, Ruiying Du:
A γ-Strawman privacy-preserving scheme in weighted social networks. 5625-5638 - Chanwoo Bae, Seungwon Shin:

A collaborative approach on host and network level android malware detection. 5639-5650 - Jiao Du, Chao Li, Shaojing Fu, Shanqi Pang:

Constructions of p-variable 1-resilient rotation symmetric functions over GF(p). 5651-5658 - Jiaoli Shi, Chuanhe Huang, Jing Wang, Kai He, Xieyang Shen:

An access control scheme with dynamic user management and cloud-aided decryption. 5659-5672 - Mohammad Ahmed Alomari

, Khairulmizam Samsudin
, Abdul Rahman Ramli, Shaiful J. Hashim
:
Efficient Android-based storage encryption using multi-core CPUs. 5673-5686 - Imran Erguler

:
A key recovery attack on an error-correcting code-based lightweight security protocol. 5687-5697 - Hai-Cheng Chu, Gai-Ge Wang, Der-Jiunn Deng:

The social networking investigation of metadata of forensic artifacts of a typical WeChat session under Windows. 5698-5709 - Dihua Sun, Hongzhuan Zhao, Senlin Cheng:

A novel membership cloud model-based trust evaluation model for vehicular ad hoc network of T-CPS. 5710-5723 - Xiaoming Hu, Huajie Xu, Yan Liu, Jian Wang, WenAn Tan, Xiaojun Zhang:

An efficient designated verifier signature scheme with pairing-free and low cost. 5724-5732 - N. K. Sreelaja, N. K. Sreeja:

An image edge based approach for image password encryption. 5733-5745 - Kai Zhang

, Jie Guan, Bin Hu:
Some properties of impossible differential and zero correlation linear cryptanalysis on TEA family-type ciphers. 5746-5755 - Xin Liao

, Guoyong Chen, Jiaojiao Yin:
Content-adaptive steganalysis for color images. 5756-5763 - Mohammad H. Alshayeji

, Suood Abdulaziz Al-Roomi, Sa'ed Abed
:
A high-capacity and secure least significant bit embedding approach based on word and letter frequencies. 5764-5788 - Kai Zhang

, Wen Chen, Xiangxue Li, Jie Chen, Haifeng Qian:
New application of partitioning methodology: identity-based dual receiver encryption. 5789-5802 - Kamal Benzekki

, Abdeslam El Fergougui
, Abdelbaki Elbelrhiti Elalaoui
:
Software-defined networking (SDN): a survey. 5803-5833 - Xuewen Dong, Chao Yang, Lijie Sheng, Chao Wang, Jianfeng Ma:

A new method to deduce counterexamples in secure routing protocols based on strand space model. 5834-5848 - Shaohua Tang, Weijian Li, Jianhao Wu, Zheng Gong, Ming Tang:

Power analysis attacks against FPGA implementation of KLEIN. 5849-5857 - Ting Cui, Guo-qiang Liu, Wei-Tao Song:

Real-time decomposition of three kinds of structural S-boxes. 5858-5867 - Shuaishuai Tan, Yanming Liu, Xiaoping Li, Qingkuan Dong:

A similarity-based indirect trust model with anti-spoofing capability. 5868-5881 - Murat Dener

, Ömer Faruk Bay:
TeenySec: a new data link layer security protocol for WSNs. 5882-5891 - Nikolaos Baroutis, Mohamed F. Younis

:
A novel traffic analysis attack model and base-station anonymity metrics for wireless sensor networks. 5892-5907 - Mohsan Rasheed, Young-Sik Kim

, Dae-Woon Lim
:
An error-free data-hiding scheme for encrypted images. 5908-5917 - Pengbin Feng, Cong Sun

, Jianfeng Ma:
Measuring the risk value of sensitive dataflow path in Android applications. 5918-5933 - Suresh Kumar Krishnamoorthy

, Sasikala Thankappan:
A novel method to authenticate in website using CAPTCHA-based validation. 5934-5942 - Aafaf Ouaddah, Anas Abou El Kalam, Abdellah Ait Ouahman:

FairAccess: a new Blockchain-based access control framework for the Internet of Things. 5943-5964 - Jiawei Dou, Linming Gong, Shundong Li, Li Ma:

Efficient private subset computation. 5965-5976 - J. Abdella, Mustafa Özuysal

, Emrah Tomur
:
CA-ARBAC: privacy preserving using context-aware role-based access control on Android permission system. 5977-5995 - Zuhua Shao, Yipeng Gao

:
Practical verifiably encrypted signatures based on discrete logarithms. 5996-6003 - Abdullah M. Hamdan, Ala Hamarsheh

:
AH4S: an algorithm of text in text steganography using the structure of omega network. 6004-6016 - Bensalah Mustapha, Mustapha Djeddou, Karim Drouiche:

An ultralightweight RFID authentication protocol based on Feistel cipher structure. 6017-6033 - Ruxandra F. Olimid

:
SETUP in secret sharing schemes using random values. 6034-6041 - Ali Ahmadian Ramaki, Abbas Rasoolzadegan:

Causal knowledge analysis for detecting and modeling multi-step attacks. 6042-6065 - Bala Krishnan Ramakrishnan

, Prasanth Kumar Thandra, A. V. Satya Murty Srinivasula:
Text steganography: a novel character-level embedding algorithm using font attribute. 6066-6079 - Ying Liu

, Andrey Garnaev, Wade Trappe:
Connectivity jamming game for physical layer attack in peer to peer networks. 6080-6093 - Zdenek Martinasek

, Félix Iglesias
, Lukas Malina
, Josef Martinasek:
Crucial pitfall of DPA Contest V4.2 implementation. 6094-6110 - Hamed Orojloo, Mohammad Abdollahi Azgomi

:
Predicting the behavior of attackers and the consequences of attacks against cyber-physical systems. 6111-6136 - Seedahmed S. Mahmoud:

A generalised wavelet packet-based anonymisation approach for ECG security application. 6137-6147 - Dhekra Essaidani, Hassene Seddik

, Ezzedine Ben Braiek:
Invariant digital image watermarking based on Defragmented Delaunay Triangulation for optimal watermark synchronization. 6148-6172 - Basel Alomair

:
Authenticated encryption: how reordering can impact performance. 6173-6188 - Raghu Vamsi P.

, Krishna Kant:
Trust aware cooperative routing method for WANETs. 6189-6201 - Geontae Noh, Ik Rae Jeong:

Strong designated verifier signature scheme from lattices in the standard model. 6202-6214 - Serif Bahtiyar

:
Anatomy of targeted attacks with smart malware. 6215-6226 - Qiao Peng, Youliang Tian:

Publicly verifiable secret sharing scheme and its application with almost optimal information rate. 6227-6238 - Sahib Khan

, Muhammad Ismail, Tawab Khan, Nasir Ahmad:
Enhanced stego block chaining (ESBC) for low bandwidth channels. 6239-6247 - Ibrahim M. Mahmoud, Sherif Hazem Nour El-Din, Rania Elgohary

, Hossam El Deen Mostafa Faheem
, Mostafa G. M. Mostafa
:
A robust cryptographic-based system for secure data sharing in cloud environments. 6248-6265
- Gaurav Varshney, Manoj Misra, Pradeep K. Atrey:

A survey and classification of web phishing detection schemes. 6266-6284 - Stavros Simou, Christos Kalloniatis, Stefanos Gritzalis

, Haralambos Mouratidis:
A survey on cloud forensics challenges and solutions. 6285-6314 - Sonika Singh, Sahadeo Padhye

:
Generalisations of NTRU cryptosystem. 6315-6334 - Fu-Hau Hsu, Yu-Liang Hsu, Yanling Hwang, Li-Han Chen

, Chuan-Sheng Wang, Chang-Kuo Tso, Szu-Chi Liu, Po-Ching Lin, Chi-Hsien Hsu:
VRS: a values-based reputation system for web services. 6335-6350 - Furui Zhan, Nianmin Yao

:
A collusion-resistant dynamic key management scheme for WSNs. 6351-6364 - Mohammed Hazim Alkawaz

, Ghazali Sulong, Tanzila Saba
, Abdulaziz S. Almazyad
, Amjad Rehman
:
Concise analysis of current text automation and watermarking approaches. 6365-6378 - P. Dharshini, J. Arokia Renjith, P. Mohan Kumar:

Screening the covert key using honey encryption to rule out the brute force attack of AES - a survey. 6379-6385 - Neelam Dayal, Prasenjit Maity, Shashank Srivastava

, Rahamatullah Khondoker:
Research Trends in Security and DDoS in SDN. 6386-6411

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














