Search dblp for Publications

export results for "toc:db/journals/scn/scn8.bht:"

 download as .bib file

@article{DBLP:journals/scn/0001SX15,
  author       = {Zhe Liu and
                  Hwajeong Seo and
                  Qiuliang Xu},
  title        = {Performance evaluation of twisted Edwards-form elliptic curve cryptography
                  for wireless sensor nodes},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3301--3310},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1254},
  doi          = {10.1002/SEC.1254},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/0001SX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/0002LM0Z15,
  author       = {Zhuo Li and
                  Qilian Liang and
                  Jiasong Mu and
                  Wei Wang and
                  Baoju Zhang},
  title        = {The hybrid architecture of wireless and power line communications
                  in HANs for Smart Grid security},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {14},
  pages        = {2404--2410},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.763},
  doi          = {10.1002/SEC.763},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/0002LM0Z15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/0019L0CC15,
  author       = {Chen Li and
                  Rongxing Lu and
                  Hui Li and
                  Le Chen and
                  Jie Chen},
  title        = {{PDA:} a privacy-preserving dual-functional aggregation scheme for
                  smart grid communications},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {15},
  pages        = {2494--2506},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1191},
  doi          = {10.1002/SEC.1191},
  timestamp    = {Mon, 18 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/0019L0CC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/0046ZZM15,
  author       = {Wei Wang and
                  Xin Zhou and
                  Baoju Zhang and
                  Jiasong Mu},
  title        = {Anomaly detection in big data from {UWB} radars},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {14},
  pages        = {2469--2475},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.745},
  doi          = {10.1002/SEC.745},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/0046ZZM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AamirZ15,
  author       = {Muhammad Aamir and
                  Syed Mustafa Ali Zaidi},
  title        = {Denial-of-service in content centric (named data) networking: a tutorial
                  and state-of-the-art survey},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2037--2059},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1149},
  doi          = {10.1002/SEC.1149},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AamirZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AbbasML15,
  author       = {Sohail Abbas and
                  Madjid Merabti and
                  David Llewellyn{-}Jones},
  title        = {On the evaluation of reputation and trust-based schemes in mobile
                  ad hoc networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4041--4052},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1320},
  doi          = {10.1002/SEC.1320},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AbbasML15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Adibi15,
  author       = {Sasan Adibi},
  title        = {A multilayer non-repudiation system: a Suite-B approach},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {9},
  pages        = {1698--1706},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1117},
  doi          = {10.1002/SEC.1117},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Adibi15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AfrakhtehL15,
  author       = {Masoud Afrakhteh and
                  Jeong{-}A Lee},
  title        = {Adaptive least significant bit matching revisited with the help of
                  error images},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {3},
  pages        = {510--515},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.998},
  doi          = {10.1002/SEC.998},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AfrakhtehL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AfrakhtehL15a,
  author       = {Masoud Afrakhteh and
                  Jeong{-}A Lee},
  title        = {Parallel modular steganography using error images},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1515--1524},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1100},
  doi          = {10.1002/SEC.1100},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AfrakhtehL15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Afsar15,
  author       = {Mehdi Afsar},
  title        = {A comprehensive fault-tolerant framework for wireless sensor networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {3247--3261},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1249},
  doi          = {10.1002/SEC.1249},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Afsar15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AhmedSRR15,
  author       = {Shakil Ahmed and
                  Khairulmizam Samsudin and
                  Abdul Rahman Ramli and
                  Fakhrul Zaman Rokhani},
  title        = {Advanced Encryption Standard-XTS implementation in field programmable
                  gate array hardware},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {3},
  pages        = {516--522},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.999},
  doi          = {10.1002/SEC.999},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AhmedSRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AkgunBC15,
  author       = {Mete Akg{\"{u}}n and
                  Ali Osman Bayrak and
                  Mehmet Ufuk {\c{C}}aglayan},
  title        = {Attacks and improvements to chaotic map-based {RFID} authentication
                  protocol},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4028--4040},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1319},
  doi          = {10.1002/SEC.1319},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AkgunBC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AkleylekK15,
  author       = {Sedat Akleylek and
                  Baris B{\"{u}}lent Kirlar},
  title        = {New methods for public key cryptosystems based on {XTR}},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3682--3689},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1291},
  doi          = {10.1002/SEC.1291},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AkleylekK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Al-TaharwaLJWHC15,
  author       = {Ismail Adel Al{-}Taharwa and
                  Hahn{-}Ming Lee and
                  Albert B. Jeng and
                  Kuo{-}Ping Wu and
                  Cheng{-}Seen Ho and
                  Shyi{-}Ming Chen},
  title        = {{JSOD:} JavaScript obfuscation detector},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1092--1107},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1064},
  doi          = {10.1002/SEC.1064},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/Al-TaharwaLJWHC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Al-ZewairiAA15,
  author       = {Malek Al{-}Zewairi and
                  Ja'far Alqatawna and
                  Jalal Atoum},
  title        = {Risk adaptive hybrid {RFID} access control system},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3826--3835},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1303},
  doi          = {10.1002/SEC.1303},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Al-ZewairiAA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Al-maweriARSA15,
  author       = {Nasr addin Ahmed Salem Al{-}maweri and
                  Wan Azizun Wan Adnan and
                  Abdul Rahman Ramli and
                  Khairulmizam Samsudin and
                  Sharifah Mumtazah Syed Ahmad},
  title        = {A hybrid digital image watermarking algorithm based on {DCT-DWT} and
                  auto-thresholding},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4373--4395},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1371},
  doi          = {10.1002/SEC.1371},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Al-maweriARSA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Aldini15,
  author       = {Alessandro Aldini},
  title        = {Modeling and verification of trust and reputation systems},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2933--2946},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1220},
  doi          = {10.1002/SEC.1220},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Aldini15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AldwairiKA15,
  author       = {Monther Aldwairi and
                  Yaser M. Khamayseh and
                  Mohammad Al{-}Masri},
  title        = {Application of artificial bee colony for intrusion detection systems},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2730--2740},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.588},
  doi          = {10.1002/SEC.588},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/AldwairiKA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AlmimiSJ15,
  author       = {Hani Almimi and
                  Azman Samsudin and
                  Shahram Jahani},
  title        = {Elliptic-curve scalar multiplication algorithm using {ZOT} structure},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1141--1154},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1047},
  doi          = {10.1002/SEC.1047},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AlmimiSJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AlsalehAAA15,
  author       = {Mansour Alsaleh and
                  Abdulrahman Alarifi and
                  Abdullah Alqahtani and
                  AbdulMalik S. Al{-}Salman},
  title        = {Visualizing web server attacks: patterns in {PHPIDS} logs\({}^{\mbox{\emph{{\textdaggerdbl}}}}\)},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {11},
  pages        = {1991--2003},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1147},
  doi          = {10.1002/SEC.1147},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AlsalehAAA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AmamraRT15,
  author       = {Abdelfattah Amamra and
                  Jean{-}Marc Robert and
                  Chamseddine Talhi},
  title        = {Enhancing malware detection for Android systems using a system call
                  filtering and abstraction process},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1179--1192},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1073},
  doi          = {10.1002/SEC.1073},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AmamraRT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AnwarK15,
  author       = {Zahid Anwar and
                  Waqas Ahmad Khan},
  title        = {Guess who is listening in to the board meeting: on the use of mobile
                  device applications as roving spy bugs},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2813--2825},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1205},
  doi          = {10.1002/SEC.1205},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AnwarK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AsaarSB15,
  author       = {Maryam Rajabzadeh Asaar and
                  Mahmoud Salmasizadeh and
                  Colin Boyd},
  title        = {Identity-based proxy signatures: a generic construction and a concrete
                  scheme from {RSA}},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3602--3614},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1284},
  doi          = {10.1002/SEC.1284},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AsaarSB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AsaarSS15,
  author       = {Maryam Rajabzadeh Asaar and
                  Mahmoud Salmasizadeh and
                  Willy Susilo},
  title        = {A provably secure identity-based proxy ring signature based on {RSA}},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1223--1236},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1076},
  doi          = {10.1002/SEC.1076},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AsaarSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AsayeshHJ15,
  author       = {Atefeh Asayesh and
                  Mohammad Ali Hadavi and
                  Rasool Jalili},
  title        = {(\emph{t}, \emph{k})-Hypergraph anonymization: an approach for secure
                  data publishing},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1306--1317},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1084},
  doi          = {10.1002/SEC.1084},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AsayeshHJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AsgharianAR15,
  author       = {Hassan Asgharian and
                  Ahmad Akbari and
                  Bijan Raahemi},
  title        = {Feature engineering for detection of Denial of Service attacks in
                  session initiation protocol},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1587--1601},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1106},
  doi          = {10.1002/SEC.1106},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AsgharianAR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AvilaT15,
  author       = {Jayapalan Avila and
                  Karuppusamy Thenmozhi},
  title        = {Authentication scheme to combat a primary user emulation attack against
                  cognitive radio users},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4242--4253},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1339},
  doi          = {10.1002/SEC.1339},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AvilaT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BabyC15,
  author       = {Tinu Baby and
                  Aswani Kumar Cherukuri},
  title        = {On query execution over encrypted data},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {2},
  pages        = {321--331},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.982},
  doi          = {10.1002/SEC.982},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/BabyC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BaekBHA15,
  author       = {Joonsang Baek and
                  Young{-}Ji Byon and
                  Eman Hableel and
                  Mahmoud Al{-}Qutayri},
  title        = {Making air traffic surveillance more reliable: a new authentication
                  framework for automatic dependent surveillance-broadcast {(ADS-B)}
                  based on online/offline identity-based signature},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {5},
  pages        = {740--750},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1021},
  doi          = {10.1002/SEC.1021},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/BaekBHA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BanikJ15,
  author       = {Subhadeep Banik and
                  Sonu Jha},
  title        = {Some security results of the {RC4+} stream cipher},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4061--4072},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1323},
  doi          = {10.1002/SEC.1323},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/BanikJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BaraniAJVA15,
  author       = {Milad Jafari Barani and
                  Peyman Ayubi and
                  Fooad Jalili and
                  Milad Yousefi Valandar and
                  Ehsan Azariyun},
  title        = {Image forgery detection in contourlet transform domain based on new
                  chaotic cellular automata},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4343--4361},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1365},
  doi          = {10.1002/SEC.1365},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/BaraniAJVA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BasicevicOP15,
  author       = {Ilija Basicevic and
                  Stanislav Ocovaj and
                  Miroslav Popovic},
  title        = {Evaluation of entropy-based detection of outbound denial-of-service
                  attacks in edge networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {5},
  pages        = {837--844},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1040},
  doi          = {10.1002/SEC.1040},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/BasicevicOP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BasicevicOP15a,
  author       = {Ilija Basicevic and
                  Stanislav Ocovaj and
                  Miroslav Popovic},
  title        = {Use of Tsallis entropy in detection of {SYN} flood DoS attacks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3634--3640},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1286},
  doi          = {10.1002/SEC.1286},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/BasicevicOP15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BhattacharyaS15,
  author       = {Sangeeta Bhattacharya and
                  Subramanian Selvakumar},
  title        = {{LAWRA:} a layered wrapper feature selection approach for network
                  attack detection},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3459--3468},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1270},
  doi          = {10.1002/SEC.1270},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/BhattacharyaS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BorgesSM15,
  author       = {F{\'{a}}bio Borges and
                  Raqueline A. M. Santos and
                  Franklin L. Marquezino},
  title        = {Preserving privacy in a smart grid scenario using quantum mechanics},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2061--2069},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1152},
  doi          = {10.1002/SEC.1152},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/BorgesSM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Byun15,
  author       = {Jin Wook Byun},
  title        = {Privacy preserving smartcard-based authentication system with provable
                  security},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {3028--3044},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1229},
  doi          = {10.1002/SEC.1229},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Byun15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/CaoC15,
  author       = {Zongjie Cao and
                  Lijia Chen},
  title        = {Security in application layer of radar sensor networks: detect friends
                  or foe},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2712--2722},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.572},
  doi          = {10.1002/SEC.572},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/CaoC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/CaoG15,
  author       = {Liling Cao and
                  Wancheng Ge},
  title        = {Analysis and improvement of a multi-factor biometric authentication
                  scheme},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {4},
  pages        = {617--625},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1010},
  doi          = {10.1002/SEC.1010},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/CaoG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/CaoLBQLHM15,
  author       = {Lvchen Cao and
                  Yuling Luo and
                  Jinjie Bi and
                  Senhui Qiu and
                  Zhenkun Lu and
                  Jim Harkin and
                  Liam McDaid},
  title        = {An authentication strategy based on spatiotemporal chaos for software
                  copyright protection},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4073--4086},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1324},
  doi          = {10.1002/SEC.1324},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/CaoLBQLHM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/CaoML15,
  author       = {Jin Cao and
                  Maode Ma and
                  Hui Li},
  title        = {{GBAAM:} group-based access authentication for {MTC} in {LTE} networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {3282--3299},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1252},
  doi          = {10.1002/SEC.1252},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/CaoML15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/CazorlaGMM15,
  author       = {Micka{\"{e}}l Cazorla and
                  Sylvain Gourgeon and
                  Kevin Marquet and
                  Marine Minier},
  title        = {Survey and benchmark of lightweight block ciphers for {MSP430} 16-bit
                  microcontroller},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3564--3579},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1281},
  doi          = {10.1002/SEC.1281},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/CazorlaGMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Chang15,
  author       = {Ya{-}Fen Chang},
  title        = {A flexible hierarchical access control mechanism enforcing extension
                  policies},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {2},
  pages        = {189--201},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.971},
  doi          = {10.1002/SEC.971},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Chang15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChangL15,
  author       = {Chin{-}Chen Chang and
                  Hai{-}Duong Le},
  title        = {A provably secure smart card-based authenticated group key exchange
                  protocol},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1602--1607},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1107},
  doi          = {10.1002/SEC.1107},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChangL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChangSC15,
  author       = {Chin{-}Chen Chang and
                  Chin{-}Yu Sun and
                  Ting{-}Fang Cheng},
  title        = {A dependable storage service system in cloud environment},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {4},
  pages        = {574--588},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1004},
  doi          = {10.1002/SEC.1004},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChangSC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChangX15,
  author       = {Jinyong Chang and
                  Rui Xue},
  title        = {Practical key-dependent message chosen-ciphertext security based on
                  decisional composite residuosity and quadratic residuosity assumptions},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1525--1536},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1101},
  doi          = {10.1002/SEC.1101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChangX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChatterjeeD15,
  author       = {Santanu Chatterjee and
                  Ashok Kumar Das},
  title        = {An effective ECC-based user access control scheme with attribute-based
                  encryption for wireless sensor networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {9},
  pages        = {1752--1771},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1140},
  doi          = {10.1002/SEC.1140},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChatterjeeD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChaudhryFNKK15,
  author       = {Shehzad Ashraf Chaudhry and
                  Mohammad Sabzinejad Farash and
                  Husnain Naqvi and
                  Saru Kumari and
                  Muhammad Khurram Khan},
  title        = {An enhanced privacy preserving remote user authentication scheme with
                  provable security},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3782--3795},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1299},
  doi          = {10.1002/SEC.1299},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChaudhryFNKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/CheFLW15,
  author       = {Shenyun Che and
                  Renjian Feng and
                  Xuan Liang and
                  Xiao Wang},
  title        = {A lightweight trust management based on Bayesian and Entropy for wireless
                  sensor networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {2},
  pages        = {168--175},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.969},
  doi          = {10.1002/SEC.969},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/CheFLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChenD15,
  author       = {Yuan Chen and
                  Qingkuan Dong},
  title        = {Achieving {CCA} security from {DCCA} security more efficiently by
                  using the {KEM+DEM} hybrid paradigm},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3323--3334},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1256},
  doi          = {10.1002/SEC.1256},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChenD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChenJ15,
  author       = {Shiwei Chen and
                  Chenhui Jin},
  title        = {A second preimage attack on zipper hash},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2860--2866},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1210},
  doi          = {10.1002/SEC.1210},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChenJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChenL15,
  author       = {Chi{-}Tung Chen and
                  Cheng{-}Chi Lee},
  title        = {A two-factor authentication scheme with anonymity for multi-server
                  environments},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1608--1625},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1109},
  doi          = {10.1002/SEC.1109},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChenL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChenLALC15,
  author       = {Le Chen and
                  Rongxing Lu and
                  Khalid Nawaf Alharbi and
                  Xiaodong Lin and
                  Zhenfu Cao},
  title        = {ReDD: recommendation-based data dissemination in privacy-preserving
                  mobile social networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1291--1305},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1082},
  doi          = {10.1002/SEC.1082},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChenLALC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChenLHBZ15,
  author       = {Ting Chen and
                  Xiaodong Lin and
                  Jin Huang and
                  Abel Bacchus and
                  Xiaosong Zhang},
  title        = {An empirical investigation into path divergences for concolic execution
                  using {CREST}},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3667--3681},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1290},
  doi          = {10.1002/SEC.1290},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChenLHBZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChenLW15,
  author       = {Junjie Chen and
                  Qilian Liang and
                  Jie Wang},
  title        = {Secure transmission for big data based on nested sampling and coprime
                  sampling with spectrum efficiency},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {14},
  pages        = {2447--2456},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.785},
  doi          = {10.1002/SEC.785},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChenLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChenLWH15,
  author       = {Zhenhua Chen and
                  Shundong Li and
                  Qianhong Wu and
                  Qiong Huang},
  title        = {A distributed secret share update scheme with public verifiability
                  for ad hoc network},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1485--1493},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1097},
  doi          = {10.1002/SEC.1097},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChenLWH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChenLZYX15,
  author       = {Zhenhua Chen and
                  Shundong Li and
                  Youwen Zhu and
                  Jianhua Yan and
                  Xinli Xu},
  title        = {A cheater identifiable multi-secret sharing scheme based on the Chinese
                  remainder theorem},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3592--3601},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1283},
  doi          = {10.1002/SEC.1283},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChenLZYX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChenMM15,
  author       = {Jiageng Chen and
                  Mohammad Saiful Islam Mamun and
                  Atsuko Miyaji},
  title        = {An efficient batch verification system and its effect in a real time
                  {VANET} environment},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {2},
  pages        = {298--310},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.980},
  doi          = {10.1002/SEC.980},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChenMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChenTMHH15,
  author       = {Yu{-}Chi Chen and
                  Raylin Tso and
                  Masahiro Mambo and
                  Kaibin Huang and
                  Gwoboa Horng},
  title        = {Certificateless aggregate signature with efficient verification},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {13},
  pages        = {2232--2243},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1166},
  doi          = {10.1002/SEC.1166},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChenTMHH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChengJLZ15,
  author       = {Chi Cheng and
                  Tao Jiang and
                  Yining Liu and
                  Mingwu Zhang},
  title        = {Security analysis of a homomorphic signature scheme for network coding},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4053--4060},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1321},
  doi          = {10.1002/SEC.1321},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChengJLZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChengSTX15,
  author       = {Xiang Cheng and
                  Sen Su and
                  Yiping Teng and
                  Ke Xiao},
  title        = {Enabling secure and efficient kNN query processing over encrypted
                  spatial data in the cloud},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {3205--3218},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1245},
  doi          = {10.1002/SEC.1245},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChengSTX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChengYTHZ15,
  author       = {Xueqi Cheng and
                  Jinhong Yuan and
                  Ali Tajer and
                  Aiqun Hu and
                  Wanlei Zhou},
  title        = {Special issue on recent advances in network and information security
                  - security and communication networks journal},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {1},
  pages        = {1},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1180},
  doi          = {10.1002/SEC.1180},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChengYTHZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChengZ15,
  author       = {Rong Cheng and
                  Fangguo Zhang},
  title        = {Lattice-based obfuscation for re-encryption functions},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {9},
  pages        = {1648--1658},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1112},
  doi          = {10.1002/SEC.1112},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/ChengZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChinBHP15,
  author       = {Ji{-}Jian Chin and
                  Rouzbeh Behnia and
                  Swee{-}Huay Heng and
                  Raphael C.{-}W. Phan},
  title        = {Cryptanalysis of a certificateless identification scheme},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {2},
  pages        = {122--125},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.963},
  doi          = {10.1002/SEC.963},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChinBHP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChoiSEJ15,
  author       = {Seonho Choi and
                  Kun Sun and
                  Hyeonsang Eom and
                  Edward Jung},
  title        = {Multi-source broadcast authentication with Combined Key Chains for
                  wireless ad hoc networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1169--1178},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1072},
  doi          = {10.1002/SEC.1072},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChoiSEJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Chuang15,
  author       = {Yung{-}Ting Chuang},
  title        = {An adaptable and scalable membership management for the iTrust information
                  search and retrieval system},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3492--3510},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1273},
  doi          = {10.1002/SEC.1273},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Chuang15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/CruzSMBL15,
  author       = {Tiago Cruz and
                  Paulo Sim{\~{o}}es and
                  Edmundo Monteiro and
                  Fernando Bastos and
                  Alexandre Laranjeira},
  title        = {Cooperative security management for broadband network environments},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3953--3977},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1313},
  doi          = {10.1002/SEC.1313},
  timestamp    = {Fri, 12 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/CruzSMBL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/CuiYJHL15,
  author       = {Xiang Cui and
                  Lihua Yin and
                  Shuyuan Jin and
                  Zhiyu Hao and
                  Shuhao Li},
  title        = {Botnet spoofing: fighting botnet with itself},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {1},
  pages        = {80--89},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.749},
  doi          = {10.1002/SEC.749},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/CuiYJHL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DargahiJH15,
  author       = {Tooska Dargahi and
                  Hamid H. S. Javadi and
                  Mehdi Hosseinzadeh},
  title        = {Application-specific hybrid symmetric design of key pre-distribution
                  for wireless sensor networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1561--1574},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1104},
  doi          = {10.1002/SEC.1104},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/DargahiJH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DasMM15,
  author       = {Ashok Kumar Das and
                  Dheerendra Mishra and
                  Sourav Mukhopadhyay},
  title        = {An anonymous and secure biometric-based enterprise digital rights
                  management system for mobile environment},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3383--3404},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1266},
  doi          = {10.1002/SEC.1266},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/DasMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DelBelloRZ15,
  author       = {Chris DelBello and
                  Kazi Raihan and
                  Tao Zhang},
  title        = {Reducing energy consumption of mobile phones during data transmission
                  and encryption for wireless body area network applications},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {2973--2980},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1223},
  doi          = {10.1002/SEC.1223},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/DelBelloRZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DerhabB15,
  author       = {Abdelouahid Derhab and
                  Abdelghani Bouras},
  title        = {Multivariate correlation analysis and geometric linear similarity
                  for real-time intrusion detection systems},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1193--1212},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1074},
  doi          = {10.1002/SEC.1074},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/DerhabB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DeveciC15,
  author       = {Engin Deveci and
                  Mehmet Ufuk {\c{C}}aglayan},
  title        = {Model driven security framework for software design and verification},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2768--2792},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1200},
  doi          = {10.1002/SEC.1200},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/DeveciC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DhasarathanTP15,
  author       = {Chandramohan Dhasarathan and
                  Vengattaraman Thirumal and
                  Dhavachelvan Ponnurangam},
  title        = {Data privacy breach prevention framework for the cloud service},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {6},
  pages        = {982--1005},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1054},
  doi          = {10.1002/SEC.1054},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/DhasarathanTP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DjellaliBCL15,
  author       = {Benchaa Djellali and
                  Kheira Belarbi and
                  Abdallah Chouarfia and
                  Pascal Lorenz},
  title        = {User authentication scheme preserving anonymity for ubiquitous devices},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {3131--3141},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1238},
  doi          = {10.1002/SEC.1238},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/DjellaliBCL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DongDW15,
  author       = {Qingkuan Dong and
                  Wenxiu Ding and
                  Lili Wei},
  title        = {Improvement and optimized implementation of cryptoGPS protocol for
                  low-cost radio-frequency identification authentication},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1474--1484},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1096},
  doi          = {10.1002/SEC.1096},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/DongDW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DuWW15,
  author       = {Yao Du and
                  Xiaoqing Wang and
                  Junfeng Wang},
  title        = {A static Android malicious code detection method based on multi-source
                  fusion},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {3238--3246},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1248},
  doi          = {10.1002/SEC.1248},
  timestamp    = {Fri, 04 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/DuWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DuZZL15,
  author       = {Rong Du and
                  Chenglin Zhao and
                  Feng Zhao and
                  Shenghong Li},
  title        = {Strategies of network coding against nodes conspiracy attack},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {14},
  pages        = {2396--2403},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.753},
  doi          = {10.1002/SEC.753},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/DuZZL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/EhdaieAAAP15,
  author       = {Mohammad Ehdaie and
                  Nikolaos Alexiou and
                  Mahmoud Ahmadian{-}Attari and
                  Mohammad Reza Aref and
                  Panos Papadimitratos},
  title        = {Key splitting: making random key distribution schemes resistant against
                  node capture},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {3},
  pages        = {431--445},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.991},
  doi          = {10.1002/SEC.991},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/EhdaieAAAP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ElashryMS15,
  author       = {Ibrahim F. Elashry and
                  Yi Mu and
                  Willy Susilo},
  title        = {A resilient identity-based authenticated key exchange protocol},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {13},
  pages        = {2279--2290},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1172},
  doi          = {10.1002/SEC.1172},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ElashryMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/EmuraMRO15,
  author       = {Keita Emura and
                  Atsuko Miyaji and
                  Mohammad Shahriar Rahman and
                  Kazumasa Omote},
  title        = {Generic constructions of secure-channel free searchable encryption
                  with adaptive security},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1547--1560},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1103},
  doi          = {10.1002/SEC.1103},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/EmuraMRO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ErfaniJR15,
  author       = {Seyed Hossein Erfani and
                  Hamid Haj Seyyed Javadi and
                  Amir Masoud Rahmani},
  title        = {A dynamic key management scheme for dynamic wireless sensor networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1040--1049},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1058},
  doi          = {10.1002/SEC.1058},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ErfaniJR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ErmisBAC15,
  author       = {Orhan Ermis and
                  Serif Bahtiyar and
                  Emin Anarim and
                  M. Ufuk {\c{C}}aglayan},
  title        = {An improved conference-key agreement protocol for dynamic groups with
                  efficient fault correction},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1347--1359},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1089},
  doi          = {10.1002/SEC.1089},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ErmisBAC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/FallahpourSG15,
  author       = {Mehdi Fallahpour and
                  Shervin Shirmohammadi and
                  Mohammad Ghanbari},
  title        = {A high capacity data hiding algorithm for {H.264/AVC} video},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2947--2955},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1221},
  doi          = {10.1002/SEC.1221},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/FallahpourSG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/FanWCLJ15,
  author       = {Lejun Fan and
                  Yuanzhuo Wang and
                  Xueqi Cheng and
                  Jinming Li and
                  Shuyuan Jin},
  title        = {Privacy theft malware multi-process collaboration analysis},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {1},
  pages        = {51--67},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.705},
  doi          = {10.1002/SEC.705},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/FanWCLJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/FarcasinC15,
  author       = {Michael Farcasin and
                  Eric Chan{-}Tin},
  title        = {Why we hate {IT:} two surveys on pre-generated and expiring passwords
                  in an academic setting},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {13},
  pages        = {2361--2373},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1184},
  doi          = {10.1002/SEC.1184},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/FarcasinC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/FeiYLXZ15,
  author       = {Wei Fei and
                  Gaobo Yang and
                  Leida Li and
                  Ming Xia and
                  Dengyong Zhang},
  title        = {Detection of seam carving-based video retargeting using forensics
                  hash},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2102--2113},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1158},
  doi          = {10.1002/SEC.1158},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/FeiYLXZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/FengHGM15,
  author       = {Tao Feng and
                  Shining Han and
                  Xian Guo and
                  Donglin Ma},
  title        = {A new method of formalizing anonymity based on protocol composition
                  logic},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1132--1140},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1068},
  doi          = {10.1002/SEC.1068},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/FengHGM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/FengLZL15,
  author       = {Hui Feng and
                  Hefei Ling and
                  Fuhao Zou and
                  Zhengding Lu},
  title        = {SVM-based anti-forensic method for spread-spectrum fingerprinting},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2624--2634},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.503},
  doi          = {10.1002/SEC.503},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/FengLZL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/FengZLZ15,
  author       = {Jingyu Feng and
                  Yuqing Zhang and
                  Guangyue Lu and
                  Wenxiu Zheng},
  title        = {Securing cooperative spectrum sensing against {ISSDF} attack using
                  dynamic trust evaluation in cognitive radio networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {3157--3166},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1240},
  doi          = {10.1002/SEC.1240},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/FengZLZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Fredj15,
  author       = {Ouissem Ben Fredj},
  title        = {A realistic graph-based alert correlation system},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {15},
  pages        = {2477--2493},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1190},
  doi          = {10.1002/SEC.1190},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Fredj15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/FuDL15,
  author       = {Xiao Fu and
                  Xiaojiang Du and
                  Bin Luo},
  title        = {Data correlation-based analysis methods for automatic memory forensic},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4213--4226},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1337},
  doi          = {10.1002/SEC.1337},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/FuDL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Fujinoki15,
  author       = {Hiroshi Fujinoki},
  title        = {Designs, analyses, and optimizations for attribute-shuffling obfuscation
                  to protect information from malicious cloud administrators},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {3045--3066},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1231},
  doi          = {10.1002/SEC.1231},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Fujinoki15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/GengLZ15,
  author       = {Guang{-}Gang Geng and
                  Xiao{-}Dong Lee and
                  Yan{-}Ming Zhang},
  title        = {Combating phishing attacks via brand identity and authorization features},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {6},
  pages        = {888--898},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1045},
  doi          = {10.1002/SEC.1045},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/GengLZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/GhasemiGolB15,
  author       = {Mohammad GhasemiGol and
                  Abbas Ghaemi Bafghi},
  title        = {E-correlator: an entropy-based alert correlation system},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {5},
  pages        = {822--836},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1039},
  doi          = {10.1002/SEC.1039},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/GhasemiGolB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/GheorgheMGMDVC15,
  author       = {Laura Gheorghe and
                  Bogdan Marin and
                  Gary Gibson and
                  Lucian Mogosanu and
                  Razvan Deaconescu and
                  Valentin{-}Gabriel Voiculescu and
                  Mihai Carabas},
  title        = {Smart malware detection on Android},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4254--4272},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1340},
  doi          = {10.1002/SEC.1340},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/GheorgheMGMDVC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/GogoulosALMKV15,
  author       = {Fotios Gogoulos and
                  Anna Antonakopoulou and
                  Georgios V. Lioudakis and
                  Aziz S. Mousas and
                  Dimitra I. Kaklamani and
                  Iakovos S. Venieris},
  title        = {An authorization model for cross-enterprise collaborations},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {4},
  pages        = {523--539},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1000},
  doi          = {10.1002/SEC.1000},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/GogoulosALMKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/GuleriaD15,
  author       = {Vandana Guleria and
                  Ratna Dutta},
  title        = {Universally composable issuer-free adaptive oblivious transfer with
                  access policy},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3615--3633},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1285},
  doi          = {10.1002/SEC.1285},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/GuleriaD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/GuoCCZ15,
  author       = {Wenzhong Guo and
                  Jia Ye Chen and
                  Guolong Chen and
                  Haifeng Zheng},
  title        = {Trust dynamic task allocation algorithm with Nash equilibrium for
                  heterogeneous wireless sensor network},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {10},
  pages        = {1865--1877},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1026},
  doi          = {10.1002/SEC.1026},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/GuoCCZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HachmiBL15,
  author       = {Fatma Hachmi and
                  Khadouja Boujenfa and
                  Mohamed Limam},
  title        = {An optimization process to identify outliers generated by intrusion
                  detection systems},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3469--3480},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1271},
  doi          = {10.1002/SEC.1271},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HachmiBL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HajnyDM15,
  author       = {Jan Hajny and
                  Petr Dzurenda and
                  Lukas Malina},
  title        = {Attribute-based credentials with cryptographic collusion prevention},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3836--3846},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1304},
  doi          = {10.1002/SEC.1304},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HajnyDM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HakamianR15,
  author       = {Mir Alireza Hakamian and
                  Amir Masoud Rahmani},
  title        = {Evaluation of isolation in virtual machine environments encounter
                  in effective attacks against memory},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4396--4406},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1374},
  doi          = {10.1002/SEC.1374},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HakamianR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HaoWLR15,
  author       = {Sun Hao and
                  Wen Wang and
                  Huabiao Lu and
                  Peige Ren},
  title        = {AutoMal: automatic clustering and signature generation for malwares
                  based on the network flow},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {10},
  pages        = {1845--1854},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1029},
  doi          = {10.1002/SEC.1029},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HaoWLR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HarnG15,
  author       = {Lein Harn and
                  Guang Gong},
  title        = {Conference key establishment protocol using a multivariate polynomial
                  and its applications},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {9},
  pages        = {1794--1800},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1143},
  doi          = {10.1002/SEC.1143},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HarnG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HouH15,
  author       = {Fangyong Hou and
                  Hongjun He},
  title        = {Ultra simple way to encrypt non-volatile main memory},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1155--1168},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1071},
  doi          = {10.1002/SEC.1071},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HouH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HowladerM15,
  author       = {Jaydeep Howlader and
                  Ashis Kumar Mal},
  title        = {Sealed-bid auction: a cryptographic solution to bid-rigging attack
                  in the collusive environment},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3415--3440},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1268},
  doi          = {10.1002/SEC.1268},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HowladerM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HsuCL15,
  author       = {Fu{-}Hau Hsu and
                  Li{-}Han Chen and
                  Chia{-}Jun Lin},
  title        = {Defeat scanning worms in cyber warfare},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {5},
  pages        = {715--726},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1019},
  doi          = {10.1002/SEC.1019},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HsuCL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HuWL15,
  author       = {Ning Hu and
                  BaoSheng Wang and
                  Xin Liu},
  title        = {Cooperative monitoring {BGP} among autonomous systems},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {10},
  pages        = {1943--1957},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1024},
  doi          = {10.1002/SEC.1024},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HuWL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HuWXT15,
  author       = {Xiaoming Hu and
                  Jian Wang and
                  Huajie Xu and
                  WenAn Tan},
  title        = {A short and highly efficient identity-based designated verifier proxy
                  signature scheme},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {6},
  pages        = {907--916},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1048},
  doi          = {10.1002/SEC.1048},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HuWXT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HuangD15,
  author       = {Xueli Huang and
                  Xiaojiang Du},
  title        = {Achieving data privacy on hybrid cloud},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3771--3781},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1298},
  doi          = {10.1002/SEC.1298},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HuangD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HuangJ15,
  author       = {Jingjing Huang and
                  Ting Jiang},
  title        = {Secret key generation exploiting Ultra-wideband indoor wireless channel
                  characteristics},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {13},
  pages        = {2329--2337},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1178},
  doi          = {10.1002/SEC.1178},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HuangJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HuangLC15,
  author       = {Zhengan Huang and
                  Shengli Liu and
                  Kefei Chen},
  title        = {\emph{n}-Evasive all-but-many lossy trapdoor function and its constructions},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {4},
  pages        = {550--564},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1002},
  doi          = {10.1002/SEC.1002},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HuangLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HuangLLL15,
  author       = {Chun{-}Ying Huang and
                  Ying{-}Dar Lin and
                  Peng{-}Yu Liao and
                  Yuan{-}Cheng Lai},
  title        = {Stateful traffic replay for web application proxies},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {6},
  pages        = {970--981},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1053},
  doi          = {10.1002/SEC.1053},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HuangLLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HuangYCX15,
  author       = {Xiaoling Huang and
                  Guodong Ye and
                  Huajin Chai and
                  Ou Xie},
  title        = {Compression and encryption for remote sensing image using chaotic
                  system},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3659--3666},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1289},
  doi          = {10.1002/SEC.1289},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HuangYCX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HussainDZN15,
  author       = {Intesab Hussain and
                  Soufiene Djahel and
                  Zonghua Zhang and
                  Farid Na{\"{\i}}t{-}Abdesselam},
  title        = {A comprehensive study of flooding attack consequences and countermeasures
                  in Session Initiation Protocol {(SIP)}},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4436--4451},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1328},
  doi          = {10.1002/SEC.1328},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/HussainDZN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HwangCCS15,
  author       = {Jung Yeon Hwang and
                  Dooho Choi and
                  Hyun Sook Cho and
                  Boyeon Song},
  title        = {New efficient batch verification for an identity-based signature scheme},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {15},
  pages        = {2524--2535},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1194},
  doi          = {10.1002/SEC.1194},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HwangCCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HwangG15,
  author       = {Tzonelih Hwang and
                  Prosanta Gope},
  title        = {{IAR-CTR} and {IAR-CFB:} integrity aware real-time based counter and
                  cipher feedback modes},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3939--3952},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1312},
  doi          = {10.1002/SEC.1312},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HwangG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/IftikharKA15,
  author       = {Saman Iftikhar and
                  Muhammad Kamran and
                  Zahid Anwar},
  title        = {A survey on reversible watermarking techniques for relational databases},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {15},
  pages        = {2580--2603},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1196},
  doi          = {10.1002/SEC.1196},
  timestamp    = {Fri, 22 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/IftikharKA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/IslamKA15,
  author       = {SK Hafizul Islam and
                  Muhammad Khurram Khan and
                  Ali M. Al{-}Khouri},
  title        = {Anonymous and provably secure certificateless multireceiver encryption
                  without bilinear pairing},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {13},
  pages        = {2214--2231},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1165},
  doi          = {10.1002/SEC.1165},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/IslamKA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/IslamO15,
  author       = {SK Hafizul Islam and
                  Mohammad S. Obaidat},
  title        = {Design of provably secure and efficient certificateless blind signature
                  scheme using bilinear pairing},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4319--4332},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1344},
  doi          = {10.1002/SEC.1344},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/IslamO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Jadidoleslamy15,
  author       = {Hossein Jadidoleslamy},
  title        = {{TMS-HCW:} a trust management system in hierarchical clustered wireless
                  sensor networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4110--4122},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1327},
  doi          = {10.1002/SEC.1327},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Jadidoleslamy15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/JaikumarK15,
  author       = {Padmini Jaikumar and
                  Avinash C. Kak},
  title        = {A graph-theoretic framework for isolating botnets in a network},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2605--2623},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.500},
  doi          = {10.1002/SEC.500},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/JaikumarK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/JanickiMS15,
  author       = {Artur Janicki and
                  Wojciech Mazurczyk and
                  Krzysztof Szczypiorski},
  title        = {On the undetectability of transcoding steganography},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3804--3814},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1301},
  doi          = {10.1002/SEC.1301},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/JanickiMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/JiLH015,
  author       = {Yuede Ji and
                  Qiang Li and
                  Yukun He and
                  Dong Guo},
  title        = {BotCatch: leveraging signature and behavior for bot detection},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {6},
  pages        = {952--969},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1052},
  doi          = {10.1002/SEC.1052},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/JiLH015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/JiangHWWL15,
  author       = {Mingming Jiang and
                  Yupu Hu and
                  Baocang Wang and
                  F. H. Wang and
                  Qiqi Lai},
  title        = {Lattice-based multi-use unidirectional proxy re-encryption},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3796--3803},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1300},
  doi          = {10.1002/SEC.1300},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/JiangHWWL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/JiangLLLS15,
  author       = {Rong Jiang and
                  Rongxing Lu and
                  Jun Luo and
                  Chengzhe Lai and
                  Xuemin Sherman Shen},
  title        = {Efficient self-healing group key management with dynamic revocation
                  and collusion resistance for {SCADA} in smart grid},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1026--1039},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1057},
  doi          = {10.1002/SEC.1057},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/JiangLLLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/JiangTT15,
  author       = {Lei Jiang and
                  Jianlong Tan and
                  Qiu Tang},
  title        = {An efficient sparse matrix format for accelerating regular expression
                  matching on field-programmable gate arrays},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {1},
  pages        = {13--24},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.780},
  doi          = {10.1002/SEC.780},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/JiangTT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/JiangYZ15,
  author       = {Ting Jiang and
                  Ming Yang and
                  Yi Zhang},
  title        = {Research and implementation of {M2M} smart home and security system},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2704--2711},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.569},
  doi          = {10.1002/SEC.569},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/JiangYZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/JilnaP15,
  author       = {Payingat Jilna and
                  Deepthi P. Pattathil},
  title        = {A key management technique based on elliptic curves for static wireless
                  sensor networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3726--3738},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1295},
  doi          = {10.1002/SEC.1295},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/JilnaP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KaljahiPG15,
  author       = {Maryam Asadzadeh Kaljahi and
                  Ali Payandeh and
                  Mohammad Bagher Ghaznavi Ghoushchi},
  title        = {{TSSL:} improving {SSL/TLS} protocol by trust model},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {9},
  pages        = {1659--1671},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1113},
  doi          = {10.1002/SEC.1113},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KaljahiPG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KampanakisY15,
  author       = {Panos Kampanakis and
                  Attila Altay Yavuz},
  title        = {BAFi: a practical cryptographic secure audit logging scheme for digital
                  forensics},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {3180--3190},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1242},
  doi          = {10.1002/SEC.1242},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KampanakisY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KansoGN15,
  author       = {Ali Kanso and
                  Mohammad Ghebleh and
                  Hassan Noura},
  title        = {A variant of Baptista's encryption scheme},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3701--3712},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1293},
  doi          = {10.1002/SEC.1293},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KansoGN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KavehM15,
  author       = {Hadi Kaveh and
                  Mohammad Shahram Moin},
  title        = {A high-capacity and low-distortion 3D polygonal mesh steganography
                  using surfacelet transform},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {2},
  pages        = {159--167},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.968},
  doi          = {10.1002/SEC.968},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KavehM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KenazaHN15,
  author       = {Tayeb Kenaza and
                  Othmane Nait Hamoud and
                  Nadia Nouali{-}Taboudjemat},
  title        = {Efficient centralized approach to prevent from replication attack
                  in wireless sensor networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {2},
  pages        = {220--231},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.975},
  doi          = {10.1002/SEC.975},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KenazaHN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KhanA15,
  author       = {Mubashar Khan and
                  Naveed Ahmed Azam},
  title        = {Right translated {AES} gray S-boxes},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {9},
  pages        = {1627--1635},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1110},
  doi          = {10.1002/SEC.1110},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KhanA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KimJ15,
  author       = {Kee Sung Kim and
                  Ik Rae Jeong},
  title        = {A new certificateless signature scheme under enhanced security models},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {5},
  pages        = {801--810},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1036},
  doi          = {10.1002/SEC.1036},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KimJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KimJ15a,
  author       = {Kee Sung Kim and
                  Ik Rae Jeong},
  title        = {Efficient verifiable data streaming},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4013--4018},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1317},
  doi          = {10.1002/SEC.1317},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KimJ15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KirazGK15,
  author       = {Mehmet Sabir Kiraz and
                  Ziya Alper Gen{\c{c}} and
                  S{\"{u}}leyman Kardas},
  title        = {Security and efficiency analysis of the Hamming distance computation
                  protocol based on oblivious transfer},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4123--4135},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1329},
  doi          = {10.1002/SEC.1329},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KirazGK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KuangLLL15,
  author       = {Xiaohui Kuang and
                  Li Liu and
                  Qiang Liu and
                  Xiang Li},
  title        = {A clustering approach based on convergence degree chain for wireless
                  sensor networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {10},
  pages        = {1878--1889},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1042},
  doi          = {10.1002/SEC.1042},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/KuangLLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KumarK15,
  author       = {R. Kumar and
                  G. Kousalya},
  title        = {Transactions based secure routing in wireless networks: a cognitive
                  science approach},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1050--1062},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1060},
  doi          = {10.1002/SEC.1060},
  timestamp    = {Sat, 05 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/KumarK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KundiAK15,
  author       = {Dur{-}e{-}Shahwar Kundi and
                  Arshad Aziz and
                  Majida Kazmi},
  title        = {An efficient single unit T-box/T\({}^{\mbox{-1}}\)-box implementation
                  for 128-bit {AES} on {FPGA}},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {9},
  pages        = {1725--1731},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1138},
  doi          = {10.1002/SEC.1138},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KundiAK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KurekLN15,
  author       = {Tytus Kurek and
                  Artur Lason and
                  Marcin Niemiec},
  title        = {First step towards preserving the privacy of cloud-based {IDS} security
                  policies},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3481--3491},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1272},
  doi          = {10.1002/SEC.1272},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KurekLN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LaiHCWW15,
  author       = {Qiqi Lai and
                  Yupu Hu and
                  Yuan Chen and
                  Baocang Wang and
                  Fenghe Wang},
  title        = {New method of key-dependent message security for asymmetric encryption},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {13},
  pages        = {2157--2170},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1160},
  doi          = {10.1002/SEC.1160},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LaiHCWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LaiW15,
  author       = {Yeu{-}Pong Lai and
                  Wei{-}Feng Wu},
  title        = {The defense in-depth approach to the protection for browsing users
                  against drive-by cache attacks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1422--1430},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1091},
  doi          = {10.1002/SEC.1091},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LaiW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LeeKH15,
  author       = {Kwangsu Lee and
                  Intae Kim and
                  Seong Oun Hwang},
  title        = {Privacy preserving revocable predicate encryption revisited},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {3},
  pages        = {471--485},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.994},
  doi          = {10.1002/SEC.994},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LeeKH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiAWL15,
  author       = {Lintao Li and
                  Jianping An and
                  Zhongyong Wang and
                  Xiangming Li},
  title        = {Under-sampling spectrum-sparse signals based on active aliasing for
                  low probability detection},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4087--4097},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1325},
  doi          = {10.1002/SEC.1325},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiAWL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiAWS15,
  author       = {Depeng Li and
                  Zeyar Aung and
                  John R. Williams and
                  Abel Sanchez},
  title        = {Efficient and fault-diagnosable authentication architecture for {AMI}
                  in smart grid},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {4},
  pages        = {598--616},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1006},
  doi          = {10.1002/SEC.1006},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiAWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiLW15,
  author       = {Chun{-}Ta Li and
                  Cheng{-}Chi Lee and
                  Chi{-}Yao Weng},
  title        = {A dynamic identity-based user authentication scheme for remote login
                  systems},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3372--3382},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1264},
  doi          = {10.1002/SEC.1264},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiMG15,
  author       = {Mingchu Li and
                  Shu Ma and
                  Cheng Guo},
  title        = {A novel weighted threshold secret image sharing scheme\({}^{\mbox{{\textdagger}}}\)},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {3083--3093},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1233},
  doi          = {10.1002/SEC.1233},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiMG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiMLXL15,
  author       = {Qi Li and
                  Jianfeng Ma and
                  Rui Li and
                  Jinbo Xiong and
                  Ximeng Liu},
  title        = {Large universe decentralized key-policy attribute-based encryption},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {3},
  pages        = {501--509},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.997},
  doi          = {10.1002/SEC.997},
  timestamp    = {Tue, 12 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiMLXL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiMLXL15a,
  author       = {Qi Li and
                  Jianfeng Ma and
                  Rui Li and
                  Jinbo Xiong and
                  Ximeng Liu},
  title        = {Provably secure unbounded multi-authority ciphertext-policy attribute-based
                  encryption},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4098--4109},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1326},
  doi          = {10.1002/SEC.1326},
  timestamp    = {Tue, 12 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiMLXL15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiMSGV15,
  author       = {Nan Li and
                  Yi Mu and
                  Willy Susilo and
                  Fuchun Guo and
                  Vijay Varadharajan},
  title        = {Vulnerabilities of an ECC-based {RFID} authentication scheme},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {3262--3270},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1250},
  doi          = {10.1002/SEC.1250},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiMSGV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiQYWZ15,
  author       = {Xiangxue Li and
                  Haifeng Qian and
                  Yu Yu and
                  Jian Weng and
                  Yuan Zhou},
  title        = {Signcryption KEM/tag-KEM, revisited},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {3067--3082},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1232},
  doi          = {10.1002/SEC.1232},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/LiQYWZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiSLL15,
  author       = {Jian Li and
                  DanJie Song and
                  Ruifan Li and
                  Xiaofeng Lu},
  title        = {A quantum secure direct communication protocol based on four-qubit
                  cluster state},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {1},
  pages        = {36--42},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.711},
  doi          = {10.1002/SEC.711},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiSLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiWSL15,
  author       = {Gaoxiang Li and
                  Di Wu and
                  Junfeng Shen and
                  Tingting Li},
  title        = {Deciphering privacy leakage in microblogging social networks: a measurement
                  study},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {3191--3204},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1244},
  doi          = {10.1002/SEC.1244},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiWSL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiZ15,
  author       = {Luyang Li and
                  Wei{-}Guo Zhang},
  title        = {Construction of resilient Boolean functions with high nonlinearity
                  and good algebraic degree},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2909--2916},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1218},
  doi          = {10.1002/SEC.1218},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiZZ15,
  author       = {Jiguo Li and
                  Jingjing Zhao and
                  Yichen Zhang},
  title        = {Certificateless online/offline signcryption scheme},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {11},
  pages        = {1979--1990},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1146},
  doi          = {10.1002/SEC.1146},
  timestamp    = {Tue, 31 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiZZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Liang15,
  author       = {Jing Liang},
  title        = {Geolocation-aware security in a netcentric small unmanned-aerial-system
                  for {RF} emitters},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2661--2670},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.532},
  doi          = {10.1002/SEC.532},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Liang15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiangRLZPZ15,
  author       = {Qilian Liang and
                  Jian Ren and
                  Jing Liang and
                  Baoju Zhang and
                  Yiming Pi and
                  Chenglin Zhao},
  title        = {Security in big data},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {14},
  pages        = {2383--2385},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1332},
  doi          = {10.1002/SEC.1332},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiangRLZPZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiaoLKL15,
  author       = {Qin Liao and
                  Hong Li and
                  Songlin Kang and
                  Chuchu Liu},
  title        = {Application layer DDoS attack detection using cluster with label based
                  on sparse vector decomposition and rhythm matching},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {3111--3120},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1236},
  doi          = {10.1002/SEC.1236},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiaoLKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LinBW15,
  author       = {Pingping Lin and
                  Jun Bi and
                  Yangyang Wang},
  title        = {WEBridge: west-east bridge for distributed heterogeneous {SDN} NOSes
                  peering},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {10},
  pages        = {1926--1942},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1030},
  doi          = {10.1002/SEC.1030},
  timestamp    = {Sat, 05 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/LinBW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LinLLHL15,
  author       = {Ying{-}Dar Lin and
                  Yuan{-}Cheng Lai and
                  Chun{-}Nan Lu and
                  Peng{-}Kai Hsu and
                  Chia{-}Yin Lee},
  title        = {Three-phase behavior-based detection and classification of known and
                  unknown malware},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2004--2015},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1148},
  doi          = {10.1002/SEC.1148},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LinLLHL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LinTL15,
  author       = {Hsiao{-}Ching Lin and
                  Chinyang Henry Tseng and
                  Hui{-}Tang Lin},
  title        = {MoTIVE: mobile two-hop integrity validation for emergency vehicle
                  routing},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {9},
  pages        = {1717--1724},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1137},
  doi          = {10.1002/SEC.1137},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LinTL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Liu15,
  author       = {Xian Liu},
  title        = {Secrecy capacity of wireless channels subject to log-normal fading},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {1},
  pages        = {25--35},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.752},
  doi          = {10.1002/SEC.752},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Liu15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuDLH15,
  author       = {Yaping Liu and
                  Wenping Deng and
                  Zhihong Liu and
                  Feng Huang},
  title        = {3S: three-signature path authentication for {BGP} security},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {3002--3014},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1227},
  doi          = {10.1002/SEC.1227},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiuDLH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuLCC15,
  author       = {Chia{-}Hui Liu and
                  Fong{-}Qi Lin and
                  Chin{-}Sheng Chen and
                  Tzer{-}Shyong Chen},
  title        = {Design of secure access control scheme for personal health record-based
                  cloud healthcare service},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1332--1346},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1087},
  doi          = {10.1002/SEC.1087},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiuLCC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuLD15,
  author       = {Weiwei Liu and
                  Guangjie Liu and
                  Yuewei Dai},
  title        = {Damage-resistance matrix embedding framework: the contradiction between
                  robustness and embedding efficiency},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {9},
  pages        = {1636--1647},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1111},
  doi          = {10.1002/SEC.1111},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiuLD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuLWGL15,
  author       = {Zhiqiang Liu and
                  Ya Liu and
                  Qingju Wang and
                  Dawu Gu and
                  Wei Li},
  title        = {Meet-in-the-middle fault analysis on word-oriented substitution-permutation
                  network block ciphers},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {4},
  pages        = {672--681},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1015},
  doi          = {10.1002/SEC.1015},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiuLWGL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuLYL15,
  author       = {Chuan{-}Gang Liu and
                  I{-}Hsien Liu and
                  Wun{-}Sheng Yao and
                  Jung{-}Shian Li},
  title        = {\emph{K}-anonymity against neighborhood attacks in weighted social
                  networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3864--3882},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1306},
  doi          = {10.1002/SEC.1306},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiuLYL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuRWT15,
  author       = {Fiona Jiazi Liu and
                  Ahmed Refaey and
                  Xianbin Wang and
                  Helen Tang},
  title        = {Reliability enhancement for CIR-based physical layer authentication},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {4},
  pages        = {661--671},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1014},
  doi          = {10.1002/SEC.1014},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiuRWT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuTXH15,
  author       = {Niu Liu and
                  Shaohua Tang and
                  Lingling Xu and
                  Daojing He},
  title        = {Analyses of several recently proposed group key management schemes},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {2},
  pages        = {136--148},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.966},
  doi          = {10.1002/SEC.966},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiuTXH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuWPS15,
  author       = {Che{-}Hung Liu and
                  Jen{-}Sheng Wang and
                  Chih{-}Chiang Peng and
                  Joseph Z. Shyu},
  title        = {Evaluating and selecting the biometrics in network security},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {5},
  pages        = {727--739},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1020},
  doi          = {10.1002/SEC.1020},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiuWPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuZLZ15,
  author       = {Gang Liu and
                  Jing Zhang and
                  Jinhui Liu and
                  Yuan Zhang},
  title        = {Improved Biba model based on trusted computing},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2793--2797},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1201},
  doi          = {10.1002/SEC.1201},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiuZLZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LuLPY15,
  author       = {Yanrong Lu and
                  Lixiang Li and
                  Haipeng Peng and
                  Yixian Yang},
  title        = {A biometrics and smart cards-based authentication scheme for multi-server
                  environments},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {3219--3228},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1246},
  doi          = {10.1002/SEC.1246},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LuLPY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LuoXLWL15,
  author       = {Yang Luo and
                  Chunhe Xia and
                  Liangshuang Lv and
                  Zhao Wei and
                  Yazhuo Li},
  title        = {Modeling, conflict detection, and verification of a new virtualization
                  role-based access control framework},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {10},
  pages        = {1904--1925},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1025},
  doi          = {10.1002/SEC.1025},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LuoXLWL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MaLWL15,
  author       = {Xiaopu Ma and
                  Ruixuan Li and
                  Hongwei Wang and
                  Huaqing Li},
  title        = {Role mining based on permission cardinality constraint and user cardinality
                  constraint},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {13},
  pages        = {2317--2328},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1177},
  doi          = {10.1002/SEC.1177},
  timestamp    = {Wed, 28 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MaLWL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MaityGA15,
  author       = {Soumya Maity and
                  Soumya Kanti Ghosh and
                  Ehab Al{-}Shaer},
  title        = {PoliCon: a policy conciliation framework for heterogeneous mobile
                  ad hoc networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {3},
  pages        = {418--430},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.990},
  doi          = {10.1002/SEC.990},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MaityGA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MalikSK15,
  author       = {Arif Jamal Malik and
                  Waseem Shahzad and
                  Farrukh Aslam Khan},
  title        = {Network intrusion detection using hybrid binary {PSO} and random forests
                  algorithm},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2646--2660},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.508},
  doi          = {10.1002/SEC.508},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MalikSK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ManifavasFPP15,
  author       = {Charalampos Manifavas and
                  Konstantinos Fysarakis and
                  Alexandros Papanikolaou and
                  Ioannis Papaefstathiou},
  title        = {Embedded Systems Security: {A} Survey of {EU} Research Efforts},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {11},
  pages        = {2016--2036},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1151},
  doi          = {10.1002/SEC.1151},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/ManifavasFPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MaoLCWM15,
  author       = {Xianping Mao and
                  Junzuo Lai and
                  Kefei Chen and
                  Jian Weng and
                  Qixiang Mei},
  title        = {Efficient revocable identity-based encryption from multilinear maps},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3511--3522},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1274},
  doi          = {10.1002/SEC.1274},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/MaoLCWM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MasdariJB15,
  author       = {Mohammad Masdari and
                  Sam Jabbehdari and
                  Jamshid Bagherzadeh},
  title        = {Secure publish/subscribe-based certificate status validations in mobile
                  ad hoc networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1063--1076},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1062},
  doi          = {10.1002/SEC.1062},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MasdariJB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MasriS15,
  author       = {Wes Masri and
                  Sam Sleiman},
  title        = {\emph{SQLPIL}: {SQL} injection prevention by input labeling},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {15},
  pages        = {2545--2560},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1199},
  doi          = {10.1002/SEC.1199},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MasriS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Mayrhofer15,
  author       = {Ren{\'{e}} Mayrhofer},
  title        = {An architecture for secure mobile devices},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {10},
  pages        = {1958--1970},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1028},
  doi          = {10.1002/SEC.1028},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Mayrhofer15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MengLK15,
  author       = {Weizhi Meng and
                  Wenjuan Li and
                  Lam{-}for Kwok},
  title        = {Design of intelligent KNN-based alarm filter using knowledge-based
                  alert verification in intrusion detection},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3883--3895},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1307},
  doi          = {10.1002/SEC.1307},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/MengLK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MingW15,
  author       = {Yang Ming and
                  Yumin Wang},
  title        = {Proxy signcryption scheme in the standard model},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1431--1446},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1092},
  doi          = {10.1002/SEC.1092},
  timestamp    = {Tue, 17 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MingW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MishraT15,
  author       = {Alekha Kumar Mishra and
                  Ashok Kumar Turuk},
  title        = {Residual energy-based replica detection scheme for mobile wireless
                  sensor networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {4},
  pages        = {637--648},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1012},
  doi          = {10.1002/SEC.1012},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MishraT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MoallaR15,
  author       = {Samir Moalla and
                  Maher Rahmouni},
  title        = {Trust path: a distributed model of search paths of trust in a peer-to-peer
                  system},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {3},
  pages        = {360--367},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.984},
  doi          = {10.1002/SEC.984},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MoallaR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MohammadiP15,
  author       = {Mahdiyeh Ali Mohammadi and
                  Ali A. Pouyan},
  title        = {Defense mechanisms against Sybil attack in vehicular ad hoc network},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {6},
  pages        = {917--936},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1049},
  doi          = {10.1002/SEC.1049},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MohammadiP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MohammadpourfardDGS15,
  author       = {Mostafa Mohammadpourfard and
                  Mohammad{-}Ali Doostari and
                  Mohammad Bagher Ghaznavi Ghoushchi and
                  Nafiseh Shakiba},
  title        = {A new secure Internet voting protocol using Java Card 3 technology
                  and Java information flow concept},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {2},
  pages        = {261--283},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.978},
  doi          = {10.1002/SEC.978},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MohammadpourfardDGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MoosaviradKM15,
  author       = {S. Mobarakeh Moosavirad and
                  Peyman Kabiri and
                  Hamidreza Mahini},
  title        = {Rashnu: a Wi-Fi intrusion response scheme},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2070--2078},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1153},
  doi          = {10.1002/SEC.1153},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MoosaviradKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MoradiK15,
  author       = {Mohammad Moradi and
                  Mohammad Reza Keyvanpour},
  title        = {{CAPTCHA} and its Alternatives: {A} Review},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2135--2156},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1157},
  doi          = {10.1002/SEC.1157},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/MoradiK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MoumenaG15,
  author       = {Ahmed Moumena and
                  Abdelrezzak Guessoum},
  title        = {Fast anomaly detection using Boxplot rule for multivariate data in
                  cooperative wideband cognitive radio in the presence of jammer},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {2},
  pages        = {212--219},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.974},
  doi          = {10.1002/SEC.974},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MoumenaG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Muhaya15,
  author       = {Fahad Bin Muhaya},
  title        = {Cryptanalysis and security enhancement of Zhu's authentication scheme
                  for Telecare medicine information system},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {2},
  pages        = {149--158},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.967},
  doi          = {10.1002/SEC.967},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Muhaya15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/NaH15,
  author       = {Sang{-}Ho Na and
                  Eui{-}Nam Huh},
  title        = {A broker-based cooperative security-SLA evaluation methodology for
                  personal cloud computing},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1318--1331},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1086},
  doi          = {10.1002/SEC.1086},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/NaH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/NacharIBA15,
  author       = {Rabih Al Nachar and
                  Elie Inaty and
                  Patrick J. Bonnin and
                  Yasser Alayli},
  title        = {Breaking down Captcha using edge corners and fuzzy logic segmentation/recognition
                  technique},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3995--4012},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1316},
  doi          = {10.1002/SEC.1316},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/NacharIBA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/NanavatiJ15,
  author       = {Nirali R. Nanavati and
                  Devesh C. Jinwala},
  title        = {A novel privacy-preserving scheme for collaborative frequent itemset
                  mining across vertically partitioned data},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4407--4420},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1377},
  doi          = {10.1002/SEC.1377},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/NanavatiJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/NaroueiAGTS15,
  author       = {Masoud Narouei and
                  Mansour Ahmadi and
                  Giorgio Giacinto and
                  Hassan Takabi and
                  Ashkan Sami},
  title        = {DLLMiner: structural mining for malware detection},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3311--3322},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1255},
  doi          = {10.1002/SEC.1255},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/NaroueiAGTS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/NaumanKOM15,
  author       = {Mohammad Nauman and
                  Sohail Khan and
                  Abu Talib Othman and
                  Shahrulniza Musa},
  title        = {Realization of a user-centric, privacy preserving permission framework
                  for Android},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {3},
  pages        = {368--382},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.986},
  doi          = {10.1002/SEC.986},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/NaumanKOM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/NazariEM15,
  author       = {Sara Nazari and
                  Amir{-}Masoud Eftekhari{-}Moghadam and
                  Mohammad Shahram Moin},
  title        = {A novel image steganography scheme based on morphological associative
                  memory and permutation schema},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {2},
  pages        = {110--121},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.962},
  doi          = {10.1002/SEC.962},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/NazariEM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/NiaAR15,
  author       = {Mehran Alidoost Nia and
                  Reza Ebrahimi Atani and
                  Antonio Ruiz{-}Mart{\'{\i}}nez},
  title        = {Privacy enhancement in anonymous network channels using multimodality
                  injection},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2917--2932},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1219},
  doi          = {10.1002/SEC.1219},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/NiaAR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/NobarN15,
  author       = {Sina Khoshabi Nobar and
                  Javad Musevi Niya},
  title        = {Robust mitigation of selfish misbehavior in wireless networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {9},
  pages        = {1772--1779},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1141},
  doi          = {10.1002/SEC.1141},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/NobarN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/OdeluDG15,
  author       = {Vanga Odelu and
                  Ashok Kumar Das and
                  Adrijit Goswami},
  title        = {A secure and efficient ECC-based user anonymity preserving single
                  sign-on scheme for distributed computer networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {9},
  pages        = {1732--1751},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1139},
  doi          = {10.1002/SEC.1139},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/OdeluDG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/OdeluDG15a,
  author       = {Vanga Odelu and
                  Ashok Kumar Das and
                  Adrijit Goswami},
  title        = {An efficient biometric-based privacy-preserving three-party authentication
                  with key agreement protocol using smart cards},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4136--4156},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1330},
  doi          = {10.1002/SEC.1330},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/OdeluDG15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/PandaAP15,
  author       = {Mrutyunjaya Panda and
                  Ajith Abraham and
                  Manas Ranjan Patra},
  title        = {Hybrid intelligent systems for detecting network intrusions},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2741--2749},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.592},
  doi          = {10.1002/SEC.592},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/PandaAP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/PandianR15,
  author       = {K. K. Soundra Pandian and
                  Kailash Chandra Ray},
  title        = {Non-singular sequence folding-based pseudorandom key generation algorithm
                  for cryptographic processor},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4019--4027},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1318},
  doi          = {10.1002/SEC.1318},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/PandianR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/PasalicBD15,
  author       = {Enes Pasalic and
                  Samed Bajric and
                  Milan Djordjevic},
  title        = {On cross-correlation properties of S-boxes and their design using
                  semi-bent functions},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {5},
  pages        = {790--800},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1035},
  doi          = {10.1002/SEC.1035},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/PasalicBD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/PaulauskasB15,
  author       = {Nerijus Paulauskas and
                  Azuolas Faustas Bagdonas},
  title        = {Local outlier factor use for the network flow anomaly detection},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4203--4212},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1335},
  doi          = {10.1002/SEC.1335},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/PaulauskasB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Picazo-SanchezO15,
  author       = {Pablo Picazo{-}Sanchez and
                  Lara Ortiz{-}Martin and
                  Pedro Peris{-}Lopez and
                  Nasour Bagheri},
  title        = {Weaknesses of fingerprint-based mutual authentication protocol},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2124--2134},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1161},
  doi          = {10.1002/SEC.1161},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Picazo-SanchezO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/PraveenkumarATR15,
  author       = {Padmapriya Praveenkumar and
                  Rengarajan Amirtharajan and
                  Karuppuswamy Thenmozhi and
                  John Bosco Balaguru Rayappan},
  title        = {Triple chaotic image scrambling on {RGB} - a random image encryption
                  approach},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3335--3345},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1257},
  doi          = {10.1002/SEC.1257},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/PraveenkumarATR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/PsaroudakisKE15,
  author       = {Ioannis Psaroudakis and
                  Vasilios Katos and
                  Pavlos S. Efraimidis},
  title        = {A novel mechanism for anonymizing Global System for Mobile Communications
                  calls using a resource-based Session Initiation Protocol community
                  network},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {3},
  pages        = {486--500},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.995},
  doi          = {10.1002/SEC.995},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/PsaroudakisKE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/QiL15,
  author       = {Ping Qi and
                  Long{-}shu Li},
  title        = {A fault recovery-based scheduling algorithm for cloud service reliability},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {5},
  pages        = {703--714},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1017},
  doi          = {10.1002/SEC.1017},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/QiL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/QinCHHC15,
  author       = {Chuan Qin and
                  Chin{-}Chen Chang and
                  Gwoboa Horng and
                  Ying{-}Hsuan Huang and
                  Yen{-}Chang Chen},
  title        = {Reversible data embedding for vector quantization compressed images
                  using search-order coding and index parity matching},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {6},
  pages        = {899--906},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1046},
  doi          = {10.1002/SEC.1046},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/QinCHHC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/QuZZM15,
  author       = {Buyun Qu and
                  Zhibin Zhang and
                  Xingquan Zhu and
                  Dan Meng},
  title        = {An empirical study of morphing on behavior-based network traffic classification},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {1},
  pages        = {68--79},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.755},
  doi          = {10.1002/SEC.755},
  timestamp    = {Tue, 18 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/QuZZM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/RabiehMAA15,
  author       = {Khaled Rabieh and
                  Mohamed M. E. A. Mahmoud and
                  Marianne Azer and
                  Mahmoud Allam},
  title        = {A secure and privacy-preserving event reporting scheme for vehicular
                  Ad Hoc networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {3271--3281},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1251},
  doi          = {10.1002/SEC.1251},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/RabiehMAA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/RafeH15,
  author       = {Vahid Rafe and
                  Ramin Hosseinpouri},
  title        = {A security framework for developing service-oriented software architectures},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {2957--2972},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1222},
  doi          = {10.1002/SEC.1222},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/RafeH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/RamanauskaiteGC15,
  author       = {Simona Ramanauskaite and
                  Nikolaj Goranin and
                  Antanas Cenys and
                  Jonas Juknius},
  title        = {Modelling influence of Botnet features on effectiveness of DDoS attacks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2090--2101},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1156},
  doi          = {10.1002/SEC.1156},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/RamanauskaiteGC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/RaoD15,
  author       = {Y. Sreenivasa Rao and
                  Ratna Dutta},
  title        = {Fully secure bandwidth-efficient anonymous ciphertext-policy attribute-based
                  encryption},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4157--4176},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1331},
  doi          = {10.1002/SEC.1331},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/RaoD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/RashwanWWH15,
  author       = {Abdelnaser Rashwan and
                  Honggang Wang and
                  Dalei Wu and
                  Xinming Huang},
  title        = {Security-quality aware routing for wireless multimedia sensor networks
                  using secret sharing},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2798--2812},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1203},
  doi          = {10.1002/SEC.1203},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/RashwanWWH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/RavariF15,
  author       = {Ali Noorollahi Ravari and
                  Mehran S. Fallah},
  title        = {A nonmonotonic modal authorization logic for pervasive computing},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1077--1091},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1063},
  doi          = {10.1002/SEC.1063},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/RavariF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/RenugadeviM15,
  author       = {N. Renugadevi and
                  C. Mala},
  title        = {Pruned nodes in ternary key tree during batch rekeying in group key
                  agreement for cognitive radio ad hoc networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4289--4307},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1342},
  doi          = {10.1002/SEC.1342},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/RenugadeviM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Rey15,
  author       = {{\'{A}}ngel Mart{\'{\i}}n del Rey},
  title        = {Mathematical modeling of the propagation of malware: a review},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {15},
  pages        = {2561--2579},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1186},
  doi          = {10.1002/SEC.1186},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Rey15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/RezaeiHS15,
  author       = {Fahimeh Rezaei and
                  Michael Hempel and
                  Hamid Sharif},
  title        = {A novel automated framework for modeling and evaluating covert channel
                  algorithms},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {4},
  pages        = {649--660},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1013},
  doi          = {10.1002/SEC.1013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/RezaeiHS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/RifaiCV15,
  author       = {Mayssaa El Rifai and
                  Kam Wai Clifford Chan and
                  Pramode K. Verma},
  title        = {Multi-stage quantum secure communication using polarization hopping},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4333--4342},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1364},
  doi          = {10.1002/SEC.1364},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/RifaiCV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/RottondiSVK15,
  author       = {Cristina Rottondi and
                  Marco Savi and
                  Giacomo Verticale and
                  Christoph Krau{\ss}},
  title        = {Mitigation of peer-to-peer overlay attacks in the automatic metering
                  infrastructure of smart grids},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {3},
  pages        = {343--359},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.983},
  doi          = {10.1002/SEC.983},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/RottondiSVK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SairamRS15,
  author       = {Ashok Singh Sairam and
                  Sangita Roy and
                  Rishikesh Sahay},
  title        = {Coloring networks for attacker identification and response},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {5},
  pages        = {751--768},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1022},
  doi          = {10.1002/SEC.1022},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SairamRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SallayB15,
  author       = {Hassen Sallay and
                  Sami Bourouis},
  title        = {Intrusion detection alert management for high-speed networks: current
                  researches and applications},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4362--4372},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1366},
  doi          = {10.1002/SEC.1366},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SallayB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SanchezBSG15,
  author       = {Ignacio Sanchez and
                  Gianmarco Baldini and
                  David Shaw and
                  Raimondo Giuliani},
  title        = {Experimental passive eavesdropping of Digital Enhanced Cordless Telecommunication
                  voice communications through low-cost software-defined radios},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {3},
  pages        = {403--417},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.989},
  doi          = {10.1002/SEC.989},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SanchezBSG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SantisMP15,
  author       = {Alfredo De Santis and
                  Giancarlo De Maio and
                  Umberto Ferraro Petrillo},
  title        = {Using {HTML5} to prevent detection of drive-by-download web malware},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1237--1255},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1077},
  doi          = {10.1002/SEC.1077},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SantisMP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Sen15,
  author       = {Sevil Sen},
  title        = {Sequence-based masquerade detection for different user groups},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1265--1278},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1080},
  doi          = {10.1002/SEC.1080},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/Sen15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Seo0CK15,
  author       = {Hwajeong Seo and
                  Zhe Liu and
                  Jongseok Choi and
                  Howon Kim},
  title        = {Karatsuba-Block-Comb technique for elliptic curve cryptography over
                  binary fields},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {3121--3130},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1237},
  doi          = {10.1002/SEC.1237},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/Seo0CK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Seo0CK15a,
  author       = {Hwajeong Seo and
                  Zhe Liu and
                  Jongseok Choi and
                  Howon Kim},
  title        = {Optimized Karatsuba squaring on 8-bit {AVR} processors},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3546--3554},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1279},
  doi          = {10.1002/SEC.1279},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/Seo0CK15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShaoY15,
  author       = {Zhi{-}Yi Shao and
                  Bo Yang},
  title        = {Private set intersection via public key encryption with keywords search},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {3},
  pages        = {396--402},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.988},
  doi          = {10.1002/SEC.988},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ShaoY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShehadehH15,
  author       = {Youssef El Hajj Shehadeh and
                  Dieter Hogrefe},
  title        = {A survey on secret key generation mechanisms on the physical layer
                  in wireless networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {2},
  pages        = {332--341},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.973},
  doi          = {10.1002/SEC.973},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ShehadehH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShenHLY15,
  author       = {Yao Shen and
                  Liusheng Huang and
                  Xiaorong Lu and
                  Wei Yang},
  title        = {A novel comprehensive steganalysis of transmission control protocol/Internet
                  protocol covert channels based on protocol behaviors and support vector
                  machine},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1279--1290},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1081},
  doi          = {10.1002/SEC.1081},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ShenHLY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShiHSS15,
  author       = {Danping Shi and
                  Lei Hu and
                  Ling Song and
                  Siwei Sun},
  title        = {Differential fault attack on Zorro block cipher},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2826--2835},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1207},
  doi          = {10.1002/SEC.1207},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ShiHSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShiZCZ15,
  author       = {Runhua Shi and
                  Hong Zhong and
                  Jie Cui and
                  Shun Zhang},
  title        = {A novel one-to-many and many-to-one asymmetric encryption model and
                  its algorithms},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3906--3913},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1309},
  doi          = {10.1002/SEC.1309},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ShiZCZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShinK15,
  author       = {Young{-}joo Shin and
                  Kwangjo Kim},
  title        = {Differentially private client-side data deduplication protocol for
                  cloud storage services},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2114--2123},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1159},
  doi          = {10.1002/SEC.1159},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ShinK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShinKFC15,
  author       = {Jiyoung Shin and
                  S. Kancharlapalli and
                  Michael Farcasin and
                  Eric Chan{-}Tin},
  title        = {SmartPass: a smarter geolocation-based authentication scheme},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3927--3938},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1311},
  doi          = {10.1002/SEC.1311},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ShinKFC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShinMGR15,
  author       = {Youngsang Shin and
                  Steven A. Myers and
                  Minaxi Gupta and
                  Predrag Radivojac},
  title        = {A link graph-based approach to identify forum spam},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {2},
  pages        = {176--188},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.970},
  doi          = {10.1002/SEC.970},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ShinMGR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShuangZS15,
  author       = {Kai Shuang and
                  Peng Zhang and
                  Sen Su},
  title        = {Comb: a resilient and efficient two-hop lookup service for distributed
                  communication system},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {10},
  pages        = {1890--1903},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1031},
  doi          = {10.1002/SEC.1031},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ShuangZS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SibomanaTT15,
  author       = {Louis Sibomana and
                  Hung Tran and
                  Quang Anh Tran},
  title        = {Impact of secondary user communication on security communication of
                  primary user},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4177--4190},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1333},
  doi          = {10.1002/SEC.1333},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SibomanaTT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Simsek15,
  author       = {Mehmet Simsek},
  title        = {A new metric for flow-level filtering of low-rate DDoS attacks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3815--3825},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1302},
  doi          = {10.1002/SEC.1302},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Simsek15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SinghG15,
  author       = {Reena Singh and
                  Timothy A. Gonsalves},
  title        = {A pragmatic approach towards secure sharing of digital objects},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3914--3926},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1310},
  doi          = {10.1002/SEC.1310},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SinghG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SinghS15,
  author       = {Rajeev Singh and
                  Teek Parval Sharma},
  title        = {On the {IEEE} 802.11i security: a denial-of-service perspective},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1378--1407},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1079},
  doi          = {10.1002/SEC.1079},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SinghS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SipahiDO15,
  author       = {Devrim Sipahi and
                  G{\"{o}}khan Dalkili{\c{c}} and
                  Mehmet Hilal {\"{O}}zcanhan},
  title        = {Detecting spam through their Sender Policy Framework records},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3555--3563},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1280},
  doi          = {10.1002/SEC.1280},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/SipahiDO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SmaouiOZH15,
  author       = {Salima Smaoui and
                  Mohammad S. Obaidat and
                  Faouzi Zarai and
                  Kuei{-}Fang Hsiao},
  title        = {A new secure and efficient scheme for network mobility management},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1360--1377},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1090},
  doi          = {10.1002/SEC.1090},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SmaouiOZH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SommestadF15,
  author       = {Teodor Sommestad and
                  Ulrik Franke},
  title        = {A test of intrusion alert filtering based on network information},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {13},
  pages        = {2291--2301},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1173},
  doi          = {10.1002/SEC.1173},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SommestadF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SongLLL15,
  author       = {Yun Song and
                  Zhihui Li and
                  Yongming Li and
                  Jing Li},
  title        = {A new multi-use multi-secret sharing scheme based on the duals of
                  minimal linear codes},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {2},
  pages        = {202--211},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.972},
  doi          = {10.1002/SEC.972},
  timestamp    = {Thu, 15 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/SongLLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/StuartP15,
  author       = {Celine Mary Stuart and
                  Deepthi P. Pattathil},
  title        = {A novel low-complexity scheme for improving security of NLFG-based
                  symmetric key cryptosystem using secure concatenated {RS-QCLDPC} code},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2888--2900},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1215},
  doi          = {10.1002/SEC.1215},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/StuartP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SuWSR15,
  author       = {Jinshu Su and
                  Xiaofeng Wang and
                  Weisong Shi and
                  Indrakshi Ray},
  title        = {Security, trust, and resilience of distributed networks and systems},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {10},
  pages        = {1829--1830},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1276},
  doi          = {10.1002/SEC.1276},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SuWSR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SuY15,
  author       = {Sheng Su and
                  Haijie Yu},
  title        = {Secure and efficient data collection in wireless image sensor network
                  based on ellipse batch dispersive routing},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {14},
  pages        = {2420--2430},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.792},
  doi          = {10.1002/SEC.792},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SuY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SuZLW15,
  author       = {Xin Su and
                  Dafang Zhang and
                  Wenjia Li and
                  Xiaofei Wang},
  title        = {AndroGenerator: An automated and configurable android app network
                  traffic generation system},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4273--4288},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1341},
  doi          = {10.1002/SEC.1341},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SuZLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SucasasARMRVTG15,
  author       = {Victor Sucasas and
                  Saud Althunibat and
                  Ayman Radwan and
                  Hugo Marques and
                  Jonathan Rodriguez and
                  Seiamak Vahid and
                  Rahim Tafazolli and
                  Fabrizio Granelli},
  title        = {Lightweight security against combined {IE} and {SSDF} attacks in cooperative
                  spectrum sensing for cognitive radio networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3978--3994},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1315},
  doi          = {10.1002/SEC.1315},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SucasasARMRVTG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SunMZZ15,
  author       = {Xuebin Sun and
                  Shuang Men and
                  Chenglin Zhao and
                  Zheng Zhou},
  title        = {A security authentication scheme in machine-to-machine home network
                  service},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2678--2686},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.551},
  doi          = {10.1002/SEC.551},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SunMZZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SunRQ15,
  author       = {Songlin Sun and
                  Bo Rong and
                  Yi Qian},
  title        = {Artificial frequency selective channel for covert cyclic delay diversity
                  orthogonal frequency division multiplexing transmission},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {9},
  pages        = {1707--1716},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1118},
  doi          = {10.1002/SEC.1118},
  timestamp    = {Wed, 30 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SunRQ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SunW15,
  author       = {Yi Sun and
                  Qiaoyan Wen},
  title        = {A general two-party bi-input private function evaluation protocol},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {15},
  pages        = {2536--2544},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1197},
  doi          = {10.1002/SEC.1197},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SunW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SunWZJ15,
  author       = {Haiyan Sun and
                  Qiaoyan Wen and
                  Hua Zhang and
                  Zhengping Jin},
  title        = {A strongly secure identity-based authenticated key agreement protocol
                  without pairings under the {GDH} assumption},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {3167--3179},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1241},
  doi          = {10.1002/SEC.1241},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SunWZJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SzalachowskiK15,
  author       = {Pawel Szalachowski and
                  Tiffany Hyun{-}Jin Kim},
  title        = {Secure broadcast in distributed networks with strong adversaries},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3739--3750},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1296},
  doi          = {10.1002/SEC.1296},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SzalachowskiK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TanHJ15,
  author       = {Hailun Tan and
                  Wen Hu and
                  Sanjay Jha},
  title        = {A remote attestation protocol with Trusted Platform Modules (TPMs)
                  in wireless sensor networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {13},
  pages        = {2171--2188},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1162},
  doi          = {10.1002/SEC.1162},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/TanHJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TaoA15,
  author       = {Li Tao and
                  Hu Aiqun},
  title        = {Efficient trust chain model based on turing machine},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {1},
  pages        = {2--12},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.808},
  doi          = {10.1002/SEC.808},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/TaoA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TaoZCLWH15,
  author       = {Jun Tao and
                  Limin Zhu and
                  Le Chang and
                  Jin Liu and
                  Xiaoxiao Wang and
                  Yaodan Hu},
  title        = {Joint anti-attack scheme for channel assignment in multi-radio multi-channel
                  wireless mesh networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {13},
  pages        = {2302--2316},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1176},
  doi          = {10.1002/SEC.1176},
  timestamp    = {Wed, 14 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/TaoZCLWH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TengW15,
  author       = {Jikai Teng and
                  Chuankun Wu},
  title        = {A collusion attack on asymmetric group key exchange},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {13},
  pages        = {2189--2193},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1163},
  doi          = {10.1002/SEC.1163},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/TengW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ThanikaiselvanA15,
  author       = {V. Thanikaiselvan and
                  Pachiyappan Arulmozhivarman},
  title        = {{RAND} - {STEG:} an integer wavelet transform domain digital image
                  random steganography using knight's tour},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {13},
  pages        = {2374--2382},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1185},
  doi          = {10.1002/SEC.1185},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ThanikaiselvanA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ThayananthanAQ15,
  author       = {Vijey Thayananthan and
                  Ahmed Alzahrani and
                  Muhammad Shuaib Qureshi},
  title        = {Efficient techniques of key management and quantum cryptography in
                  {RFID} networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {4},
  pages        = {589--597},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1005},
  doi          = {10.1002/SEC.1005},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ThayananthanAQ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TianGAYZZ15,
  author       = {Feng Tian and
                  Xiaolin Gui and
                  Jian An and
                  Pan Yang and
                  Xuejun Zhang and
                  Jianqiang Zhao},
  title        = {A DCT-based privacy-preserving approach for efficient data mining},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3641--3652},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1287},
  doi          = {10.1002/SEC.1287},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/TianGAYZZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TianH15,
  author       = {Miaomiao Tian and
                  Liusheng Huang},
  title        = {Certificateless and certificate-based signatures from lattices},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1575--1586},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1105},
  doi          = {10.1002/SEC.1105},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/TianH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TianHWSW15,
  author       = {Xiuxia Tian and
                  Ling Huang and
                  Yong Wang and
                  Chaofeng Sha and
                  Xiaoling Wang},
  title        = {DualAcE: fine-grained dual access control enforcement with multi-privacy
                  guarantee in DaaS},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1494--1508},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1098},
  doi          = {10.1002/SEC.1098},
  timestamp    = {Wed, 20 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/TianHWSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Toorani15,
  author       = {Mohsen Toorani},
  title        = {Cryptanalysis of a new protocol of wide use for email with perfect
                  forward secrecy},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {4},
  pages        = {694--701},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1018},
  doi          = {10.1002/SEC.1018},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Toorani15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Torrano-Gimenez15,
  author       = {Carmen Torrano{-}Gimenez and
                  Hai Thanh Nguyen and
                  Gonzalo {\'{A}}lvarez and
                  Katrin Franke},
  title        = {Combining expert knowledge with automatic feature extraction for reliable
                  web attack detection},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2750--2767},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.603},
  doi          = {10.1002/SEC.603},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Torrano-Gimenez15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TsaiL15,
  author       = {Jia{-}Lun Tsai and
                  Nai{-}Wei Lo},
  title        = {Secure chaotic maps-based authenticated key agreement protocol without
                  smartcard for multi-server environments},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {11},
  pages        = {1971--1978},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1145},
  doi          = {10.1002/SEC.1145},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/TsaiL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TsaiS15,
  author       = {Chien{-}Hua Tsai and
                  Pin{-}Chang Su},
  title        = {Multi-document threshold signcryption scheme},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {13},
  pages        = {2244--2256},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1169},
  doi          = {10.1002/SEC.1169},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/TsaiS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TsaiTH15,
  author       = {Tung{-}Tso Tsai and
                  Yuh{-}Min Tseng and
                  Sen{-}Shan Huang},
  title        = {Efficient revocable certificateless public key encryption with a delegated
                  revocation authority},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3713--3725},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1294},
  doi          = {10.1002/SEC.1294},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/TsaiTH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TsengTH15,
  author       = {Yuh{-}Min Tseng and
                  Tung{-}Tso Tsai and
                  Sen{-}Shan Huang},
  title        = {Enhancement on strongly secure group key agreement},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {2},
  pages        = {126--135},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.964},
  doi          = {10.1002/SEC.964},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/TsengTH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TzangCT15,
  author       = {Yih{-}Jou Tzang and
                  Hong{-}Yi Chang and
                  Chih{-}Hsuan Tzang},
  title        = {Enhancing the performance and security against media-access-control
                  table overflow vulnerability attacks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {9},
  pages        = {1780--1793},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1142},
  doi          = {10.1002/SEC.1142},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/TzangCT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/VasudevanS15,
  author       = {Alampallam Ramaswamy Vasudevan and
                  Subramanian Selvakumar},
  title        = {Intraclass and interclass correlation coefficient-based feature selection
                  in {NIDS} dataset},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3441--3458},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1269},
  doi          = {10.1002/SEC.1269},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/VasudevanS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/VermaH15,
  author       = {Karan Verma and
                  Halabi Hasbullah},
  title        = {Bloom-filter based {IP-CHOCK} detection scheme for denial of service
                  attacks in {VANET}},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {5},
  pages        = {864--878},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1043},
  doi          = {10.1002/SEC.1043},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/VermaH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangC15,
  author       = {Qingbin Wang and
                  Shaozhen Chen},
  title        = {Attribute-based signature for threshold predicates from lattices},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {5},
  pages        = {811--821},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1038},
  doi          = {10.1002/SEC.1038},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangCXL15,
  author       = {Shengbao Wang and
                  Zhenfu Cao and
                  Qi Xie and
                  Wenhao Liu},
  title        = {Practical identity-based encryption in multiple private key generator
                  {(PKG)} environments},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {1},
  pages        = {43--50},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.743},
  doi          = {10.1002/SEC.743},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangCXL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangL15,
  author       = {Yulong Wang and
                  Yi Li},
  title        = {An efficient and tunable matrix-disguising method toward privacy-preserving
                  computation},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {3099--3110},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1235},
  doi          = {10.1002/SEC.1235},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangLMWZ15,
  author       = {Xin Wang and
                  Qilian Liang and
                  Jiasong Mu and
                  Wei Wang and
                  Baoju Zhang},
  title        = {Physical layer security in wireless smart grid},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {14},
  pages        = {2431--2439},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.751},
  doi          = {10.1002/SEC.751},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangLMWZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangLWC15,
  author       = {Xing{-}Tian Wang and
                  Mingchu Li and
                  Szu{-}Ting Wang and
                  Chin{-}Chen Chang},
  title        = {Reversible data hiding exploiting high-correlation regulation for
                  high-quality images},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1408--1421},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1083},
  doi          = {10.1002/SEC.1083},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangLWC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangMZ15,
  author       = {Cong Wang and
                  Maode Ma and
                  Zenghua Zhao},
  title        = {An enhanced authentication protocol for WRANs in {TV} white space},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {13},
  pages        = {2267--2278},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1171},
  doi          = {10.1002/SEC.1171},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangMZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangWLYLY15,
  author       = {Qiuhua Wang and
                  Xiaojun Wang and
                  Qiuyun Lv and
                  Xueyi Ye and
                  Yi Luo and
                  Lin You},
  title        = {Analysis of the information theoretically secret key agreement by
                  public discussion},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {15},
  pages        = {2507--2523},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1192},
  doi          = {10.1002/SEC.1192},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangWLYLY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangWS0X15,
  author       = {Yilei Wang and
                  Duncan S. Wong and
                  Willy Susilo and
                  Xiaofeng Chen and
                  Qiuliang Xu},
  title        = {Achieving fairness by sequential equilibrium in rational two-party
                  computation under incomplete information},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3690--3700},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1292},
  doi          = {10.1002/SEC.1292},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangWS0X15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangWZX15,
  author       = {Yilei Wang and
                  Duncan S. Wong and
                  Chuan Zhao and
                  Qiuliang Xu},
  title        = {Fair two-party computation with rational parties holding private types},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {2},
  pages        = {284--297},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.979},
  doi          = {10.1002/SEC.979},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangWZX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangXZLD15,
  author       = {Jian Wang and
                  Yiwen Xu and
                  Jindong Zhang and
                  Yanheng Liu and
                  Weiwen Deng},
  title        = {{SAV4AV:} securing authentication and verification for ad hoc vehicles},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {4},
  pages        = {626--636},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1011},
  doi          = {10.1002/SEC.1011},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangXZLD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangYL15,
  author       = {Shyh{-}Yih Wang and
                  Wu{-}Chuan Yang and
                  Ying{-}Jen Lin},
  title        = {Balanced double subset difference broadcast encryption scheme},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1447--1460},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1093},
  doi          = {10.1002/SEC.1093},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangYL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangZDL15,
  author       = {Xin Wang and
                  Lijun Zhang and
                  Amit Deokar and
                  Qilian Liang},
  title        = {Enhanced security and reliability with {MIMO} communications for smart
                  grid},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2723--2729},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.585},
  doi          = {10.1002/SEC.585},
  timestamp    = {Thu, 16 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/WangZDL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangZL15,
  author       = {Feng Wang and
                  You{-}sheng Zhou and
                  Dao{-}feng Li},
  title        = {Dynamic threshold changeable multi-policy secret sharing scheme},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3653--3658},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1288},
  doi          = {10.1002/SEC.1288},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangZL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangZN15,
  author       = {Shuzhen Wang and
                  Zonghua Zhang and
                  Farid Na{\"{\i}}t{-}Abdesselam},
  title        = {Towards cross-layer approaches to coping with misbehavior in mobile
                  ad hoc networks: an anatomy of reputation systems},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {2},
  pages        = {232--244},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.976},
  doi          = {10.1002/SEC.976},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangZN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WeiPBHM15,
  author       = {Lili Wei and
                  Dimitrios A. Pados and
                  Stella N. Batalama and
                  Rose Qingyang Hu and
                  Michael J. Medley},
  title        = {Optimal multiuser spread-spectrum data hiding in digital images},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {4},
  pages        = {540--549},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1001},
  doi          = {10.1002/SEC.1001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WeiPBHM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WenWLXZW15,
  author       = {Sheng Wen and
                  Di Wu and
                  Ping Li and
                  Yang Xiang and
                  Wanlei Zhou and
                  Guiyi Wei},
  title        = {Detecting stepping stones by abnormal causality probability},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {10},
  pages        = {1831--1844},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1037},
  doi          = {10.1002/SEC.1037},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WenWLXZW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WojtowiczO15,
  author       = {Wioletta W{\'{o}}jtowicz and
                  Marek R. Ogiela},
  title        = {Biometric watermarks based on face recognition methods for authentication
                  of digital images},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {9},
  pages        = {1672--1687},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1114},
  doi          = {10.1002/SEC.1114},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WojtowiczO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WuCBGC15,
  author       = {Jianliang Wu and
                  Tingting Cui and
                  Tao Ban and
                  Shanqing Guo and
                  Lizhen Cui},
  title        = {PaddyFrog: systematically detecting confused deputy vulnerability
                  in Android applications},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {13},
  pages        = {2338--2349},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1179},
  doi          = {10.1002/SEC.1179},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WuCBGC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WuXKLA15,
  author       = {Fan Wu and
                  Lili Xu and
                  Saru Kumari and
                  Xiong Li and
                  Abdulhameed Alelaiwi},
  title        = {A new authenticated key agreement scheme based on smart cards providing
                  user anonymity with formal proof},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3847--3863},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1305},
  doi          = {10.1002/SEC.1305},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WuXKLA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WuZ15,
  author       = {Songyang Wu and
                  Yong Zhang},
  title        = {Secure cloud storage using anonymous and blackbox traceable data access
                  control},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4308--4318},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1343},
  doi          = {10.1002/SEC.1343},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WuZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WuZRWY15,
  author       = {Yue Wu and
                  Yimeng Zhao and
                  Michel Riguidel and
                  Guanghao Wang and
                  Ping Yi},
  title        = {Security and trust management in opportunistic networks: a survey},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {9},
  pages        = {1812--1827},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1116},
  doi          = {10.1002/SEC.1116},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WuZRWY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WuZSL15,
  author       = {Xueping Wu and
                  Dafang Zhang and
                  Xin Su and
                  Wenwei Li},
  title        = {Detect repackaged Android application based on {HTTP} traffic similarity},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {13},
  pages        = {2257--2266},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1170},
  doi          = {10.1002/SEC.1170},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WuZSL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/XuW15,
  author       = {Lili Xu and
                  Fan Wu},
  title        = {An improved and provable remote user authentication scheme based on
                  elliptic curve cryptosystem with user anonymity},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {2},
  pages        = {245--260},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.977},
  doi          = {10.1002/SEC.977},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/XuW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/XueS15,
  author       = {L. Xue and
                  Guozi Sun},
  title        = {Design and implementation of a malware detection system based on network
                  behavior},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {3},
  pages        = {459--470},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.993},
  doi          = {10.1002/SEC.993},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/XueS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YajamMS15,
  author       = {Habib Allah Yajam and
                  Javad Mohajeri and
                  Mahmoud Salmasizadeh},
  title        = {Identity-based universal re-encryption for mixnets},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {2992--3001},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1226},
  doi          = {10.1002/SEC.1226},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YajamMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YanLFPS15,
  author       = {Guanglu Yan and
                  Senlin Luo and
                  Fan Feng and
                  Limin Pan and
                  Qamas Gul Khan Safi},
  title        = {{MOSKG:} countering kernel rootkits with a secure paging mechanism},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3580--3591},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1282},
  doi          = {10.1002/SEC.1282},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YanLFPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YanTY15,
  author       = {Danfeng Yan and
                  Yuan Tian and
                  Fangchun Yang},
  title        = {Privacy-preserving authorization method for mashups},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4421--4435},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1322},
  doi          = {10.1002/SEC.1322},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YanTY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YanWDYY15,
  author       = {Jianhua Yan and
                  Licheng Wang and
                  Mianxiong Dong and
                  Yixian Yang and
                  Wenbin Yao},
  title        = {Identity-based signcryption from lattices},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3751--3770},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1297},
  doi          = {10.1002/SEC.1297},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YanWDYY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Yang15,
  author       = {Zheng Yang},
  title        = {A new efficient signcryption scheme in the standard model},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {5},
  pages        = {778--789},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1034},
  doi          = {10.1002/SEC.1034},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Yang15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Yang15a,
  author       = {Zheng Yang},
  title        = {An efficient strongly secure authenticated key exchange protocol without
                  random oracles},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1461--1473},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1095},
  doi          = {10.1002/SEC.1095},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Yang15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Yang15b,
  author       = {Zheng Yang},
  title        = {On constructing practical multi-recipient key-encapsulation with short
                  ciphertext and public key},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4191--4202},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1334},
  doi          = {10.1002/SEC.1334},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Yang15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YangHLWJP15,
  author       = {Longqi Yang and
                  Guyu Hu and
                  Dong Li and
                  Yibing Wang and
                  Bo Jia and
                  Zhisong Pan},
  title        = {Anomaly detection based on efficient Euclidean projection},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {3229--3237},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1247},
  doi          = {10.1002/SEC.1247},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YangHLWJP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YangLZWJ15,
  author       = {Anjia Yang and
                  Kaitai Liang and
                  Yunhui Zhuang and
                  Duncan S. Wong and
                  Xiaohua Jia},
  title        = {A new unpredictability-based radio frequency identification forward
                  privacy model and a provably secure construction},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2836--2849},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1208},
  doi          = {10.1002/SEC.1208},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/YangLZWJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YangMZ15,
  author       = {Xiaopeng Yang and
                  Wenping Ma and
                  Chengli Zhang},
  title        = {Group authenticated key exchange schemes via learning with errors},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {3142--3156},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1239},
  doi          = {10.1002/SEC.1239},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YangMZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YangRM15,
  author       = {Chao Yang and
                  Jian Ren and
                  Jianfeng Ma},
  title        = {Provable ownership of files in deduplication cloud storage},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {14},
  pages        = {2457--2468},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.784},
  doi          = {10.1002/SEC.784},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YangRM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YangY15,
  author       = {Zheng Yang and
                  Wu Yang},
  title        = {A practical strongly secure one-round authenticated key exchange protocol
                  without random oracles},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1118--1131},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1067},
  doi          = {10.1002/SEC.1067},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YangY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YangYZZ15,
  author       = {Zheng Yang and
                  Wu Yang and
                  Lingyun Zhu and
                  Daigu Zhang},
  title        = {Towards modelling perfect forward secrecy in two-message authenticated
                  key exchange under ephemeral-key revelation},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3356--3371},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1263},
  doi          = {10.1002/SEC.1263},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YangYZZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YangZ15,
  author       = {Jun{-}Po Yang and
                  Wei{-}Guo Zhang},
  title        = {Generating highly nonlinear resilient Boolean functions resistance
                  against algebraic and fast algebraic attacks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1256--1264},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1078},
  doi          = {10.1002/SEC.1078},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YangZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YapLTG15,
  author       = {Wun{-}She Yap and
                  Joseph K. Liu and
                  Syh{-}Yuan Tan and
                  Bok{-}Min Goi},
  title        = {On the security of a lightweight authentication and encryption scheme
                  for mobile ad hoc network},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {3094--3098},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1234},
  doi          = {10.1002/SEC.1234},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YapLTG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YasudaS15,
  author       = {Masaya Yasuda and
                  Yuka Sugimura},
  title        = {Biometric key-binding using lattice masking\({}^{\mbox{\emph{{\textdagger}}}}\)},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3405--3414},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1267},
  doi          = {10.1002/SEC.1267},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YasudaS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YasudaSKYK15,
  author       = {Masaya Yasuda and
                  Takeshi Shimoyama and
                  Jun Kogure and
                  Kazuhiro Yokoyama and
                  Takeshi Koshiba},
  title        = {New packing method in somewhat homomorphic encryption and its applications},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {13},
  pages        = {2194--2213},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1164},
  doi          = {10.1002/SEC.1164},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YasudaSKYK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YeQH15,
  author       = {Feng Ye and
                  Yi Qian and
                  Rose Qingyang Hu},
  title        = {HIBaSS: hierarchical identity-based signature scheme for {AMI} downlink
                  transmission},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2901--2908},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1217},
  doi          = {10.1002/SEC.1217},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YeQH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YinS15,
  author       = {Xin Yin and
                  Yaqiu Sun},
  title        = {Secure and efficient integration of big data for multi-cells based
                  on micro images},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {14},
  pages        = {2411--2415},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.778},
  doi          = {10.1002/SEC.778},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YinS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YuGGBG15,
  author       = {Wei Yu and
                  David W. Griffith and
                  Linqiang Ge and
                  Sulabh Bhattarai and
                  Nada Golmie},
  title        = {An integrated detection system against false data injection attacks
                  in the Smart Grid},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {2},
  pages        = {91--109},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.957},
  doi          = {10.1002/SEC.957},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YuGGBG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YuLZ15,
  author       = {Qihong Yu and
                  Jiguo Li and
                  Yichen Zhang},
  title        = {Leakage-resilient certificate-based encryption},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3346--3355},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1258},
  doi          = {10.1002/SEC.1258},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YuLZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YuanL15,
  author       = {Shitong Yuan and
                  Jing Liang},
  title        = {Energy efficient comparator for successive approximation register
                  ADCs with application to encryption schemes in wireless communication},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {14},
  pages        = {2440--2446},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.797},
  doi          = {10.1002/SEC.797},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YuanL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZakeriDA15,
  author       = {Mohaddeseh Zakeri and
                  Fatemeh Faraji Daneshgar and
                  Maghsoud Abbaspour},
  title        = {A static heuristic approach to detecting malware targets},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {3015--3027},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1228},
  doi          = {10.1002/SEC.1228},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZakeriDA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZengXC15,
  author       = {Lei Zeng and
                  Yang Xiao and
                  Hui Chen},
  title        = {Auditing overhead, auditing adaptation, and benchmark evaluation in
                  Linux},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3523--3534},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1277},
  doi          = {10.1002/SEC.1277},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/ZengXC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangFZLL15,
  author       = {Gefei Zhang and
                  Dan Fan and
                  Yuqing Zhang and
                  Xiaowei Li and
                  Xuefeng Liu},
  title        = {A privacy preserving authentication scheme for roaming services in
                  global mobility networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2850--2859},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1209},
  doi          = {10.1002/SEC.1209},
  timestamp    = {Fri, 03 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangFZLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangGF15,
  author       = {Kai Zhang and
                  Jie Guan and
                  Xuliang Fei},
  title        = {Improved conditional differential cryptanalysis},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {9},
  pages        = {1801--1811},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1144},
  doi          = {10.1002/SEC.1144},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangGF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangHML15,
  author       = {Zhenzhen Zhang and
                  Jianjun Hou and
                  Qinglong Ma and
                  Zhaohong Li},
  title        = {Efficient video frame insertion and deletion detection based on inconsistency
                  of correlations between local binary pattern coded frames},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {2},
  pages        = {311--320},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.981},
  doi          = {10.1002/SEC.981},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangHML15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangL0M15,
  author       = {Baoju Zhang and
                  Qing Lei and
                  Wei Wang and
                  Jiasong Mu},
  title        = {Distributed video coding of secure compressed sensing},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {14},
  pages        = {2416--2419},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.828},
  doi          = {10.1002/SEC.828},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangL0M15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangMY15,
  author       = {Junwei Zhang and
                  Jianfeng Ma and
                  Chao Yang},
  title        = {Protocol Derivation System for the Needham-Schroeder family},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2687--2703},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.565},
  doi          = {10.1002/SEC.565},
  timestamp    = {Wed, 03 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangMY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangT15,
  author       = {Jianhong Zhang and
                  Wenjing Tang},
  title        = {On the security of Kim \emph{et al}. two ID-based broadcast signcryption
                  schemes},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1509--1514},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1099},
  doi          = {10.1002/SEC.1099},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangWK15,
  author       = {Wenfang Zhang and
                  Xiaomin Wang and
                  Muhammad Khurram Khan},
  title        = {A virtual bridge certificate authority-based cross-domain authentication
                  mechanism for distributed collaborative manufacturing systems},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {6},
  pages        = {937--951},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1051},
  doi          = {10.1002/SEC.1051},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangWK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangWWMZ15,
  author       = {Zhenbin Zhang and
                  Liji Wu and
                  An Wang and
                  Zhaoli Mu and
                  Xiangmin Zhang},
  title        = {A novel bit scalable leakage model based on genetic algorithm},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3896--3905},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1308},
  doi          = {10.1002/SEC.1308},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangWWMZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangXTF15,
  author       = {Hongli Zhang and
                  Dongliang Xu and
                  Zhihong Tian and
                  Yujian Fan},
  title        = {An efficient parallel algorithm for exact multi-pattern matching},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {9},
  pages        = {1688--1697},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1115},
  doi          = {10.1002/SEC.1115},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangXTF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangYW15,
  author       = {Hao Zhang and
                  Nenghai Yu and
                  Yonggang Wen},
  title        = {Mobile cloud computing based privacy protection in location-based
                  information survey applications},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1006--1025},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1055},
  doi          = {10.1002/SEC.1055},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangYW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangZF15,
  author       = {Hailong Zhang and
                  Yongbin Zhou and
                  Dengguo Feng},
  title        = {Mahalanobis distance similarity measure based distinguisher for template
                  attack},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {5},
  pages        = {769--777},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1033},
  doi          = {10.1002/SEC.1033},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangZF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangZPLW15,
  author       = {Yujin Zhang and
                  Chenglin Zhao and
                  Yiming Pi and
                  Shenghong Li and
                  Shilin Wang},
  title        = {Image-splicing forgery detection based on local binary patterns of
                  {DCT} coefficients},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {14},
  pages        = {2386--2395},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.721},
  doi          = {10.1002/SEC.721},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangZPLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangZZ15,
  author       = {Min Zhang and
                  Jiashu Zhang and
                  Ying Zhang},
  title        = {Remote three-factor authentication scheme based on Fuzzy extractors},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {4},
  pages        = {682--693},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1016},
  doi          = {10.1002/SEC.1016},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangZZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhaoJZDX15,
  author       = {Kao Zhao and
                  Hai Jin and
                  Deqing Zou and
                  Weiqi Dai and
                  Yang Xiang},
  title        = {A privacy-preserving location tracking system for smartphones based
                  on cloud storage},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {3},
  pages        = {446--458},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.992},
  doi          = {10.1002/SEC.992},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhaoJZDX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhaoLYL15,
  author       = {Tong Zhao and
                  Shanbo Lu and
                  Wei Yan and
                  Xiaoming Li},
  title        = {A connectivity resilient dynamic multi-channel assignment method for
                  {VANET}},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {10},
  pages        = {1855--1864},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1032},
  doi          = {10.1002/SEC.1032},
  timestamp    = {Tue, 17 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/ZhaoLYL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhaoSLS15,
  author       = {Guangyao Zhao and
                  Bing Sun and
                  Chao Li and
                  Jinshu Su},
  title        = {Truncated differential cryptanalysis of {PRINCE}},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2875--2887},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1213},
  doi          = {10.1002/SEC.1213},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/ZhaoSLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhaoXZQF15,
  author       = {Shijun Zhao and
                  Li Xi and
                  Qianying Zhang and
                  Yu Qin and
                  Dengguo Feng},
  title        = {Security analysis of {SM2} key exchange protocol in {TPM2.0}},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {3},
  pages        = {383--395},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.987},
  doi          = {10.1002/SEC.987},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhaoXZQF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhengYC15,
  author       = {Hongying Zheng and
                  Quan Yuan and
                  Jianyong Chen},
  title        = {A framework for protecting personal information and privacy},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2867--2874},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1212},
  doi          = {10.1002/SEC.1212},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhengYC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhengZ15,
  author       = {Lei Zheng and
                  Shao{-}Wu Zhang},
  title        = {FFT-based multidimensional linear attack on {PRESENT} using the 2-bit-fixed
                  characteristic},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3535--3545},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1278},
  doi          = {10.1002/SEC.1278},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhengZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhenhuaJB15,
  author       = {Liao Zhenhua and
                  Wang Jinmiao and
                  Lang Bo},
  title        = {A ciphertext-policy hidden vector encryption scheme supporting multiuser
                  keyword search},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {6},
  pages        = {879--887},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1044},
  doi          = {10.1002/SEC.1044},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhenhuaJB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Zhioua15,
  author       = {Sami Zhioua},
  title        = {The web browser factor in traffic analysis attacks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4227--4241},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1338},
  doi          = {10.1002/SEC.1338},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Zhioua15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhongZPW15,
  author       = {Zhen Zhong and
                  Chenglin Zhao and
                  Yiming Pi and
                  Lingming Wang},
  title        = {Security assurance in wireless acoustic sensors via event forecasting
                  and detection},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2671--2677},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.538},
  doi          = {10.1002/SEC.538},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhongZPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Zhu15,
  author       = {Hongfeng Zhu},
  title        = {One-time identity-password authenticated key agreement scheme based
                  on biometrics},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {13},
  pages        = {2350--2360},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1182},
  doi          = {10.1002/SEC.1182},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Zhu15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Zhu15a,
  author       = {Hongfeng Zhu},
  title        = {Cryptanalysis and provable improvement of a chaotic maps-based mobile
                  dynamic {ID} authenticated key agreement scheme},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {2981--2991},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1225},
  doi          = {10.1002/SEC.1225},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Zhu15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhuLZL15,
  author       = {Hui Zhu and
                  Xiaodong Lin and
                  Yun Zhang and
                  Rongxing Lu},
  title        = {Duth: a user-friendly dual-factor authentication for Android smartphone
                  devices},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1213--1222},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1075},
  doi          = {10.1002/SEC.1075},
  timestamp    = {Tue, 21 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/ZhuLZL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhuMZ15,
  author       = {Yuesheng Zhu and
                  Limin Ma and
                  Jinjiang Zhang},
  title        = {An enhanced Kerberos protocol with non-interactive zero-knowledge
                  proof},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {6},
  pages        = {1108--1117},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1066},
  doi          = {10.1002/SEC.1066},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhuMZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhuWLXZC15,
  author       = {Hong Zhu and
                  Zhipeng Wang and
                  Kevin L{\"{u}} and
                  Meiyi Xie and
                  Xiang Zou and
                  Bing Chen},
  title        = {A distributed scheme for row-based computational private information
                  retrieval},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {8},
  pages        = {1537--1546},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1102},
  doi          = {10.1002/SEC.1102},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/ZhuWLXZC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZibidehM15,
  author       = {Walid Y. Zibideh and
                  Mustafa M. Matalgah},
  title        = {Modified data encryption standard encryption algorithm with improved
                  error performance and enhanced security in wireless fading channels},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {4},
  pages        = {565--573},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1003},
  doi          = {10.1002/SEC.1003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZibidehM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZouZL15,
  author       = {Shihong Zou and
                  Jing Zhang and
                  Xiaodong Lin},
  title        = {An effective behavior-based Android malware detection system},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2079--2089},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1155},
  doi          = {10.1002/SEC.1155},
  timestamp    = {Thu, 23 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/ZouZL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZubaSPCZ15,
  author       = {Michael Zuba and
                  Zhijie Shi and
                  Zheng Peng and
                  Jun{-}Hong Cui and
                  Shengli Zhou},
  title        = {Vulnerabilities of underwater acoustic networks to denial-of-service
                  jamming attacks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2635--2645},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.507},
  doi          = {10.1002/SEC.507},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZubaSPCZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZubairKM15,
  author       = {Muhammad Zubair and
                  Xiangwei Kong and
                  Saeed Mahfooz},
  title        = {{DMAM:} distributed mobility and authentication mechanism in next
                  generation networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {5},
  pages        = {845--863},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1041},
  doi          = {10.1002/SEC.1041},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZubairKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics