Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/scn/scn8.bht:"
@article{DBLP:journals/scn/0001SX15, author = {Zhe Liu and Hwajeong Seo and Qiuliang Xu}, title = {Performance evaluation of twisted Edwards-form elliptic curve cryptography for wireless sensor nodes}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3301--3310}, year = {2015}, url = {https://doi.org/10.1002/sec.1254}, doi = {10.1002/SEC.1254}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/0001SX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/0002LM0Z15, author = {Zhuo Li and Qilian Liang and Jiasong Mu and Wei Wang and Baoju Zhang}, title = {The hybrid architecture of wireless and power line communications in HANs for Smart Grid security}, journal = {Secur. Commun. Networks}, volume = {8}, number = {14}, pages = {2404--2410}, year = {2015}, url = {https://doi.org/10.1002/sec.763}, doi = {10.1002/SEC.763}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/0002LM0Z15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/0019L0CC15, author = {Chen Li and Rongxing Lu and Hui Li and Le Chen and Jie Chen}, title = {{PDA:} a privacy-preserving dual-functional aggregation scheme for smart grid communications}, journal = {Secur. Commun. Networks}, volume = {8}, number = {15}, pages = {2494--2506}, year = {2015}, url = {https://doi.org/10.1002/sec.1191}, doi = {10.1002/SEC.1191}, timestamp = {Mon, 18 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/0019L0CC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/0046ZZM15, author = {Wei Wang and Xin Zhou and Baoju Zhang and Jiasong Mu}, title = {Anomaly detection in big data from {UWB} radars}, journal = {Secur. Commun. Networks}, volume = {8}, number = {14}, pages = {2469--2475}, year = {2015}, url = {https://doi.org/10.1002/sec.745}, doi = {10.1002/SEC.745}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/0046ZZM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AamirZ15, author = {Muhammad Aamir and Syed Mustafa Ali Zaidi}, title = {Denial-of-service in content centric (named data) networking: a tutorial and state-of-the-art survey}, journal = {Secur. Commun. Networks}, volume = {8}, number = {11}, pages = {2037--2059}, year = {2015}, url = {https://doi.org/10.1002/sec.1149}, doi = {10.1002/SEC.1149}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AamirZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AbbasML15, author = {Sohail Abbas and Madjid Merabti and David Llewellyn{-}Jones}, title = {On the evaluation of reputation and trust-based schemes in mobile ad hoc networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4041--4052}, year = {2015}, url = {https://doi.org/10.1002/sec.1320}, doi = {10.1002/SEC.1320}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AbbasML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Adibi15, author = {Sasan Adibi}, title = {A multilayer non-repudiation system: a Suite-B approach}, journal = {Secur. Commun. Networks}, volume = {8}, number = {9}, pages = {1698--1706}, year = {2015}, url = {https://doi.org/10.1002/sec.1117}, doi = {10.1002/SEC.1117}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Adibi15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AfrakhtehL15, author = {Masoud Afrakhteh and Jeong{-}A Lee}, title = {Adaptive least significant bit matching revisited with the help of error images}, journal = {Secur. Commun. Networks}, volume = {8}, number = {3}, pages = {510--515}, year = {2015}, url = {https://doi.org/10.1002/sec.998}, doi = {10.1002/SEC.998}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AfrakhtehL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AfrakhtehL15a, author = {Masoud Afrakhteh and Jeong{-}A Lee}, title = {Parallel modular steganography using error images}, journal = {Secur. Commun. Networks}, volume = {8}, number = {8}, pages = {1515--1524}, year = {2015}, url = {https://doi.org/10.1002/sec.1100}, doi = {10.1002/SEC.1100}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AfrakhtehL15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Afsar15, author = {Mehdi Afsar}, title = {A comprehensive fault-tolerant framework for wireless sensor networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {3247--3261}, year = {2015}, url = {https://doi.org/10.1002/sec.1249}, doi = {10.1002/SEC.1249}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Afsar15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AhmedSRR15, author = {Shakil Ahmed and Khairulmizam Samsudin and Abdul Rahman Ramli and Fakhrul Zaman Rokhani}, title = {Advanced Encryption Standard-XTS implementation in field programmable gate array hardware}, journal = {Secur. Commun. Networks}, volume = {8}, number = {3}, pages = {516--522}, year = {2015}, url = {https://doi.org/10.1002/sec.999}, doi = {10.1002/SEC.999}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AhmedSRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AkgunBC15, author = {Mete Akg{\"{u}}n and Ali Osman Bayrak and Mehmet Ufuk {\c{C}}aglayan}, title = {Attacks and improvements to chaotic map-based {RFID} authentication protocol}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4028--4040}, year = {2015}, url = {https://doi.org/10.1002/sec.1319}, doi = {10.1002/SEC.1319}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AkgunBC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AkleylekK15, author = {Sedat Akleylek and Baris B{\"{u}}lent Kirlar}, title = {New methods for public key cryptosystems based on {XTR}}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3682--3689}, year = {2015}, url = {https://doi.org/10.1002/sec.1291}, doi = {10.1002/SEC.1291}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AkleylekK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Al-TaharwaLJWHC15, author = {Ismail Adel Al{-}Taharwa and Hahn{-}Ming Lee and Albert B. Jeng and Kuo{-}Ping Wu and Cheng{-}Seen Ho and Shyi{-}Ming Chen}, title = {{JSOD:} JavaScript obfuscation detector}, journal = {Secur. Commun. Networks}, volume = {8}, number = {6}, pages = {1092--1107}, year = {2015}, url = {https://doi.org/10.1002/sec.1064}, doi = {10.1002/SEC.1064}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/Al-TaharwaLJWHC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Al-ZewairiAA15, author = {Malek Al{-}Zewairi and Ja'far Alqatawna and Jalal Atoum}, title = {Risk adaptive hybrid {RFID} access control system}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3826--3835}, year = {2015}, url = {https://doi.org/10.1002/sec.1303}, doi = {10.1002/SEC.1303}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Al-ZewairiAA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Al-maweriARSA15, author = {Nasr addin Ahmed Salem Al{-}maweri and Wan Azizun Wan Adnan and Abdul Rahman Ramli and Khairulmizam Samsudin and Sharifah Mumtazah Syed Ahmad}, title = {A hybrid digital image watermarking algorithm based on {DCT-DWT} and auto-thresholding}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4373--4395}, year = {2015}, url = {https://doi.org/10.1002/sec.1371}, doi = {10.1002/SEC.1371}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Al-maweriARSA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Aldini15, author = {Alessandro Aldini}, title = {Modeling and verification of trust and reputation systems}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2933--2946}, year = {2015}, url = {https://doi.org/10.1002/sec.1220}, doi = {10.1002/SEC.1220}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Aldini15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AldwairiKA15, author = {Monther Aldwairi and Yaser M. Khamayseh and Mohammad Al{-}Masri}, title = {Application of artificial bee colony for intrusion detection systems}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2730--2740}, year = {2015}, url = {https://doi.org/10.1002/sec.588}, doi = {10.1002/SEC.588}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/AldwairiKA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AlmimiSJ15, author = {Hani Almimi and Azman Samsudin and Shahram Jahani}, title = {Elliptic-curve scalar multiplication algorithm using {ZOT} structure}, journal = {Secur. Commun. Networks}, volume = {8}, number = {6}, pages = {1141--1154}, year = {2015}, url = {https://doi.org/10.1002/sec.1047}, doi = {10.1002/SEC.1047}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AlmimiSJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AlsalehAAA15, author = {Mansour Alsaleh and Abdulrahman Alarifi and Abdullah Alqahtani and AbdulMalik S. Al{-}Salman}, title = {Visualizing web server attacks: patterns in {PHPIDS} logs\({}^{\mbox{\emph{{\textdaggerdbl}}}}\)}, journal = {Secur. Commun. Networks}, volume = {8}, number = {11}, pages = {1991--2003}, year = {2015}, url = {https://doi.org/10.1002/sec.1147}, doi = {10.1002/SEC.1147}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AlsalehAAA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AmamraRT15, author = {Abdelfattah Amamra and Jean{-}Marc Robert and Chamseddine Talhi}, title = {Enhancing malware detection for Android systems using a system call filtering and abstraction process}, journal = {Secur. Commun. Networks}, volume = {8}, number = {7}, pages = {1179--1192}, year = {2015}, url = {https://doi.org/10.1002/sec.1073}, doi = {10.1002/SEC.1073}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AmamraRT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AnwarK15, author = {Zahid Anwar and Waqas Ahmad Khan}, title = {Guess who is listening in to the board meeting: on the use of mobile device applications as roving spy bugs}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2813--2825}, year = {2015}, url = {https://doi.org/10.1002/sec.1205}, doi = {10.1002/SEC.1205}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AnwarK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AsaarSB15, author = {Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh and Colin Boyd}, title = {Identity-based proxy signatures: a generic construction and a concrete scheme from {RSA}}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3602--3614}, year = {2015}, url = {https://doi.org/10.1002/sec.1284}, doi = {10.1002/SEC.1284}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AsaarSB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AsaarSS15, author = {Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh and Willy Susilo}, title = {A provably secure identity-based proxy ring signature based on {RSA}}, journal = {Secur. Commun. Networks}, volume = {8}, number = {7}, pages = {1223--1236}, year = {2015}, url = {https://doi.org/10.1002/sec.1076}, doi = {10.1002/SEC.1076}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AsaarSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AsayeshHJ15, author = {Atefeh Asayesh and Mohammad Ali Hadavi and Rasool Jalili}, title = {(\emph{t}, \emph{k})-Hypergraph anonymization: an approach for secure data publishing}, journal = {Secur. Commun. Networks}, volume = {8}, number = {7}, pages = {1306--1317}, year = {2015}, url = {https://doi.org/10.1002/sec.1084}, doi = {10.1002/SEC.1084}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AsayeshHJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AsgharianAR15, author = {Hassan Asgharian and Ahmad Akbari and Bijan Raahemi}, title = {Feature engineering for detection of Denial of Service attacks in session initiation protocol}, journal = {Secur. Commun. Networks}, volume = {8}, number = {8}, pages = {1587--1601}, year = {2015}, url = {https://doi.org/10.1002/sec.1106}, doi = {10.1002/SEC.1106}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AsgharianAR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AvilaT15, author = {Jayapalan Avila and Karuppusamy Thenmozhi}, title = {Authentication scheme to combat a primary user emulation attack against cognitive radio users}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4242--4253}, year = {2015}, url = {https://doi.org/10.1002/sec.1339}, doi = {10.1002/SEC.1339}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AvilaT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BabyC15, author = {Tinu Baby and Aswani Kumar Cherukuri}, title = {On query execution over encrypted data}, journal = {Secur. Commun. Networks}, volume = {8}, number = {2}, pages = {321--331}, year = {2015}, url = {https://doi.org/10.1002/sec.982}, doi = {10.1002/SEC.982}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/BabyC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BaekBHA15, author = {Joonsang Baek and Young{-}Ji Byon and Eman Hableel and Mahmoud Al{-}Qutayri}, title = {Making air traffic surveillance more reliable: a new authentication framework for automatic dependent surveillance-broadcast {(ADS-B)} based on online/offline identity-based signature}, journal = {Secur. Commun. Networks}, volume = {8}, number = {5}, pages = {740--750}, year = {2015}, url = {https://doi.org/10.1002/sec.1021}, doi = {10.1002/SEC.1021}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/BaekBHA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BanikJ15, author = {Subhadeep Banik and Sonu Jha}, title = {Some security results of the {RC4+} stream cipher}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4061--4072}, year = {2015}, url = {https://doi.org/10.1002/sec.1323}, doi = {10.1002/SEC.1323}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/BanikJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BaraniAJVA15, author = {Milad Jafari Barani and Peyman Ayubi and Fooad Jalili and Milad Yousefi Valandar and Ehsan Azariyun}, title = {Image forgery detection in contourlet transform domain based on new chaotic cellular automata}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4343--4361}, year = {2015}, url = {https://doi.org/10.1002/sec.1365}, doi = {10.1002/SEC.1365}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/BaraniAJVA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BasicevicOP15, author = {Ilija Basicevic and Stanislav Ocovaj and Miroslav Popovic}, title = {Evaluation of entropy-based detection of outbound denial-of-service attacks in edge networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {5}, pages = {837--844}, year = {2015}, url = {https://doi.org/10.1002/sec.1040}, doi = {10.1002/SEC.1040}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/BasicevicOP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BasicevicOP15a, author = {Ilija Basicevic and Stanislav Ocovaj and Miroslav Popovic}, title = {Use of Tsallis entropy in detection of {SYN} flood DoS attacks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3634--3640}, year = {2015}, url = {https://doi.org/10.1002/sec.1286}, doi = {10.1002/SEC.1286}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/BasicevicOP15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BhattacharyaS15, author = {Sangeeta Bhattacharya and Subramanian Selvakumar}, title = {{LAWRA:} a layered wrapper feature selection approach for network attack detection}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3459--3468}, year = {2015}, url = {https://doi.org/10.1002/sec.1270}, doi = {10.1002/SEC.1270}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/BhattacharyaS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BorgesSM15, author = {F{\'{a}}bio Borges and Raqueline A. M. Santos and Franklin L. Marquezino}, title = {Preserving privacy in a smart grid scenario using quantum mechanics}, journal = {Secur. Commun. Networks}, volume = {8}, number = {12}, pages = {2061--2069}, year = {2015}, url = {https://doi.org/10.1002/sec.1152}, doi = {10.1002/SEC.1152}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/BorgesSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Byun15, author = {Jin Wook Byun}, title = {Privacy preserving smartcard-based authentication system with provable security}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {3028--3044}, year = {2015}, url = {https://doi.org/10.1002/sec.1229}, doi = {10.1002/SEC.1229}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Byun15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/CaoC15, author = {Zongjie Cao and Lijia Chen}, title = {Security in application layer of radar sensor networks: detect friends or foe}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2712--2722}, year = {2015}, url = {https://doi.org/10.1002/sec.572}, doi = {10.1002/SEC.572}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/CaoC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/CaoG15, author = {Liling Cao and Wancheng Ge}, title = {Analysis and improvement of a multi-factor biometric authentication scheme}, journal = {Secur. Commun. Networks}, volume = {8}, number = {4}, pages = {617--625}, year = {2015}, url = {https://doi.org/10.1002/sec.1010}, doi = {10.1002/SEC.1010}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/CaoG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/CaoLBQLHM15, author = {Lvchen Cao and Yuling Luo and Jinjie Bi and Senhui Qiu and Zhenkun Lu and Jim Harkin and Liam McDaid}, title = {An authentication strategy based on spatiotemporal chaos for software copyright protection}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4073--4086}, year = {2015}, url = {https://doi.org/10.1002/sec.1324}, doi = {10.1002/SEC.1324}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/CaoLBQLHM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/CaoML15, author = {Jin Cao and Maode Ma and Hui Li}, title = {{GBAAM:} group-based access authentication for {MTC} in {LTE} networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {3282--3299}, year = {2015}, url = {https://doi.org/10.1002/sec.1252}, doi = {10.1002/SEC.1252}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/CaoML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/CazorlaGMM15, author = {Micka{\"{e}}l Cazorla and Sylvain Gourgeon and Kevin Marquet and Marine Minier}, title = {Survey and benchmark of lightweight block ciphers for {MSP430} 16-bit microcontroller}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3564--3579}, year = {2015}, url = {https://doi.org/10.1002/sec.1281}, doi = {10.1002/SEC.1281}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/CazorlaGMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Chang15, author = {Ya{-}Fen Chang}, title = {A flexible hierarchical access control mechanism enforcing extension policies}, journal = {Secur. Commun. Networks}, volume = {8}, number = {2}, pages = {189--201}, year = {2015}, url = {https://doi.org/10.1002/sec.971}, doi = {10.1002/SEC.971}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Chang15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChangL15, author = {Chin{-}Chen Chang and Hai{-}Duong Le}, title = {A provably secure smart card-based authenticated group key exchange protocol}, journal = {Secur. Commun. Networks}, volume = {8}, number = {8}, pages = {1602--1607}, year = {2015}, url = {https://doi.org/10.1002/sec.1107}, doi = {10.1002/SEC.1107}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChangL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChangSC15, author = {Chin{-}Chen Chang and Chin{-}Yu Sun and Ting{-}Fang Cheng}, title = {A dependable storage service system in cloud environment}, journal = {Secur. Commun. Networks}, volume = {8}, number = {4}, pages = {574--588}, year = {2015}, url = {https://doi.org/10.1002/sec.1004}, doi = {10.1002/SEC.1004}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChangSC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChangX15, author = {Jinyong Chang and Rui Xue}, title = {Practical key-dependent message chosen-ciphertext security based on decisional composite residuosity and quadratic residuosity assumptions}, journal = {Secur. Commun. Networks}, volume = {8}, number = {8}, pages = {1525--1536}, year = {2015}, url = {https://doi.org/10.1002/sec.1101}, doi = {10.1002/SEC.1101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChangX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChatterjeeD15, author = {Santanu Chatterjee and Ashok Kumar Das}, title = {An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {9}, pages = {1752--1771}, year = {2015}, url = {https://doi.org/10.1002/sec.1140}, doi = {10.1002/SEC.1140}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChatterjeeD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChaudhryFNKK15, author = {Shehzad Ashraf Chaudhry and Mohammad Sabzinejad Farash and Husnain Naqvi and Saru Kumari and Muhammad Khurram Khan}, title = {An enhanced privacy preserving remote user authentication scheme with provable security}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3782--3795}, year = {2015}, url = {https://doi.org/10.1002/sec.1299}, doi = {10.1002/SEC.1299}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChaudhryFNKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/CheFLW15, author = {Shenyun Che and Renjian Feng and Xuan Liang and Xiao Wang}, title = {A lightweight trust management based on Bayesian and Entropy for wireless sensor networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {2}, pages = {168--175}, year = {2015}, url = {https://doi.org/10.1002/sec.969}, doi = {10.1002/SEC.969}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/CheFLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChenD15, author = {Yuan Chen and Qingkuan Dong}, title = {Achieving {CCA} security from {DCCA} security more efficiently by using the {KEM+DEM} hybrid paradigm}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3323--3334}, year = {2015}, url = {https://doi.org/10.1002/sec.1256}, doi = {10.1002/SEC.1256}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChenD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChenJ15, author = {Shiwei Chen and Chenhui Jin}, title = {A second preimage attack on zipper hash}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2860--2866}, year = {2015}, url = {https://doi.org/10.1002/sec.1210}, doi = {10.1002/SEC.1210}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChenJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChenL15, author = {Chi{-}Tung Chen and Cheng{-}Chi Lee}, title = {A two-factor authentication scheme with anonymity for multi-server environments}, journal = {Secur. Commun. Networks}, volume = {8}, number = {8}, pages = {1608--1625}, year = {2015}, url = {https://doi.org/10.1002/sec.1109}, doi = {10.1002/SEC.1109}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChenL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChenLALC15, author = {Le Chen and Rongxing Lu and Khalid Nawaf Alharbi and Xiaodong Lin and Zhenfu Cao}, title = {ReDD: recommendation-based data dissemination in privacy-preserving mobile social networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {7}, pages = {1291--1305}, year = {2015}, url = {https://doi.org/10.1002/sec.1082}, doi = {10.1002/SEC.1082}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChenLALC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChenLHBZ15, author = {Ting Chen and Xiaodong Lin and Jin Huang and Abel Bacchus and Xiaosong Zhang}, title = {An empirical investigation into path divergences for concolic execution using {CREST}}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3667--3681}, year = {2015}, url = {https://doi.org/10.1002/sec.1290}, doi = {10.1002/SEC.1290}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChenLHBZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChenLW15, author = {Junjie Chen and Qilian Liang and Jie Wang}, title = {Secure transmission for big data based on nested sampling and coprime sampling with spectrum efficiency}, journal = {Secur. Commun. Networks}, volume = {8}, number = {14}, pages = {2447--2456}, year = {2015}, url = {https://doi.org/10.1002/sec.785}, doi = {10.1002/SEC.785}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChenLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChenLWH15, author = {Zhenhua Chen and Shundong Li and Qianhong Wu and Qiong Huang}, title = {A distributed secret share update scheme with public verifiability for ad hoc network}, journal = {Secur. Commun. Networks}, volume = {8}, number = {8}, pages = {1485--1493}, year = {2015}, url = {https://doi.org/10.1002/sec.1097}, doi = {10.1002/SEC.1097}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChenLWH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChenLZYX15, author = {Zhenhua Chen and Shundong Li and Youwen Zhu and Jianhua Yan and Xinli Xu}, title = {A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3592--3601}, year = {2015}, url = {https://doi.org/10.1002/sec.1283}, doi = {10.1002/SEC.1283}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChenLZYX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChenMM15, author = {Jiageng Chen and Mohammad Saiful Islam Mamun and Atsuko Miyaji}, title = {An efficient batch verification system and its effect in a real time {VANET} environment}, journal = {Secur. Commun. Networks}, volume = {8}, number = {2}, pages = {298--310}, year = {2015}, url = {https://doi.org/10.1002/sec.980}, doi = {10.1002/SEC.980}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChenMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChenTMHH15, author = {Yu{-}Chi Chen and Raylin Tso and Masahiro Mambo and Kaibin Huang and Gwoboa Horng}, title = {Certificateless aggregate signature with efficient verification}, journal = {Secur. Commun. Networks}, volume = {8}, number = {13}, pages = {2232--2243}, year = {2015}, url = {https://doi.org/10.1002/sec.1166}, doi = {10.1002/SEC.1166}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChenTMHH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChengJLZ15, author = {Chi Cheng and Tao Jiang and Yining Liu and Mingwu Zhang}, title = {Security analysis of a homomorphic signature scheme for network coding}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4053--4060}, year = {2015}, url = {https://doi.org/10.1002/sec.1321}, doi = {10.1002/SEC.1321}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChengJLZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChengSTX15, author = {Xiang Cheng and Sen Su and Yiping Teng and Ke Xiao}, title = {Enabling secure and efficient kNN query processing over encrypted spatial data in the cloud}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {3205--3218}, year = {2015}, url = {https://doi.org/10.1002/sec.1245}, doi = {10.1002/SEC.1245}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChengSTX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChengYTHZ15, author = {Xueqi Cheng and Jinhong Yuan and Ali Tajer and Aiqun Hu and Wanlei Zhou}, title = {Special issue on recent advances in network and information security - security and communication networks journal}, journal = {Secur. Commun. Networks}, volume = {8}, number = {1}, pages = {1}, year = {2015}, url = {https://doi.org/10.1002/sec.1180}, doi = {10.1002/SEC.1180}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChengYTHZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChengZ15, author = {Rong Cheng and Fangguo Zhang}, title = {Lattice-based obfuscation for re-encryption functions}, journal = {Secur. Commun. Networks}, volume = {8}, number = {9}, pages = {1648--1658}, year = {2015}, url = {https://doi.org/10.1002/sec.1112}, doi = {10.1002/SEC.1112}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/ChengZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChinBHP15, author = {Ji{-}Jian Chin and Rouzbeh Behnia and Swee{-}Huay Heng and Raphael C.{-}W. Phan}, title = {Cryptanalysis of a certificateless identification scheme}, journal = {Secur. Commun. Networks}, volume = {8}, number = {2}, pages = {122--125}, year = {2015}, url = {https://doi.org/10.1002/sec.963}, doi = {10.1002/SEC.963}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChinBHP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChoiSEJ15, author = {Seonho Choi and Kun Sun and Hyeonsang Eom and Edward Jung}, title = {Multi-source broadcast authentication with Combined Key Chains for wireless ad hoc networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {7}, pages = {1169--1178}, year = {2015}, url = {https://doi.org/10.1002/sec.1072}, doi = {10.1002/SEC.1072}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChoiSEJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Chuang15, author = {Yung{-}Ting Chuang}, title = {An adaptable and scalable membership management for the iTrust information search and retrieval system}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3492--3510}, year = {2015}, url = {https://doi.org/10.1002/sec.1273}, doi = {10.1002/SEC.1273}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Chuang15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/CruzSMBL15, author = {Tiago Cruz and Paulo Sim{\~{o}}es and Edmundo Monteiro and Fernando Bastos and Alexandre Laranjeira}, title = {Cooperative security management for broadband network environments}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3953--3977}, year = {2015}, url = {https://doi.org/10.1002/sec.1313}, doi = {10.1002/SEC.1313}, timestamp = {Fri, 12 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/CruzSMBL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/CuiYJHL15, author = {Xiang Cui and Lihua Yin and Shuyuan Jin and Zhiyu Hao and Shuhao Li}, title = {Botnet spoofing: fighting botnet with itself}, journal = {Secur. Commun. Networks}, volume = {8}, number = {1}, pages = {80--89}, year = {2015}, url = {https://doi.org/10.1002/sec.749}, doi = {10.1002/SEC.749}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/CuiYJHL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DargahiJH15, author = {Tooska Dargahi and Hamid H. S. Javadi and Mehdi Hosseinzadeh}, title = {Application-specific hybrid symmetric design of key pre-distribution for wireless sensor networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {8}, pages = {1561--1574}, year = {2015}, url = {https://doi.org/10.1002/sec.1104}, doi = {10.1002/SEC.1104}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/DargahiJH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DasMM15, author = {Ashok Kumar Das and Dheerendra Mishra and Sourav Mukhopadhyay}, title = {An anonymous and secure biometric-based enterprise digital rights management system for mobile environment}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3383--3404}, year = {2015}, url = {https://doi.org/10.1002/sec.1266}, doi = {10.1002/SEC.1266}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/DasMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DelBelloRZ15, author = {Chris DelBello and Kazi Raihan and Tao Zhang}, title = {Reducing energy consumption of mobile phones during data transmission and encryption for wireless body area network applications}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {2973--2980}, year = {2015}, url = {https://doi.org/10.1002/sec.1223}, doi = {10.1002/SEC.1223}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/DelBelloRZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DerhabB15, author = {Abdelouahid Derhab and Abdelghani Bouras}, title = {Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems}, journal = {Secur. Commun. Networks}, volume = {8}, number = {7}, pages = {1193--1212}, year = {2015}, url = {https://doi.org/10.1002/sec.1074}, doi = {10.1002/SEC.1074}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/DerhabB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DeveciC15, author = {Engin Deveci and Mehmet Ufuk {\c{C}}aglayan}, title = {Model driven security framework for software design and verification}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2768--2792}, year = {2015}, url = {https://doi.org/10.1002/sec.1200}, doi = {10.1002/SEC.1200}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/DeveciC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DhasarathanTP15, author = {Chandramohan Dhasarathan and Vengattaraman Thirumal and Dhavachelvan Ponnurangam}, title = {Data privacy breach prevention framework for the cloud service}, journal = {Secur. Commun. Networks}, volume = {8}, number = {6}, pages = {982--1005}, year = {2015}, url = {https://doi.org/10.1002/sec.1054}, doi = {10.1002/SEC.1054}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/DhasarathanTP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DjellaliBCL15, author = {Benchaa Djellali and Kheira Belarbi and Abdallah Chouarfia and Pascal Lorenz}, title = {User authentication scheme preserving anonymity for ubiquitous devices}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {3131--3141}, year = {2015}, url = {https://doi.org/10.1002/sec.1238}, doi = {10.1002/SEC.1238}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/DjellaliBCL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DongDW15, author = {Qingkuan Dong and Wenxiu Ding and Lili Wei}, title = {Improvement and optimized implementation of cryptoGPS protocol for low-cost radio-frequency identification authentication}, journal = {Secur. Commun. Networks}, volume = {8}, number = {8}, pages = {1474--1484}, year = {2015}, url = {https://doi.org/10.1002/sec.1096}, doi = {10.1002/SEC.1096}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/DongDW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DuWW15, author = {Yao Du and Xiaoqing Wang and Junfeng Wang}, title = {A static Android malicious code detection method based on multi-source fusion}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {3238--3246}, year = {2015}, url = {https://doi.org/10.1002/sec.1248}, doi = {10.1002/SEC.1248}, timestamp = {Fri, 04 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/DuWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DuZZL15, author = {Rong Du and Chenglin Zhao and Feng Zhao and Shenghong Li}, title = {Strategies of network coding against nodes conspiracy attack}, journal = {Secur. Commun. Networks}, volume = {8}, number = {14}, pages = {2396--2403}, year = {2015}, url = {https://doi.org/10.1002/sec.753}, doi = {10.1002/SEC.753}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/DuZZL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/EhdaieAAAP15, author = {Mohammad Ehdaie and Nikolaos Alexiou and Mahmoud Ahmadian{-}Attari and Mohammad Reza Aref and Panos Papadimitratos}, title = {Key splitting: making random key distribution schemes resistant against node capture}, journal = {Secur. Commun. Networks}, volume = {8}, number = {3}, pages = {431--445}, year = {2015}, url = {https://doi.org/10.1002/sec.991}, doi = {10.1002/SEC.991}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/EhdaieAAAP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ElashryMS15, author = {Ibrahim F. Elashry and Yi Mu and Willy Susilo}, title = {A resilient identity-based authenticated key exchange protocol}, journal = {Secur. Commun. Networks}, volume = {8}, number = {13}, pages = {2279--2290}, year = {2015}, url = {https://doi.org/10.1002/sec.1172}, doi = {10.1002/SEC.1172}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ElashryMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/EmuraMRO15, author = {Keita Emura and Atsuko Miyaji and Mohammad Shahriar Rahman and Kazumasa Omote}, title = {Generic constructions of secure-channel free searchable encryption with adaptive security}, journal = {Secur. Commun. Networks}, volume = {8}, number = {8}, pages = {1547--1560}, year = {2015}, url = {https://doi.org/10.1002/sec.1103}, doi = {10.1002/SEC.1103}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/EmuraMRO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ErfaniJR15, author = {Seyed Hossein Erfani and Hamid Haj Seyyed Javadi and Amir Masoud Rahmani}, title = {A dynamic key management scheme for dynamic wireless sensor networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {6}, pages = {1040--1049}, year = {2015}, url = {https://doi.org/10.1002/sec.1058}, doi = {10.1002/SEC.1058}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ErfaniJR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ErmisBAC15, author = {Orhan Ermis and Serif Bahtiyar and Emin Anarim and M. Ufuk {\c{C}}aglayan}, title = {An improved conference-key agreement protocol for dynamic groups with efficient fault correction}, journal = {Secur. Commun. Networks}, volume = {8}, number = {7}, pages = {1347--1359}, year = {2015}, url = {https://doi.org/10.1002/sec.1089}, doi = {10.1002/SEC.1089}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ErmisBAC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/FallahpourSG15, author = {Mehdi Fallahpour and Shervin Shirmohammadi and Mohammad Ghanbari}, title = {A high capacity data hiding algorithm for {H.264/AVC} video}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2947--2955}, year = {2015}, url = {https://doi.org/10.1002/sec.1221}, doi = {10.1002/SEC.1221}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/FallahpourSG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/FanWCLJ15, author = {Lejun Fan and Yuanzhuo Wang and Xueqi Cheng and Jinming Li and Shuyuan Jin}, title = {Privacy theft malware multi-process collaboration analysis}, journal = {Secur. Commun. Networks}, volume = {8}, number = {1}, pages = {51--67}, year = {2015}, url = {https://doi.org/10.1002/sec.705}, doi = {10.1002/SEC.705}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/FanWCLJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/FarcasinC15, author = {Michael Farcasin and Eric Chan{-}Tin}, title = {Why we hate {IT:} two surveys on pre-generated and expiring passwords in an academic setting}, journal = {Secur. Commun. Networks}, volume = {8}, number = {13}, pages = {2361--2373}, year = {2015}, url = {https://doi.org/10.1002/sec.1184}, doi = {10.1002/SEC.1184}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/FarcasinC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/FeiYLXZ15, author = {Wei Fei and Gaobo Yang and Leida Li and Ming Xia and Dengyong Zhang}, title = {Detection of seam carving-based video retargeting using forensics hash}, journal = {Secur. Commun. Networks}, volume = {8}, number = {12}, pages = {2102--2113}, year = {2015}, url = {https://doi.org/10.1002/sec.1158}, doi = {10.1002/SEC.1158}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/FeiYLXZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/FengHGM15, author = {Tao Feng and Shining Han and Xian Guo and Donglin Ma}, title = {A new method of formalizing anonymity based on protocol composition logic}, journal = {Secur. Commun. Networks}, volume = {8}, number = {6}, pages = {1132--1140}, year = {2015}, url = {https://doi.org/10.1002/sec.1068}, doi = {10.1002/SEC.1068}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/FengHGM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/FengLZL15, author = {Hui Feng and Hefei Ling and Fuhao Zou and Zhengding Lu}, title = {SVM-based anti-forensic method for spread-spectrum fingerprinting}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2624--2634}, year = {2015}, url = {https://doi.org/10.1002/sec.503}, doi = {10.1002/SEC.503}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/FengLZL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/FengZLZ15, author = {Jingyu Feng and Yuqing Zhang and Guangyue Lu and Wenxiu Zheng}, title = {Securing cooperative spectrum sensing against {ISSDF} attack using dynamic trust evaluation in cognitive radio networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {3157--3166}, year = {2015}, url = {https://doi.org/10.1002/sec.1240}, doi = {10.1002/SEC.1240}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/FengZLZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Fredj15, author = {Ouissem Ben Fredj}, title = {A realistic graph-based alert correlation system}, journal = {Secur. Commun. Networks}, volume = {8}, number = {15}, pages = {2477--2493}, year = {2015}, url = {https://doi.org/10.1002/sec.1190}, doi = {10.1002/SEC.1190}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Fredj15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/FuDL15, author = {Xiao Fu and Xiaojiang Du and Bin Luo}, title = {Data correlation-based analysis methods for automatic memory forensic}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4213--4226}, year = {2015}, url = {https://doi.org/10.1002/sec.1337}, doi = {10.1002/SEC.1337}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/FuDL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Fujinoki15, author = {Hiroshi Fujinoki}, title = {Designs, analyses, and optimizations for attribute-shuffling obfuscation to protect information from malicious cloud administrators}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {3045--3066}, year = {2015}, url = {https://doi.org/10.1002/sec.1231}, doi = {10.1002/SEC.1231}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Fujinoki15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/GengLZ15, author = {Guang{-}Gang Geng and Xiao{-}Dong Lee and Yan{-}Ming Zhang}, title = {Combating phishing attacks via brand identity and authorization features}, journal = {Secur. Commun. Networks}, volume = {8}, number = {6}, pages = {888--898}, year = {2015}, url = {https://doi.org/10.1002/sec.1045}, doi = {10.1002/SEC.1045}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/GengLZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/GhasemiGolB15, author = {Mohammad GhasemiGol and Abbas Ghaemi Bafghi}, title = {E-correlator: an entropy-based alert correlation system}, journal = {Secur. Commun. Networks}, volume = {8}, number = {5}, pages = {822--836}, year = {2015}, url = {https://doi.org/10.1002/sec.1039}, doi = {10.1002/SEC.1039}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/GhasemiGolB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/GheorgheMGMDVC15, author = {Laura Gheorghe and Bogdan Marin and Gary Gibson and Lucian Mogosanu and Razvan Deaconescu and Valentin{-}Gabriel Voiculescu and Mihai Carabas}, title = {Smart malware detection on Android}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4254--4272}, year = {2015}, url = {https://doi.org/10.1002/sec.1340}, doi = {10.1002/SEC.1340}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/GheorgheMGMDVC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/GogoulosALMKV15, author = {Fotios Gogoulos and Anna Antonakopoulou and Georgios V. Lioudakis and Aziz S. Mousas and Dimitra I. Kaklamani and Iakovos S. Venieris}, title = {An authorization model for cross-enterprise collaborations}, journal = {Secur. Commun. Networks}, volume = {8}, number = {4}, pages = {523--539}, year = {2015}, url = {https://doi.org/10.1002/sec.1000}, doi = {10.1002/SEC.1000}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/GogoulosALMKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/GuleriaD15, author = {Vandana Guleria and Ratna Dutta}, title = {Universally composable issuer-free adaptive oblivious transfer with access policy}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3615--3633}, year = {2015}, url = {https://doi.org/10.1002/sec.1285}, doi = {10.1002/SEC.1285}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/GuleriaD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/GuoCCZ15, author = {Wenzhong Guo and Jia Ye Chen and Guolong Chen and Haifeng Zheng}, title = {Trust dynamic task allocation algorithm with Nash equilibrium for heterogeneous wireless sensor network}, journal = {Secur. Commun. Networks}, volume = {8}, number = {10}, pages = {1865--1877}, year = {2015}, url = {https://doi.org/10.1002/sec.1026}, doi = {10.1002/SEC.1026}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/GuoCCZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HachmiBL15, author = {Fatma Hachmi and Khadouja Boujenfa and Mohamed Limam}, title = {An optimization process to identify outliers generated by intrusion detection systems}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3469--3480}, year = {2015}, url = {https://doi.org/10.1002/sec.1271}, doi = {10.1002/SEC.1271}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HachmiBL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HajnyDM15, author = {Jan Hajny and Petr Dzurenda and Lukas Malina}, title = {Attribute-based credentials with cryptographic collusion prevention}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3836--3846}, year = {2015}, url = {https://doi.org/10.1002/sec.1304}, doi = {10.1002/SEC.1304}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HajnyDM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HakamianR15, author = {Mir Alireza Hakamian and Amir Masoud Rahmani}, title = {Evaluation of isolation in virtual machine environments encounter in effective attacks against memory}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4396--4406}, year = {2015}, url = {https://doi.org/10.1002/sec.1374}, doi = {10.1002/SEC.1374}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HakamianR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HaoWLR15, author = {Sun Hao and Wen Wang and Huabiao Lu and Peige Ren}, title = {AutoMal: automatic clustering and signature generation for malwares based on the network flow}, journal = {Secur. Commun. Networks}, volume = {8}, number = {10}, pages = {1845--1854}, year = {2015}, url = {https://doi.org/10.1002/sec.1029}, doi = {10.1002/SEC.1029}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HaoWLR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HarnG15, author = {Lein Harn and Guang Gong}, title = {Conference key establishment protocol using a multivariate polynomial and its applications}, journal = {Secur. Commun. Networks}, volume = {8}, number = {9}, pages = {1794--1800}, year = {2015}, url = {https://doi.org/10.1002/sec.1143}, doi = {10.1002/SEC.1143}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HarnG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HouH15, author = {Fangyong Hou and Hongjun He}, title = {Ultra simple way to encrypt non-volatile main memory}, journal = {Secur. Commun. Networks}, volume = {8}, number = {7}, pages = {1155--1168}, year = {2015}, url = {https://doi.org/10.1002/sec.1071}, doi = {10.1002/SEC.1071}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HouH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HowladerM15, author = {Jaydeep Howlader and Ashis Kumar Mal}, title = {Sealed-bid auction: a cryptographic solution to bid-rigging attack in the collusive environment}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3415--3440}, year = {2015}, url = {https://doi.org/10.1002/sec.1268}, doi = {10.1002/SEC.1268}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HowladerM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HsuCL15, author = {Fu{-}Hau Hsu and Li{-}Han Chen and Chia{-}Jun Lin}, title = {Defeat scanning worms in cyber warfare}, journal = {Secur. Commun. Networks}, volume = {8}, number = {5}, pages = {715--726}, year = {2015}, url = {https://doi.org/10.1002/sec.1019}, doi = {10.1002/SEC.1019}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HsuCL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HuWL15, author = {Ning Hu and BaoSheng Wang and Xin Liu}, title = {Cooperative monitoring {BGP} among autonomous systems}, journal = {Secur. Commun. Networks}, volume = {8}, number = {10}, pages = {1943--1957}, year = {2015}, url = {https://doi.org/10.1002/sec.1024}, doi = {10.1002/SEC.1024}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HuWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HuWXT15, author = {Xiaoming Hu and Jian Wang and Huajie Xu and WenAn Tan}, title = {A short and highly efficient identity-based designated verifier proxy signature scheme}, journal = {Secur. Commun. Networks}, volume = {8}, number = {6}, pages = {907--916}, year = {2015}, url = {https://doi.org/10.1002/sec.1048}, doi = {10.1002/SEC.1048}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HuWXT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HuangD15, author = {Xueli Huang and Xiaojiang Du}, title = {Achieving data privacy on hybrid cloud}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3771--3781}, year = {2015}, url = {https://doi.org/10.1002/sec.1298}, doi = {10.1002/SEC.1298}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HuangD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HuangJ15, author = {Jingjing Huang and Ting Jiang}, title = {Secret key generation exploiting Ultra-wideband indoor wireless channel characteristics}, journal = {Secur. Commun. Networks}, volume = {8}, number = {13}, pages = {2329--2337}, year = {2015}, url = {https://doi.org/10.1002/sec.1178}, doi = {10.1002/SEC.1178}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HuangJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HuangLC15, author = {Zhengan Huang and Shengli Liu and Kefei Chen}, title = {\emph{n}-Evasive all-but-many lossy trapdoor function and its constructions}, journal = {Secur. Commun. Networks}, volume = {8}, number = {4}, pages = {550--564}, year = {2015}, url = {https://doi.org/10.1002/sec.1002}, doi = {10.1002/SEC.1002}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HuangLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HuangLLL15, author = {Chun{-}Ying Huang and Ying{-}Dar Lin and Peng{-}Yu Liao and Yuan{-}Cheng Lai}, title = {Stateful traffic replay for web application proxies}, journal = {Secur. Commun. Networks}, volume = {8}, number = {6}, pages = {970--981}, year = {2015}, url = {https://doi.org/10.1002/sec.1053}, doi = {10.1002/SEC.1053}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HuangLLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HuangYCX15, author = {Xiaoling Huang and Guodong Ye and Huajin Chai and Ou Xie}, title = {Compression and encryption for remote sensing image using chaotic system}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3659--3666}, year = {2015}, url = {https://doi.org/10.1002/sec.1289}, doi = {10.1002/SEC.1289}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HuangYCX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HussainDZN15, author = {Intesab Hussain and Soufiene Djahel and Zonghua Zhang and Farid Na{\"{\i}}t{-}Abdesselam}, title = {A comprehensive study of flooding attack consequences and countermeasures in Session Initiation Protocol {(SIP)}}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4436--4451}, year = {2015}, url = {https://doi.org/10.1002/sec.1328}, doi = {10.1002/SEC.1328}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/HussainDZN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HwangCCS15, author = {Jung Yeon Hwang and Dooho Choi and Hyun Sook Cho and Boyeon Song}, title = {New efficient batch verification for an identity-based signature scheme}, journal = {Secur. Commun. Networks}, volume = {8}, number = {15}, pages = {2524--2535}, year = {2015}, url = {https://doi.org/10.1002/sec.1194}, doi = {10.1002/SEC.1194}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HwangCCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HwangG15, author = {Tzonelih Hwang and Prosanta Gope}, title = {{IAR-CTR} and {IAR-CFB:} integrity aware real-time based counter and cipher feedback modes}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3939--3952}, year = {2015}, url = {https://doi.org/10.1002/sec.1312}, doi = {10.1002/SEC.1312}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HwangG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/IftikharKA15, author = {Saman Iftikhar and Muhammad Kamran and Zahid Anwar}, title = {A survey on reversible watermarking techniques for relational databases}, journal = {Secur. Commun. Networks}, volume = {8}, number = {15}, pages = {2580--2603}, year = {2015}, url = {https://doi.org/10.1002/sec.1196}, doi = {10.1002/SEC.1196}, timestamp = {Fri, 22 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/IftikharKA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/IslamKA15, author = {SK Hafizul Islam and Muhammad Khurram Khan and Ali M. Al{-}Khouri}, title = {Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing}, journal = {Secur. Commun. Networks}, volume = {8}, number = {13}, pages = {2214--2231}, year = {2015}, url = {https://doi.org/10.1002/sec.1165}, doi = {10.1002/SEC.1165}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/IslamKA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/IslamO15, author = {SK Hafizul Islam and Mohammad S. Obaidat}, title = {Design of provably secure and efficient certificateless blind signature scheme using bilinear pairing}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4319--4332}, year = {2015}, url = {https://doi.org/10.1002/sec.1344}, doi = {10.1002/SEC.1344}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/IslamO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Jadidoleslamy15, author = {Hossein Jadidoleslamy}, title = {{TMS-HCW:} a trust management system in hierarchical clustered wireless sensor networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4110--4122}, year = {2015}, url = {https://doi.org/10.1002/sec.1327}, doi = {10.1002/SEC.1327}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Jadidoleslamy15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/JaikumarK15, author = {Padmini Jaikumar and Avinash C. Kak}, title = {A graph-theoretic framework for isolating botnets in a network}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2605--2623}, year = {2015}, url = {https://doi.org/10.1002/sec.500}, doi = {10.1002/SEC.500}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/JaikumarK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/JanickiMS15, author = {Artur Janicki and Wojciech Mazurczyk and Krzysztof Szczypiorski}, title = {On the undetectability of transcoding steganography}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3804--3814}, year = {2015}, url = {https://doi.org/10.1002/sec.1301}, doi = {10.1002/SEC.1301}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/JanickiMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/JiLH015, author = {Yuede Ji and Qiang Li and Yukun He and Dong Guo}, title = {BotCatch: leveraging signature and behavior for bot detection}, journal = {Secur. Commun. Networks}, volume = {8}, number = {6}, pages = {952--969}, year = {2015}, url = {https://doi.org/10.1002/sec.1052}, doi = {10.1002/SEC.1052}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/JiLH015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/JiangHWWL15, author = {Mingming Jiang and Yupu Hu and Baocang Wang and F. H. Wang and Qiqi Lai}, title = {Lattice-based multi-use unidirectional proxy re-encryption}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3796--3803}, year = {2015}, url = {https://doi.org/10.1002/sec.1300}, doi = {10.1002/SEC.1300}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/JiangHWWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/JiangLLLS15, author = {Rong Jiang and Rongxing Lu and Jun Luo and Chengzhe Lai and Xuemin Sherman Shen}, title = {Efficient self-healing group key management with dynamic revocation and collusion resistance for {SCADA} in smart grid}, journal = {Secur. Commun. Networks}, volume = {8}, number = {6}, pages = {1026--1039}, year = {2015}, url = {https://doi.org/10.1002/sec.1057}, doi = {10.1002/SEC.1057}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/JiangLLLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/JiangTT15, author = {Lei Jiang and Jianlong Tan and Qiu Tang}, title = {An efficient sparse matrix format for accelerating regular expression matching on field-programmable gate arrays}, journal = {Secur. Commun. Networks}, volume = {8}, number = {1}, pages = {13--24}, year = {2015}, url = {https://doi.org/10.1002/sec.780}, doi = {10.1002/SEC.780}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/JiangTT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/JiangYZ15, author = {Ting Jiang and Ming Yang and Yi Zhang}, title = {Research and implementation of {M2M} smart home and security system}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2704--2711}, year = {2015}, url = {https://doi.org/10.1002/sec.569}, doi = {10.1002/SEC.569}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/JiangYZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/JilnaP15, author = {Payingat Jilna and Deepthi P. Pattathil}, title = {A key management technique based on elliptic curves for static wireless sensor networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3726--3738}, year = {2015}, url = {https://doi.org/10.1002/sec.1295}, doi = {10.1002/SEC.1295}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/JilnaP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KaljahiPG15, author = {Maryam Asadzadeh Kaljahi and Ali Payandeh and Mohammad Bagher Ghaznavi Ghoushchi}, title = {{TSSL:} improving {SSL/TLS} protocol by trust model}, journal = {Secur. Commun. Networks}, volume = {8}, number = {9}, pages = {1659--1671}, year = {2015}, url = {https://doi.org/10.1002/sec.1113}, doi = {10.1002/SEC.1113}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KaljahiPG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KampanakisY15, author = {Panos Kampanakis and Attila Altay Yavuz}, title = {BAFi: a practical cryptographic secure audit logging scheme for digital forensics}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {3180--3190}, year = {2015}, url = {https://doi.org/10.1002/sec.1242}, doi = {10.1002/SEC.1242}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KampanakisY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KansoGN15, author = {Ali Kanso and Mohammad Ghebleh and Hassan Noura}, title = {A variant of Baptista's encryption scheme}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3701--3712}, year = {2015}, url = {https://doi.org/10.1002/sec.1293}, doi = {10.1002/SEC.1293}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KansoGN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KavehM15, author = {Hadi Kaveh and Mohammad Shahram Moin}, title = {A high-capacity and low-distortion 3D polygonal mesh steganography using surfacelet transform}, journal = {Secur. Commun. Networks}, volume = {8}, number = {2}, pages = {159--167}, year = {2015}, url = {https://doi.org/10.1002/sec.968}, doi = {10.1002/SEC.968}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KavehM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KenazaHN15, author = {Tayeb Kenaza and Othmane Nait Hamoud and Nadia Nouali{-}Taboudjemat}, title = {Efficient centralized approach to prevent from replication attack in wireless sensor networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {2}, pages = {220--231}, year = {2015}, url = {https://doi.org/10.1002/sec.975}, doi = {10.1002/SEC.975}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KenazaHN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KhanA15, author = {Mubashar Khan and Naveed Ahmed Azam}, title = {Right translated {AES} gray S-boxes}, journal = {Secur. Commun. Networks}, volume = {8}, number = {9}, pages = {1627--1635}, year = {2015}, url = {https://doi.org/10.1002/sec.1110}, doi = {10.1002/SEC.1110}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KhanA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KimJ15, author = {Kee Sung Kim and Ik Rae Jeong}, title = {A new certificateless signature scheme under enhanced security models}, journal = {Secur. Commun. Networks}, volume = {8}, number = {5}, pages = {801--810}, year = {2015}, url = {https://doi.org/10.1002/sec.1036}, doi = {10.1002/SEC.1036}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KimJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KimJ15a, author = {Kee Sung Kim and Ik Rae Jeong}, title = {Efficient verifiable data streaming}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4013--4018}, year = {2015}, url = {https://doi.org/10.1002/sec.1317}, doi = {10.1002/SEC.1317}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KimJ15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KirazGK15, author = {Mehmet Sabir Kiraz and Ziya Alper Gen{\c{c}} and S{\"{u}}leyman Kardas}, title = {Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4123--4135}, year = {2015}, url = {https://doi.org/10.1002/sec.1329}, doi = {10.1002/SEC.1329}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KirazGK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KuangLLL15, author = {Xiaohui Kuang and Li Liu and Qiang Liu and Xiang Li}, title = {A clustering approach based on convergence degree chain for wireless sensor networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {10}, pages = {1878--1889}, year = {2015}, url = {https://doi.org/10.1002/sec.1042}, doi = {10.1002/SEC.1042}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/KuangLLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KumarK15, author = {R. Kumar and G. Kousalya}, title = {Transactions based secure routing in wireless networks: a cognitive science approach}, journal = {Secur. Commun. Networks}, volume = {8}, number = {6}, pages = {1050--1062}, year = {2015}, url = {https://doi.org/10.1002/sec.1060}, doi = {10.1002/SEC.1060}, timestamp = {Sat, 05 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/KumarK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KundiAK15, author = {Dur{-}e{-}Shahwar Kundi and Arshad Aziz and Majida Kazmi}, title = {An efficient single unit T-box/T\({}^{\mbox{-1}}\)-box implementation for 128-bit {AES} on {FPGA}}, journal = {Secur. Commun. Networks}, volume = {8}, number = {9}, pages = {1725--1731}, year = {2015}, url = {https://doi.org/10.1002/sec.1138}, doi = {10.1002/SEC.1138}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KundiAK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KurekLN15, author = {Tytus Kurek and Artur Lason and Marcin Niemiec}, title = {First step towards preserving the privacy of cloud-based {IDS} security policies}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3481--3491}, year = {2015}, url = {https://doi.org/10.1002/sec.1272}, doi = {10.1002/SEC.1272}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KurekLN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LaiHCWW15, author = {Qiqi Lai and Yupu Hu and Yuan Chen and Baocang Wang and Fenghe Wang}, title = {New method of key-dependent message security for asymmetric encryption}, journal = {Secur. Commun. Networks}, volume = {8}, number = {13}, pages = {2157--2170}, year = {2015}, url = {https://doi.org/10.1002/sec.1160}, doi = {10.1002/SEC.1160}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LaiHCWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LaiW15, author = {Yeu{-}Pong Lai and Wei{-}Feng Wu}, title = {The defense in-depth approach to the protection for browsing users against drive-by cache attacks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {7}, pages = {1422--1430}, year = {2015}, url = {https://doi.org/10.1002/sec.1091}, doi = {10.1002/SEC.1091}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LaiW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LeeKH15, author = {Kwangsu Lee and Intae Kim and Seong Oun Hwang}, title = {Privacy preserving revocable predicate encryption revisited}, journal = {Secur. Commun. Networks}, volume = {8}, number = {3}, pages = {471--485}, year = {2015}, url = {https://doi.org/10.1002/sec.994}, doi = {10.1002/SEC.994}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LeeKH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiAWL15, author = {Lintao Li and Jianping An and Zhongyong Wang and Xiangming Li}, title = {Under-sampling spectrum-sparse signals based on active aliasing for low probability detection}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4087--4097}, year = {2015}, url = {https://doi.org/10.1002/sec.1325}, doi = {10.1002/SEC.1325}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiAWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiAWS15, author = {Depeng Li and Zeyar Aung and John R. Williams and Abel Sanchez}, title = {Efficient and fault-diagnosable authentication architecture for {AMI} in smart grid}, journal = {Secur. Commun. Networks}, volume = {8}, number = {4}, pages = {598--616}, year = {2015}, url = {https://doi.org/10.1002/sec.1006}, doi = {10.1002/SEC.1006}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiAWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiLW15, author = {Chun{-}Ta Li and Cheng{-}Chi Lee and Chi{-}Yao Weng}, title = {A dynamic identity-based user authentication scheme for remote login systems}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3372--3382}, year = {2015}, url = {https://doi.org/10.1002/sec.1264}, doi = {10.1002/SEC.1264}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiMG15, author = {Mingchu Li and Shu Ma and Cheng Guo}, title = {A novel weighted threshold secret image sharing scheme\({}^{\mbox{{\textdagger}}}\)}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {3083--3093}, year = {2015}, url = {https://doi.org/10.1002/sec.1233}, doi = {10.1002/SEC.1233}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiMG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiMLXL15, author = {Qi Li and Jianfeng Ma and Rui Li and Jinbo Xiong and Ximeng Liu}, title = {Large universe decentralized key-policy attribute-based encryption}, journal = {Secur. Commun. Networks}, volume = {8}, number = {3}, pages = {501--509}, year = {2015}, url = {https://doi.org/10.1002/sec.997}, doi = {10.1002/SEC.997}, timestamp = {Tue, 12 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiMLXL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiMLXL15a, author = {Qi Li and Jianfeng Ma and Rui Li and Jinbo Xiong and Ximeng Liu}, title = {Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4098--4109}, year = {2015}, url = {https://doi.org/10.1002/sec.1326}, doi = {10.1002/SEC.1326}, timestamp = {Tue, 12 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiMLXL15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiMSGV15, author = {Nan Li and Yi Mu and Willy Susilo and Fuchun Guo and Vijay Varadharajan}, title = {Vulnerabilities of an ECC-based {RFID} authentication scheme}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {3262--3270}, year = {2015}, url = {https://doi.org/10.1002/sec.1250}, doi = {10.1002/SEC.1250}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiMSGV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiQYWZ15, author = {Xiangxue Li and Haifeng Qian and Yu Yu and Jian Weng and Yuan Zhou}, title = {Signcryption KEM/tag-KEM, revisited}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {3067--3082}, year = {2015}, url = {https://doi.org/10.1002/sec.1232}, doi = {10.1002/SEC.1232}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/LiQYWZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiSLL15, author = {Jian Li and DanJie Song and Ruifan Li and Xiaofeng Lu}, title = {A quantum secure direct communication protocol based on four-qubit cluster state}, journal = {Secur. Commun. Networks}, volume = {8}, number = {1}, pages = {36--42}, year = {2015}, url = {https://doi.org/10.1002/sec.711}, doi = {10.1002/SEC.711}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiSLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiWSL15, author = {Gaoxiang Li and Di Wu and Junfeng Shen and Tingting Li}, title = {Deciphering privacy leakage in microblogging social networks: a measurement study}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {3191--3204}, year = {2015}, url = {https://doi.org/10.1002/sec.1244}, doi = {10.1002/SEC.1244}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiWSL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiZ15, author = {Luyang Li and Wei{-}Guo Zhang}, title = {Construction of resilient Boolean functions with high nonlinearity and good algebraic degree}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2909--2916}, year = {2015}, url = {https://doi.org/10.1002/sec.1218}, doi = {10.1002/SEC.1218}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiZZ15, author = {Jiguo Li and Jingjing Zhao and Yichen Zhang}, title = {Certificateless online/offline signcryption scheme}, journal = {Secur. Commun. Networks}, volume = {8}, number = {11}, pages = {1979--1990}, year = {2015}, url = {https://doi.org/10.1002/sec.1146}, doi = {10.1002/SEC.1146}, timestamp = {Tue, 31 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Liang15, author = {Jing Liang}, title = {Geolocation-aware security in a netcentric small unmanned-aerial-system for {RF} emitters}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2661--2670}, year = {2015}, url = {https://doi.org/10.1002/sec.532}, doi = {10.1002/SEC.532}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Liang15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiangRLZPZ15, author = {Qilian Liang and Jian Ren and Jing Liang and Baoju Zhang and Yiming Pi and Chenglin Zhao}, title = {Security in big data}, journal = {Secur. Commun. Networks}, volume = {8}, number = {14}, pages = {2383--2385}, year = {2015}, url = {https://doi.org/10.1002/sec.1332}, doi = {10.1002/SEC.1332}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiangRLZPZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiaoLKL15, author = {Qin Liao and Hong Li and Songlin Kang and Chuchu Liu}, title = {Application layer DDoS attack detection using cluster with label based on sparse vector decomposition and rhythm matching}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {3111--3120}, year = {2015}, url = {https://doi.org/10.1002/sec.1236}, doi = {10.1002/SEC.1236}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiaoLKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LinBW15, author = {Pingping Lin and Jun Bi and Yangyang Wang}, title = {WEBridge: west-east bridge for distributed heterogeneous {SDN} NOSes peering}, journal = {Secur. Commun. Networks}, volume = {8}, number = {10}, pages = {1926--1942}, year = {2015}, url = {https://doi.org/10.1002/sec.1030}, doi = {10.1002/SEC.1030}, timestamp = {Sat, 05 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/LinBW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LinLLHL15, author = {Ying{-}Dar Lin and Yuan{-}Cheng Lai and Chun{-}Nan Lu and Peng{-}Kai Hsu and Chia{-}Yin Lee}, title = {Three-phase behavior-based detection and classification of known and unknown malware}, journal = {Secur. Commun. Networks}, volume = {8}, number = {11}, pages = {2004--2015}, year = {2015}, url = {https://doi.org/10.1002/sec.1148}, doi = {10.1002/SEC.1148}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LinLLHL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LinTL15, author = {Hsiao{-}Ching Lin and Chinyang Henry Tseng and Hui{-}Tang Lin}, title = {MoTIVE: mobile two-hop integrity validation for emergency vehicle routing}, journal = {Secur. Commun. Networks}, volume = {8}, number = {9}, pages = {1717--1724}, year = {2015}, url = {https://doi.org/10.1002/sec.1137}, doi = {10.1002/SEC.1137}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LinTL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Liu15, author = {Xian Liu}, title = {Secrecy capacity of wireless channels subject to log-normal fading}, journal = {Secur. Commun. Networks}, volume = {8}, number = {1}, pages = {25--35}, year = {2015}, url = {https://doi.org/10.1002/sec.752}, doi = {10.1002/SEC.752}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Liu15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuDLH15, author = {Yaping Liu and Wenping Deng and Zhihong Liu and Feng Huang}, title = {3S: three-signature path authentication for {BGP} security}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {3002--3014}, year = {2015}, url = {https://doi.org/10.1002/sec.1227}, doi = {10.1002/SEC.1227}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiuDLH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuLCC15, author = {Chia{-}Hui Liu and Fong{-}Qi Lin and Chin{-}Sheng Chen and Tzer{-}Shyong Chen}, title = {Design of secure access control scheme for personal health record-based cloud healthcare service}, journal = {Secur. Commun. Networks}, volume = {8}, number = {7}, pages = {1332--1346}, year = {2015}, url = {https://doi.org/10.1002/sec.1087}, doi = {10.1002/SEC.1087}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiuLCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuLD15, author = {Weiwei Liu and Guangjie Liu and Yuewei Dai}, title = {Damage-resistance matrix embedding framework: the contradiction between robustness and embedding efficiency}, journal = {Secur. Commun. Networks}, volume = {8}, number = {9}, pages = {1636--1647}, year = {2015}, url = {https://doi.org/10.1002/sec.1111}, doi = {10.1002/SEC.1111}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiuLD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuLWGL15, author = {Zhiqiang Liu and Ya Liu and Qingju Wang and Dawu Gu and Wei Li}, title = {Meet-in-the-middle fault analysis on word-oriented substitution-permutation network block ciphers}, journal = {Secur. Commun. Networks}, volume = {8}, number = {4}, pages = {672--681}, year = {2015}, url = {https://doi.org/10.1002/sec.1015}, doi = {10.1002/SEC.1015}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiuLWGL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuLYL15, author = {Chuan{-}Gang Liu and I{-}Hsien Liu and Wun{-}Sheng Yao and Jung{-}Shian Li}, title = {\emph{K}-anonymity against neighborhood attacks in weighted social networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3864--3882}, year = {2015}, url = {https://doi.org/10.1002/sec.1306}, doi = {10.1002/SEC.1306}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiuLYL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuRWT15, author = {Fiona Jiazi Liu and Ahmed Refaey and Xianbin Wang and Helen Tang}, title = {Reliability enhancement for CIR-based physical layer authentication}, journal = {Secur. Commun. Networks}, volume = {8}, number = {4}, pages = {661--671}, year = {2015}, url = {https://doi.org/10.1002/sec.1014}, doi = {10.1002/SEC.1014}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiuRWT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuTXH15, author = {Niu Liu and Shaohua Tang and Lingling Xu and Daojing He}, title = {Analyses of several recently proposed group key management schemes}, journal = {Secur. Commun. Networks}, volume = {8}, number = {2}, pages = {136--148}, year = {2015}, url = {https://doi.org/10.1002/sec.966}, doi = {10.1002/SEC.966}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiuTXH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuWPS15, author = {Che{-}Hung Liu and Jen{-}Sheng Wang and Chih{-}Chiang Peng and Joseph Z. Shyu}, title = {Evaluating and selecting the biometrics in network security}, journal = {Secur. Commun. Networks}, volume = {8}, number = {5}, pages = {727--739}, year = {2015}, url = {https://doi.org/10.1002/sec.1020}, doi = {10.1002/SEC.1020}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiuWPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuZLZ15, author = {Gang Liu and Jing Zhang and Jinhui Liu and Yuan Zhang}, title = {Improved Biba model based on trusted computing}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2793--2797}, year = {2015}, url = {https://doi.org/10.1002/sec.1201}, doi = {10.1002/SEC.1201}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiuZLZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LuLPY15, author = {Yanrong Lu and Lixiang Li and Haipeng Peng and Yixian Yang}, title = {A biometrics and smart cards-based authentication scheme for multi-server environments}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {3219--3228}, year = {2015}, url = {https://doi.org/10.1002/sec.1246}, doi = {10.1002/SEC.1246}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LuLPY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LuoXLWL15, author = {Yang Luo and Chunhe Xia and Liangshuang Lv and Zhao Wei and Yazhuo Li}, title = {Modeling, conflict detection, and verification of a new virtualization role-based access control framework}, journal = {Secur. Commun. Networks}, volume = {8}, number = {10}, pages = {1904--1925}, year = {2015}, url = {https://doi.org/10.1002/sec.1025}, doi = {10.1002/SEC.1025}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LuoXLWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MaLWL15, author = {Xiaopu Ma and Ruixuan Li and Hongwei Wang and Huaqing Li}, title = {Role mining based on permission cardinality constraint and user cardinality constraint}, journal = {Secur. Commun. Networks}, volume = {8}, number = {13}, pages = {2317--2328}, year = {2015}, url = {https://doi.org/10.1002/sec.1177}, doi = {10.1002/SEC.1177}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MaLWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MaityGA15, author = {Soumya Maity and Soumya Kanti Ghosh and Ehab Al{-}Shaer}, title = {PoliCon: a policy conciliation framework for heterogeneous mobile ad hoc networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {3}, pages = {418--430}, year = {2015}, url = {https://doi.org/10.1002/sec.990}, doi = {10.1002/SEC.990}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MaityGA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MalikSK15, author = {Arif Jamal Malik and Waseem Shahzad and Farrukh Aslam Khan}, title = {Network intrusion detection using hybrid binary {PSO} and random forests algorithm}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2646--2660}, year = {2015}, url = {https://doi.org/10.1002/sec.508}, doi = {10.1002/SEC.508}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MalikSK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ManifavasFPP15, author = {Charalampos Manifavas and Konstantinos Fysarakis and Alexandros Papanikolaou and Ioannis Papaefstathiou}, title = {Embedded Systems Security: {A} Survey of {EU} Research Efforts}, journal = {Secur. Commun. Networks}, volume = {8}, number = {11}, pages = {2016--2036}, year = {2015}, url = {https://doi.org/10.1002/sec.1151}, doi = {10.1002/SEC.1151}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/ManifavasFPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MaoLCWM15, author = {Xianping Mao and Junzuo Lai and Kefei Chen and Jian Weng and Qixiang Mei}, title = {Efficient revocable identity-based encryption from multilinear maps}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3511--3522}, year = {2015}, url = {https://doi.org/10.1002/sec.1274}, doi = {10.1002/SEC.1274}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/MaoLCWM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MasdariJB15, author = {Mohammad Masdari and Sam Jabbehdari and Jamshid Bagherzadeh}, title = {Secure publish/subscribe-based certificate status validations in mobile ad hoc networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {6}, pages = {1063--1076}, year = {2015}, url = {https://doi.org/10.1002/sec.1062}, doi = {10.1002/SEC.1062}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MasdariJB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MasriS15, author = {Wes Masri and Sam Sleiman}, title = {\emph{SQLPIL}: {SQL} injection prevention by input labeling}, journal = {Secur. Commun. Networks}, volume = {8}, number = {15}, pages = {2545--2560}, year = {2015}, url = {https://doi.org/10.1002/sec.1199}, doi = {10.1002/SEC.1199}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MasriS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Mayrhofer15, author = {Ren{\'{e}} Mayrhofer}, title = {An architecture for secure mobile devices}, journal = {Secur. Commun. Networks}, volume = {8}, number = {10}, pages = {1958--1970}, year = {2015}, url = {https://doi.org/10.1002/sec.1028}, doi = {10.1002/SEC.1028}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Mayrhofer15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MengLK15, author = {Weizhi Meng and Wenjuan Li and Lam{-}for Kwok}, title = {Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detection}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3883--3895}, year = {2015}, url = {https://doi.org/10.1002/sec.1307}, doi = {10.1002/SEC.1307}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/MengLK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MingW15, author = {Yang Ming and Yumin Wang}, title = {Proxy signcryption scheme in the standard model}, journal = {Secur. Commun. Networks}, volume = {8}, number = {8}, pages = {1431--1446}, year = {2015}, url = {https://doi.org/10.1002/sec.1092}, doi = {10.1002/SEC.1092}, timestamp = {Tue, 17 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MingW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MishraT15, author = {Alekha Kumar Mishra and Ashok Kumar Turuk}, title = {Residual energy-based replica detection scheme for mobile wireless sensor networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {4}, pages = {637--648}, year = {2015}, url = {https://doi.org/10.1002/sec.1012}, doi = {10.1002/SEC.1012}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MishraT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MoallaR15, author = {Samir Moalla and Maher Rahmouni}, title = {Trust path: a distributed model of search paths of trust in a peer-to-peer system}, journal = {Secur. Commun. Networks}, volume = {8}, number = {3}, pages = {360--367}, year = {2015}, url = {https://doi.org/10.1002/sec.984}, doi = {10.1002/SEC.984}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MoallaR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MohammadiP15, author = {Mahdiyeh Ali Mohammadi and Ali A. Pouyan}, title = {Defense mechanisms against Sybil attack in vehicular ad hoc network}, journal = {Secur. Commun. Networks}, volume = {8}, number = {6}, pages = {917--936}, year = {2015}, url = {https://doi.org/10.1002/sec.1049}, doi = {10.1002/SEC.1049}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MohammadiP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MohammadpourfardDGS15, author = {Mostafa Mohammadpourfard and Mohammad{-}Ali Doostari and Mohammad Bagher Ghaznavi Ghoushchi and Nafiseh Shakiba}, title = {A new secure Internet voting protocol using Java Card 3 technology and Java information flow concept}, journal = {Secur. Commun. Networks}, volume = {8}, number = {2}, pages = {261--283}, year = {2015}, url = {https://doi.org/10.1002/sec.978}, doi = {10.1002/SEC.978}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MohammadpourfardDGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MoosaviradKM15, author = {S. Mobarakeh Moosavirad and Peyman Kabiri and Hamidreza Mahini}, title = {Rashnu: a Wi-Fi intrusion response scheme}, journal = {Secur. Commun. Networks}, volume = {8}, number = {12}, pages = {2070--2078}, year = {2015}, url = {https://doi.org/10.1002/sec.1153}, doi = {10.1002/SEC.1153}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MoosaviradKM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MoradiK15, author = {Mohammad Moradi and Mohammad Reza Keyvanpour}, title = {{CAPTCHA} and its Alternatives: {A} Review}, journal = {Secur. Commun. Networks}, volume = {8}, number = {12}, pages = {2135--2156}, year = {2015}, url = {https://doi.org/10.1002/sec.1157}, doi = {10.1002/SEC.1157}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/MoradiK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MoumenaG15, author = {Ahmed Moumena and Abdelrezzak Guessoum}, title = {Fast anomaly detection using Boxplot rule for multivariate data in cooperative wideband cognitive radio in the presence of jammer}, journal = {Secur. Commun. Networks}, volume = {8}, number = {2}, pages = {212--219}, year = {2015}, url = {https://doi.org/10.1002/sec.974}, doi = {10.1002/SEC.974}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MoumenaG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Muhaya15, author = {Fahad Bin Muhaya}, title = {Cryptanalysis and security enhancement of Zhu's authentication scheme for Telecare medicine information system}, journal = {Secur. Commun. Networks}, volume = {8}, number = {2}, pages = {149--158}, year = {2015}, url = {https://doi.org/10.1002/sec.967}, doi = {10.1002/SEC.967}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Muhaya15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/NaH15, author = {Sang{-}Ho Na and Eui{-}Nam Huh}, title = {A broker-based cooperative security-SLA evaluation methodology for personal cloud computing}, journal = {Secur. Commun. Networks}, volume = {8}, number = {7}, pages = {1318--1331}, year = {2015}, url = {https://doi.org/10.1002/sec.1086}, doi = {10.1002/SEC.1086}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/NaH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/NacharIBA15, author = {Rabih Al Nachar and Elie Inaty and Patrick J. Bonnin and Yasser Alayli}, title = {Breaking down Captcha using edge corners and fuzzy logic segmentation/recognition technique}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3995--4012}, year = {2015}, url = {https://doi.org/10.1002/sec.1316}, doi = {10.1002/SEC.1316}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/NacharIBA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/NanavatiJ15, author = {Nirali R. Nanavati and Devesh C. Jinwala}, title = {A novel privacy-preserving scheme for collaborative frequent itemset mining across vertically partitioned data}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4407--4420}, year = {2015}, url = {https://doi.org/10.1002/sec.1377}, doi = {10.1002/SEC.1377}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/NanavatiJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/NaroueiAGTS15, author = {Masoud Narouei and Mansour Ahmadi and Giorgio Giacinto and Hassan Takabi and Ashkan Sami}, title = {DLLMiner: structural mining for malware detection}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3311--3322}, year = {2015}, url = {https://doi.org/10.1002/sec.1255}, doi = {10.1002/SEC.1255}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/NaroueiAGTS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/NaumanKOM15, author = {Mohammad Nauman and Sohail Khan and Abu Talib Othman and Shahrulniza Musa}, title = {Realization of a user-centric, privacy preserving permission framework for Android}, journal = {Secur. Commun. Networks}, volume = {8}, number = {3}, pages = {368--382}, year = {2015}, url = {https://doi.org/10.1002/sec.986}, doi = {10.1002/SEC.986}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/NaumanKOM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/NazariEM15, author = {Sara Nazari and Amir{-}Masoud Eftekhari{-}Moghadam and Mohammad Shahram Moin}, title = {A novel image steganography scheme based on morphological associative memory and permutation schema}, journal = {Secur. Commun. Networks}, volume = {8}, number = {2}, pages = {110--121}, year = {2015}, url = {https://doi.org/10.1002/sec.962}, doi = {10.1002/SEC.962}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/NazariEM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/NiaAR15, author = {Mehran Alidoost Nia and Reza Ebrahimi Atani and Antonio Ruiz{-}Mart{\'{\i}}nez}, title = {Privacy enhancement in anonymous network channels using multimodality injection}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2917--2932}, year = {2015}, url = {https://doi.org/10.1002/sec.1219}, doi = {10.1002/SEC.1219}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/NiaAR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/NobarN15, author = {Sina Khoshabi Nobar and Javad Musevi Niya}, title = {Robust mitigation of selfish misbehavior in wireless networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {9}, pages = {1772--1779}, year = {2015}, url = {https://doi.org/10.1002/sec.1141}, doi = {10.1002/SEC.1141}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/NobarN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/OdeluDG15, author = {Vanga Odelu and Ashok Kumar Das and Adrijit Goswami}, title = {A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {9}, pages = {1732--1751}, year = {2015}, url = {https://doi.org/10.1002/sec.1139}, doi = {10.1002/SEC.1139}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/OdeluDG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/OdeluDG15a, author = {Vanga Odelu and Ashok Kumar Das and Adrijit Goswami}, title = {An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4136--4156}, year = {2015}, url = {https://doi.org/10.1002/sec.1330}, doi = {10.1002/SEC.1330}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/OdeluDG15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/PandaAP15, author = {Mrutyunjaya Panda and Ajith Abraham and Manas Ranjan Patra}, title = {Hybrid intelligent systems for detecting network intrusions}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2741--2749}, year = {2015}, url = {https://doi.org/10.1002/sec.592}, doi = {10.1002/SEC.592}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/PandaAP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/PandianR15, author = {K. K. Soundra Pandian and Kailash Chandra Ray}, title = {Non-singular sequence folding-based pseudorandom key generation algorithm for cryptographic processor}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4019--4027}, year = {2015}, url = {https://doi.org/10.1002/sec.1318}, doi = {10.1002/SEC.1318}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/PandianR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/PasalicBD15, author = {Enes Pasalic and Samed Bajric and Milan Djordjevic}, title = {On cross-correlation properties of S-boxes and their design using semi-bent functions}, journal = {Secur. Commun. Networks}, volume = {8}, number = {5}, pages = {790--800}, year = {2015}, url = {https://doi.org/10.1002/sec.1035}, doi = {10.1002/SEC.1035}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/PasalicBD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/PaulauskasB15, author = {Nerijus Paulauskas and Azuolas Faustas Bagdonas}, title = {Local outlier factor use for the network flow anomaly detection}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4203--4212}, year = {2015}, url = {https://doi.org/10.1002/sec.1335}, doi = {10.1002/SEC.1335}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/PaulauskasB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Picazo-SanchezO15, author = {Pablo Picazo{-}Sanchez and Lara Ortiz{-}Martin and Pedro Peris{-}Lopez and Nasour Bagheri}, title = {Weaknesses of fingerprint-based mutual authentication protocol}, journal = {Secur. Commun. Networks}, volume = {8}, number = {12}, pages = {2124--2134}, year = {2015}, url = {https://doi.org/10.1002/sec.1161}, doi = {10.1002/SEC.1161}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Picazo-SanchezO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/PraveenkumarATR15, author = {Padmapriya Praveenkumar and Rengarajan Amirtharajan and Karuppuswamy Thenmozhi and John Bosco Balaguru Rayappan}, title = {Triple chaotic image scrambling on {RGB} - a random image encryption approach}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3335--3345}, year = {2015}, url = {https://doi.org/10.1002/sec.1257}, doi = {10.1002/SEC.1257}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/PraveenkumarATR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/PsaroudakisKE15, author = {Ioannis Psaroudakis and Vasilios Katos and Pavlos S. Efraimidis}, title = {A novel mechanism for anonymizing Global System for Mobile Communications calls using a resource-based Session Initiation Protocol community network}, journal = {Secur. Commun. Networks}, volume = {8}, number = {3}, pages = {486--500}, year = {2015}, url = {https://doi.org/10.1002/sec.995}, doi = {10.1002/SEC.995}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/PsaroudakisKE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/QiL15, author = {Ping Qi and Long{-}shu Li}, title = {A fault recovery-based scheduling algorithm for cloud service reliability}, journal = {Secur. Commun. Networks}, volume = {8}, number = {5}, pages = {703--714}, year = {2015}, url = {https://doi.org/10.1002/sec.1017}, doi = {10.1002/SEC.1017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/QiL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/QinCHHC15, author = {Chuan Qin and Chin{-}Chen Chang and Gwoboa Horng and Ying{-}Hsuan Huang and Yen{-}Chang Chen}, title = {Reversible data embedding for vector quantization compressed images using search-order coding and index parity matching}, journal = {Secur. Commun. Networks}, volume = {8}, number = {6}, pages = {899--906}, year = {2015}, url = {https://doi.org/10.1002/sec.1046}, doi = {10.1002/SEC.1046}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/QinCHHC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/QuZZM15, author = {Buyun Qu and Zhibin Zhang and Xingquan Zhu and Dan Meng}, title = {An empirical study of morphing on behavior-based network traffic classification}, journal = {Secur. Commun. Networks}, volume = {8}, number = {1}, pages = {68--79}, year = {2015}, url = {https://doi.org/10.1002/sec.755}, doi = {10.1002/SEC.755}, timestamp = {Tue, 18 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/QuZZM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/RabiehMAA15, author = {Khaled Rabieh and Mohamed M. E. A. Mahmoud and Marianne Azer and Mahmoud Allam}, title = {A secure and privacy-preserving event reporting scheme for vehicular Ad Hoc networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {3271--3281}, year = {2015}, url = {https://doi.org/10.1002/sec.1251}, doi = {10.1002/SEC.1251}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/RabiehMAA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/RafeH15, author = {Vahid Rafe and Ramin Hosseinpouri}, title = {A security framework for developing service-oriented software architectures}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {2957--2972}, year = {2015}, url = {https://doi.org/10.1002/sec.1222}, doi = {10.1002/SEC.1222}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/RafeH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/RamanauskaiteGC15, author = {Simona Ramanauskaite and Nikolaj Goranin and Antanas Cenys and Jonas Juknius}, title = {Modelling influence of Botnet features on effectiveness of DDoS attacks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {12}, pages = {2090--2101}, year = {2015}, url = {https://doi.org/10.1002/sec.1156}, doi = {10.1002/SEC.1156}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/RamanauskaiteGC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/RaoD15, author = {Y. Sreenivasa Rao and Ratna Dutta}, title = {Fully secure bandwidth-efficient anonymous ciphertext-policy attribute-based encryption}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4157--4176}, year = {2015}, url = {https://doi.org/10.1002/sec.1331}, doi = {10.1002/SEC.1331}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/RaoD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/RashwanWWH15, author = {Abdelnaser Rashwan and Honggang Wang and Dalei Wu and Xinming Huang}, title = {Security-quality aware routing for wireless multimedia sensor networks using secret sharing}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2798--2812}, year = {2015}, url = {https://doi.org/10.1002/sec.1203}, doi = {10.1002/SEC.1203}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/RashwanWWH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/RavariF15, author = {Ali Noorollahi Ravari and Mehran S. Fallah}, title = {A nonmonotonic modal authorization logic for pervasive computing}, journal = {Secur. Commun. Networks}, volume = {8}, number = {6}, pages = {1077--1091}, year = {2015}, url = {https://doi.org/10.1002/sec.1063}, doi = {10.1002/SEC.1063}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/RavariF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/RenugadeviM15, author = {N. Renugadevi and C. Mala}, title = {Pruned nodes in ternary key tree during batch rekeying in group key agreement for cognitive radio ad hoc networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4289--4307}, year = {2015}, url = {https://doi.org/10.1002/sec.1342}, doi = {10.1002/SEC.1342}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/RenugadeviM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Rey15, author = {{\'{A}}ngel Mart{\'{\i}}n del Rey}, title = {Mathematical modeling of the propagation of malware: a review}, journal = {Secur. Commun. Networks}, volume = {8}, number = {15}, pages = {2561--2579}, year = {2015}, url = {https://doi.org/10.1002/sec.1186}, doi = {10.1002/SEC.1186}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Rey15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/RezaeiHS15, author = {Fahimeh Rezaei and Michael Hempel and Hamid Sharif}, title = {A novel automated framework for modeling and evaluating covert channel algorithms}, journal = {Secur. Commun. Networks}, volume = {8}, number = {4}, pages = {649--660}, year = {2015}, url = {https://doi.org/10.1002/sec.1013}, doi = {10.1002/SEC.1013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/RezaeiHS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/RifaiCV15, author = {Mayssaa El Rifai and Kam Wai Clifford Chan and Pramode K. Verma}, title = {Multi-stage quantum secure communication using polarization hopping}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4333--4342}, year = {2015}, url = {https://doi.org/10.1002/sec.1364}, doi = {10.1002/SEC.1364}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/RifaiCV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/RottondiSVK15, author = {Cristina Rottondi and Marco Savi and Giacomo Verticale and Christoph Krau{\ss}}, title = {Mitigation of peer-to-peer overlay attacks in the automatic metering infrastructure of smart grids}, journal = {Secur. Commun. Networks}, volume = {8}, number = {3}, pages = {343--359}, year = {2015}, url = {https://doi.org/10.1002/sec.983}, doi = {10.1002/SEC.983}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/RottondiSVK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SairamRS15, author = {Ashok Singh Sairam and Sangita Roy and Rishikesh Sahay}, title = {Coloring networks for attacker identification and response}, journal = {Secur. Commun. Networks}, volume = {8}, number = {5}, pages = {751--768}, year = {2015}, url = {https://doi.org/10.1002/sec.1022}, doi = {10.1002/SEC.1022}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SairamRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SallayB15, author = {Hassen Sallay and Sami Bourouis}, title = {Intrusion detection alert management for high-speed networks: current researches and applications}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4362--4372}, year = {2015}, url = {https://doi.org/10.1002/sec.1366}, doi = {10.1002/SEC.1366}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SallayB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SanchezBSG15, author = {Ignacio Sanchez and Gianmarco Baldini and David Shaw and Raimondo Giuliani}, title = {Experimental passive eavesdropping of Digital Enhanced Cordless Telecommunication voice communications through low-cost software-defined radios}, journal = {Secur. Commun. Networks}, volume = {8}, number = {3}, pages = {403--417}, year = {2015}, url = {https://doi.org/10.1002/sec.989}, doi = {10.1002/SEC.989}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SanchezBSG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SantisMP15, author = {Alfredo De Santis and Giancarlo De Maio and Umberto Ferraro Petrillo}, title = {Using {HTML5} to prevent detection of drive-by-download web malware}, journal = {Secur. Commun. Networks}, volume = {8}, number = {7}, pages = {1237--1255}, year = {2015}, url = {https://doi.org/10.1002/sec.1077}, doi = {10.1002/SEC.1077}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SantisMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Sen15, author = {Sevil Sen}, title = {Sequence-based masquerade detection for different user groups}, journal = {Secur. Commun. Networks}, volume = {8}, number = {7}, pages = {1265--1278}, year = {2015}, url = {https://doi.org/10.1002/sec.1080}, doi = {10.1002/SEC.1080}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/Sen15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Seo0CK15, author = {Hwajeong Seo and Zhe Liu and Jongseok Choi and Howon Kim}, title = {Karatsuba-Block-Comb technique for elliptic curve cryptography over binary fields}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {3121--3130}, year = {2015}, url = {https://doi.org/10.1002/sec.1237}, doi = {10.1002/SEC.1237}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/Seo0CK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Seo0CK15a, author = {Hwajeong Seo and Zhe Liu and Jongseok Choi and Howon Kim}, title = {Optimized Karatsuba squaring on 8-bit {AVR} processors}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3546--3554}, year = {2015}, url = {https://doi.org/10.1002/sec.1279}, doi = {10.1002/SEC.1279}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/Seo0CK15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShaoY15, author = {Zhi{-}Yi Shao and Bo Yang}, title = {Private set intersection via public key encryption with keywords search}, journal = {Secur. Commun. Networks}, volume = {8}, number = {3}, pages = {396--402}, year = {2015}, url = {https://doi.org/10.1002/sec.988}, doi = {10.1002/SEC.988}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShaoY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShehadehH15, author = {Youssef El Hajj Shehadeh and Dieter Hogrefe}, title = {A survey on secret key generation mechanisms on the physical layer in wireless networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {2}, pages = {332--341}, year = {2015}, url = {https://doi.org/10.1002/sec.973}, doi = {10.1002/SEC.973}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShehadehH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShenHLY15, author = {Yao Shen and Liusheng Huang and Xiaorong Lu and Wei Yang}, title = {A novel comprehensive steganalysis of transmission control protocol/Internet protocol covert channels based on protocol behaviors and support vector machine}, journal = {Secur. Commun. Networks}, volume = {8}, number = {7}, pages = {1279--1290}, year = {2015}, url = {https://doi.org/10.1002/sec.1081}, doi = {10.1002/SEC.1081}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShenHLY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShiHSS15, author = {Danping Shi and Lei Hu and Ling Song and Siwei Sun}, title = {Differential fault attack on Zorro block cipher}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2826--2835}, year = {2015}, url = {https://doi.org/10.1002/sec.1207}, doi = {10.1002/SEC.1207}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShiHSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShiZCZ15, author = {Runhua Shi and Hong Zhong and Jie Cui and Shun Zhang}, title = {A novel one-to-many and many-to-one asymmetric encryption model and its algorithms}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3906--3913}, year = {2015}, url = {https://doi.org/10.1002/sec.1309}, doi = {10.1002/SEC.1309}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShiZCZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShinK15, author = {Young{-}joo Shin and Kwangjo Kim}, title = {Differentially private client-side data deduplication protocol for cloud storage services}, journal = {Secur. Commun. Networks}, volume = {8}, number = {12}, pages = {2114--2123}, year = {2015}, url = {https://doi.org/10.1002/sec.1159}, doi = {10.1002/SEC.1159}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShinK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShinKFC15, author = {Jiyoung Shin and S. Kancharlapalli and Michael Farcasin and Eric Chan{-}Tin}, title = {SmartPass: a smarter geolocation-based authentication scheme}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3927--3938}, year = {2015}, url = {https://doi.org/10.1002/sec.1311}, doi = {10.1002/SEC.1311}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShinKFC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShinMGR15, author = {Youngsang Shin and Steven A. Myers and Minaxi Gupta and Predrag Radivojac}, title = {A link graph-based approach to identify forum spam}, journal = {Secur. Commun. Networks}, volume = {8}, number = {2}, pages = {176--188}, year = {2015}, url = {https://doi.org/10.1002/sec.970}, doi = {10.1002/SEC.970}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShinMGR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShuangZS15, author = {Kai Shuang and Peng Zhang and Sen Su}, title = {Comb: a resilient and efficient two-hop lookup service for distributed communication system}, journal = {Secur. Commun. Networks}, volume = {8}, number = {10}, pages = {1890--1903}, year = {2015}, url = {https://doi.org/10.1002/sec.1031}, doi = {10.1002/SEC.1031}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShuangZS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SibomanaTT15, author = {Louis Sibomana and Hung Tran and Quang Anh Tran}, title = {Impact of secondary user communication on security communication of primary user}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4177--4190}, year = {2015}, url = {https://doi.org/10.1002/sec.1333}, doi = {10.1002/SEC.1333}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SibomanaTT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Simsek15, author = {Mehmet Simsek}, title = {A new metric for flow-level filtering of low-rate DDoS attacks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3815--3825}, year = {2015}, url = {https://doi.org/10.1002/sec.1302}, doi = {10.1002/SEC.1302}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Simsek15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SinghG15, author = {Reena Singh and Timothy A. Gonsalves}, title = {A pragmatic approach towards secure sharing of digital objects}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3914--3926}, year = {2015}, url = {https://doi.org/10.1002/sec.1310}, doi = {10.1002/SEC.1310}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SinghG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SinghS15, author = {Rajeev Singh and Teek Parval Sharma}, title = {On the {IEEE} 802.11i security: a denial-of-service perspective}, journal = {Secur. Commun. Networks}, volume = {8}, number = {7}, pages = {1378--1407}, year = {2015}, url = {https://doi.org/10.1002/sec.1079}, doi = {10.1002/SEC.1079}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SinghS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SipahiDO15, author = {Devrim Sipahi and G{\"{o}}khan Dalkili{\c{c}} and Mehmet Hilal {\"{O}}zcanhan}, title = {Detecting spam through their Sender Policy Framework records}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3555--3563}, year = {2015}, url = {https://doi.org/10.1002/sec.1280}, doi = {10.1002/SEC.1280}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/SipahiDO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SmaouiOZH15, author = {Salima Smaoui and Mohammad S. Obaidat and Faouzi Zarai and Kuei{-}Fang Hsiao}, title = {A new secure and efficient scheme for network mobility management}, journal = {Secur. Commun. Networks}, volume = {8}, number = {7}, pages = {1360--1377}, year = {2015}, url = {https://doi.org/10.1002/sec.1090}, doi = {10.1002/SEC.1090}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SmaouiOZH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SommestadF15, author = {Teodor Sommestad and Ulrik Franke}, title = {A test of intrusion alert filtering based on network information}, journal = {Secur. Commun. Networks}, volume = {8}, number = {13}, pages = {2291--2301}, year = {2015}, url = {https://doi.org/10.1002/sec.1173}, doi = {10.1002/SEC.1173}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SommestadF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SongLLL15, author = {Yun Song and Zhihui Li and Yongming Li and Jing Li}, title = {A new multi-use multi-secret sharing scheme based on the duals of minimal linear codes}, journal = {Secur. Commun. Networks}, volume = {8}, number = {2}, pages = {202--211}, year = {2015}, url = {https://doi.org/10.1002/sec.972}, doi = {10.1002/SEC.972}, timestamp = {Thu, 15 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/SongLLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/StuartP15, author = {Celine Mary Stuart and Deepthi P. Pattathil}, title = {A novel low-complexity scheme for improving security of NLFG-based symmetric key cryptosystem using secure concatenated {RS-QCLDPC} code}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2888--2900}, year = {2015}, url = {https://doi.org/10.1002/sec.1215}, doi = {10.1002/SEC.1215}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/StuartP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SuWSR15, author = {Jinshu Su and Xiaofeng Wang and Weisong Shi and Indrakshi Ray}, title = {Security, trust, and resilience of distributed networks and systems}, journal = {Secur. Commun. Networks}, volume = {8}, number = {10}, pages = {1829--1830}, year = {2015}, url = {https://doi.org/10.1002/sec.1276}, doi = {10.1002/SEC.1276}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SuWSR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SuY15, author = {Sheng Su and Haijie Yu}, title = {Secure and efficient data collection in wireless image sensor network based on ellipse batch dispersive routing}, journal = {Secur. Commun. Networks}, volume = {8}, number = {14}, pages = {2420--2430}, year = {2015}, url = {https://doi.org/10.1002/sec.792}, doi = {10.1002/SEC.792}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SuY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SuZLW15, author = {Xin Su and Dafang Zhang and Wenjia Li and Xiaofei Wang}, title = {AndroGenerator: An automated and configurable android app network traffic generation system}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4273--4288}, year = {2015}, url = {https://doi.org/10.1002/sec.1341}, doi = {10.1002/SEC.1341}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SuZLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SucasasARMRVTG15, author = {Victor Sucasas and Saud Althunibat and Ayman Radwan and Hugo Marques and Jonathan Rodriguez and Seiamak Vahid and Rahim Tafazolli and Fabrizio Granelli}, title = {Lightweight security against combined {IE} and {SSDF} attacks in cooperative spectrum sensing for cognitive radio networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3978--3994}, year = {2015}, url = {https://doi.org/10.1002/sec.1315}, doi = {10.1002/SEC.1315}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SucasasARMRVTG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SunMZZ15, author = {Xuebin Sun and Shuang Men and Chenglin Zhao and Zheng Zhou}, title = {A security authentication scheme in machine-to-machine home network service}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2678--2686}, year = {2015}, url = {https://doi.org/10.1002/sec.551}, doi = {10.1002/SEC.551}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SunMZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SunRQ15, author = {Songlin Sun and Bo Rong and Yi Qian}, title = {Artificial frequency selective channel for covert cyclic delay diversity orthogonal frequency division multiplexing transmission}, journal = {Secur. Commun. Networks}, volume = {8}, number = {9}, pages = {1707--1716}, year = {2015}, url = {https://doi.org/10.1002/sec.1118}, doi = {10.1002/SEC.1118}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SunRQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SunW15, author = {Yi Sun and Qiaoyan Wen}, title = {A general two-party bi-input private function evaluation protocol}, journal = {Secur. Commun. Networks}, volume = {8}, number = {15}, pages = {2536--2544}, year = {2015}, url = {https://doi.org/10.1002/sec.1197}, doi = {10.1002/SEC.1197}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SunW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SunWZJ15, author = {Haiyan Sun and Qiaoyan Wen and Hua Zhang and Zhengping Jin}, title = {A strongly secure identity-based authenticated key agreement protocol without pairings under the {GDH} assumption}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {3167--3179}, year = {2015}, url = {https://doi.org/10.1002/sec.1241}, doi = {10.1002/SEC.1241}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SunWZJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SzalachowskiK15, author = {Pawel Szalachowski and Tiffany Hyun{-}Jin Kim}, title = {Secure broadcast in distributed networks with strong adversaries}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3739--3750}, year = {2015}, url = {https://doi.org/10.1002/sec.1296}, doi = {10.1002/SEC.1296}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SzalachowskiK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TanHJ15, author = {Hailun Tan and Wen Hu and Sanjay Jha}, title = {A remote attestation protocol with Trusted Platform Modules (TPMs) in wireless sensor networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {13}, pages = {2171--2188}, year = {2015}, url = {https://doi.org/10.1002/sec.1162}, doi = {10.1002/SEC.1162}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/TanHJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TaoA15, author = {Li Tao and Hu Aiqun}, title = {Efficient trust chain model based on turing machine}, journal = {Secur. Commun. Networks}, volume = {8}, number = {1}, pages = {2--12}, year = {2015}, url = {https://doi.org/10.1002/sec.808}, doi = {10.1002/SEC.808}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/TaoA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TaoZCLWH15, author = {Jun Tao and Limin Zhu and Le Chang and Jin Liu and Xiaoxiao Wang and Yaodan Hu}, title = {Joint anti-attack scheme for channel assignment in multi-radio multi-channel wireless mesh networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {13}, pages = {2302--2316}, year = {2015}, url = {https://doi.org/10.1002/sec.1176}, doi = {10.1002/SEC.1176}, timestamp = {Wed, 14 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/TaoZCLWH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TengW15, author = {Jikai Teng and Chuankun Wu}, title = {A collusion attack on asymmetric group key exchange}, journal = {Secur. Commun. Networks}, volume = {8}, number = {13}, pages = {2189--2193}, year = {2015}, url = {https://doi.org/10.1002/sec.1163}, doi = {10.1002/SEC.1163}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/TengW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ThanikaiselvanA15, author = {V. Thanikaiselvan and Pachiyappan Arulmozhivarman}, title = {{RAND} - {STEG:} an integer wavelet transform domain digital image random steganography using knight's tour}, journal = {Secur. Commun. Networks}, volume = {8}, number = {13}, pages = {2374--2382}, year = {2015}, url = {https://doi.org/10.1002/sec.1185}, doi = {10.1002/SEC.1185}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ThanikaiselvanA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ThayananthanAQ15, author = {Vijey Thayananthan and Ahmed Alzahrani and Muhammad Shuaib Qureshi}, title = {Efficient techniques of key management and quantum cryptography in {RFID} networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {4}, pages = {589--597}, year = {2015}, url = {https://doi.org/10.1002/sec.1005}, doi = {10.1002/SEC.1005}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ThayananthanAQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TianGAYZZ15, author = {Feng Tian and Xiaolin Gui and Jian An and Pan Yang and Xuejun Zhang and Jianqiang Zhao}, title = {A DCT-based privacy-preserving approach for efficient data mining}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3641--3652}, year = {2015}, url = {https://doi.org/10.1002/sec.1287}, doi = {10.1002/SEC.1287}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/TianGAYZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TianH15, author = {Miaomiao Tian and Liusheng Huang}, title = {Certificateless and certificate-based signatures from lattices}, journal = {Secur. Commun. Networks}, volume = {8}, number = {8}, pages = {1575--1586}, year = {2015}, url = {https://doi.org/10.1002/sec.1105}, doi = {10.1002/SEC.1105}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/TianH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TianHWSW15, author = {Xiuxia Tian and Ling Huang and Yong Wang and Chaofeng Sha and Xiaoling Wang}, title = {DualAcE: fine-grained dual access control enforcement with multi-privacy guarantee in DaaS}, journal = {Secur. Commun. Networks}, volume = {8}, number = {8}, pages = {1494--1508}, year = {2015}, url = {https://doi.org/10.1002/sec.1098}, doi = {10.1002/SEC.1098}, timestamp = {Wed, 20 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/TianHWSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Toorani15, author = {Mohsen Toorani}, title = {Cryptanalysis of a new protocol of wide use for email with perfect forward secrecy}, journal = {Secur. Commun. Networks}, volume = {8}, number = {4}, pages = {694--701}, year = {2015}, url = {https://doi.org/10.1002/sec.1018}, doi = {10.1002/SEC.1018}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Toorani15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Torrano-Gimenez15, author = {Carmen Torrano{-}Gimenez and Hai Thanh Nguyen and Gonzalo {\'{A}}lvarez and Katrin Franke}, title = {Combining expert knowledge with automatic feature extraction for reliable web attack detection}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2750--2767}, year = {2015}, url = {https://doi.org/10.1002/sec.603}, doi = {10.1002/SEC.603}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Torrano-Gimenez15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TsaiL15, author = {Jia{-}Lun Tsai and Nai{-}Wei Lo}, title = {Secure chaotic maps-based authenticated key agreement protocol without smartcard for multi-server environments}, journal = {Secur. Commun. Networks}, volume = {8}, number = {11}, pages = {1971--1978}, year = {2015}, url = {https://doi.org/10.1002/sec.1145}, doi = {10.1002/SEC.1145}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/TsaiL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TsaiS15, author = {Chien{-}Hua Tsai and Pin{-}Chang Su}, title = {Multi-document threshold signcryption scheme}, journal = {Secur. Commun. Networks}, volume = {8}, number = {13}, pages = {2244--2256}, year = {2015}, url = {https://doi.org/10.1002/sec.1169}, doi = {10.1002/SEC.1169}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/TsaiS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TsaiTH15, author = {Tung{-}Tso Tsai and Yuh{-}Min Tseng and Sen{-}Shan Huang}, title = {Efficient revocable certificateless public key encryption with a delegated revocation authority}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3713--3725}, year = {2015}, url = {https://doi.org/10.1002/sec.1294}, doi = {10.1002/SEC.1294}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/TsaiTH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TsengTH15, author = {Yuh{-}Min Tseng and Tung{-}Tso Tsai and Sen{-}Shan Huang}, title = {Enhancement on strongly secure group key agreement}, journal = {Secur. Commun. Networks}, volume = {8}, number = {2}, pages = {126--135}, year = {2015}, url = {https://doi.org/10.1002/sec.964}, doi = {10.1002/SEC.964}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/TsengTH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TzangCT15, author = {Yih{-}Jou Tzang and Hong{-}Yi Chang and Chih{-}Hsuan Tzang}, title = {Enhancing the performance and security against media-access-control table overflow vulnerability attacks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {9}, pages = {1780--1793}, year = {2015}, url = {https://doi.org/10.1002/sec.1142}, doi = {10.1002/SEC.1142}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/TzangCT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/VasudevanS15, author = {Alampallam Ramaswamy Vasudevan and Subramanian Selvakumar}, title = {Intraclass and interclass correlation coefficient-based feature selection in {NIDS} dataset}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3441--3458}, year = {2015}, url = {https://doi.org/10.1002/sec.1269}, doi = {10.1002/SEC.1269}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/VasudevanS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/VermaH15, author = {Karan Verma and Halabi Hasbullah}, title = {Bloom-filter based {IP-CHOCK} detection scheme for denial of service attacks in {VANET}}, journal = {Secur. Commun. Networks}, volume = {8}, number = {5}, pages = {864--878}, year = {2015}, url = {https://doi.org/10.1002/sec.1043}, doi = {10.1002/SEC.1043}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/VermaH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangC15, author = {Qingbin Wang and Shaozhen Chen}, title = {Attribute-based signature for threshold predicates from lattices}, journal = {Secur. Commun. Networks}, volume = {8}, number = {5}, pages = {811--821}, year = {2015}, url = {https://doi.org/10.1002/sec.1038}, doi = {10.1002/SEC.1038}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangCXL15, author = {Shengbao Wang and Zhenfu Cao and Qi Xie and Wenhao Liu}, title = {Practical identity-based encryption in multiple private key generator {(PKG)} environments}, journal = {Secur. Commun. Networks}, volume = {8}, number = {1}, pages = {43--50}, year = {2015}, url = {https://doi.org/10.1002/sec.743}, doi = {10.1002/SEC.743}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangCXL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangL15, author = {Yulong Wang and Yi Li}, title = {An efficient and tunable matrix-disguising method toward privacy-preserving computation}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {3099--3110}, year = {2015}, url = {https://doi.org/10.1002/sec.1235}, doi = {10.1002/SEC.1235}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangLMWZ15, author = {Xin Wang and Qilian Liang and Jiasong Mu and Wei Wang and Baoju Zhang}, title = {Physical layer security in wireless smart grid}, journal = {Secur. Commun. Networks}, volume = {8}, number = {14}, pages = {2431--2439}, year = {2015}, url = {https://doi.org/10.1002/sec.751}, doi = {10.1002/SEC.751}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangLMWZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangLWC15, author = {Xing{-}Tian Wang and Mingchu Li and Szu{-}Ting Wang and Chin{-}Chen Chang}, title = {Reversible data hiding exploiting high-correlation regulation for high-quality images}, journal = {Secur. Commun. Networks}, volume = {8}, number = {7}, pages = {1408--1421}, year = {2015}, url = {https://doi.org/10.1002/sec.1083}, doi = {10.1002/SEC.1083}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangLWC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangMZ15, author = {Cong Wang and Maode Ma and Zenghua Zhao}, title = {An enhanced authentication protocol for WRANs in {TV} white space}, journal = {Secur. Commun. Networks}, volume = {8}, number = {13}, pages = {2267--2278}, year = {2015}, url = {https://doi.org/10.1002/sec.1171}, doi = {10.1002/SEC.1171}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangMZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangWLYLY15, author = {Qiuhua Wang and Xiaojun Wang and Qiuyun Lv and Xueyi Ye and Yi Luo and Lin You}, title = {Analysis of the information theoretically secret key agreement by public discussion}, journal = {Secur. Commun. Networks}, volume = {8}, number = {15}, pages = {2507--2523}, year = {2015}, url = {https://doi.org/10.1002/sec.1192}, doi = {10.1002/SEC.1192}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangWLYLY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangWS0X15, author = {Yilei Wang and Duncan S. Wong and Willy Susilo and Xiaofeng Chen and Qiuliang Xu}, title = {Achieving fairness by sequential equilibrium in rational two-party computation under incomplete information}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3690--3700}, year = {2015}, url = {https://doi.org/10.1002/sec.1292}, doi = {10.1002/SEC.1292}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangWS0X15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangWZX15, author = {Yilei Wang and Duncan S. Wong and Chuan Zhao and Qiuliang Xu}, title = {Fair two-party computation with rational parties holding private types}, journal = {Secur. Commun. Networks}, volume = {8}, number = {2}, pages = {284--297}, year = {2015}, url = {https://doi.org/10.1002/sec.979}, doi = {10.1002/SEC.979}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangWZX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangXZLD15, author = {Jian Wang and Yiwen Xu and Jindong Zhang and Yanheng Liu and Weiwen Deng}, title = {{SAV4AV:} securing authentication and verification for ad hoc vehicles}, journal = {Secur. Commun. Networks}, volume = {8}, number = {4}, pages = {626--636}, year = {2015}, url = {https://doi.org/10.1002/sec.1011}, doi = {10.1002/SEC.1011}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangXZLD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangYL15, author = {Shyh{-}Yih Wang and Wu{-}Chuan Yang and Ying{-}Jen Lin}, title = {Balanced double subset difference broadcast encryption scheme}, journal = {Secur. Commun. Networks}, volume = {8}, number = {8}, pages = {1447--1460}, year = {2015}, url = {https://doi.org/10.1002/sec.1093}, doi = {10.1002/SEC.1093}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangYL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangZDL15, author = {Xin Wang and Lijun Zhang and Amit Deokar and Qilian Liang}, title = {Enhanced security and reliability with {MIMO} communications for smart grid}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2723--2729}, year = {2015}, url = {https://doi.org/10.1002/sec.585}, doi = {10.1002/SEC.585}, timestamp = {Thu, 16 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/WangZDL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangZL15, author = {Feng Wang and You{-}sheng Zhou and Dao{-}feng Li}, title = {Dynamic threshold changeable multi-policy secret sharing scheme}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3653--3658}, year = {2015}, url = {https://doi.org/10.1002/sec.1288}, doi = {10.1002/SEC.1288}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangZL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangZN15, author = {Shuzhen Wang and Zonghua Zhang and Farid Na{\"{\i}}t{-}Abdesselam}, title = {Towards cross-layer approaches to coping with misbehavior in mobile ad hoc networks: an anatomy of reputation systems}, journal = {Secur. Commun. Networks}, volume = {8}, number = {2}, pages = {232--244}, year = {2015}, url = {https://doi.org/10.1002/sec.976}, doi = {10.1002/SEC.976}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangZN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WeiPBHM15, author = {Lili Wei and Dimitrios A. Pados and Stella N. Batalama and Rose Qingyang Hu and Michael J. Medley}, title = {Optimal multiuser spread-spectrum data hiding in digital images}, journal = {Secur. Commun. Networks}, volume = {8}, number = {4}, pages = {540--549}, year = {2015}, url = {https://doi.org/10.1002/sec.1001}, doi = {10.1002/SEC.1001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WeiPBHM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WenWLXZW15, author = {Sheng Wen and Di Wu and Ping Li and Yang Xiang and Wanlei Zhou and Guiyi Wei}, title = {Detecting stepping stones by abnormal causality probability}, journal = {Secur. Commun. Networks}, volume = {8}, number = {10}, pages = {1831--1844}, year = {2015}, url = {https://doi.org/10.1002/sec.1037}, doi = {10.1002/SEC.1037}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WenWLXZW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WojtowiczO15, author = {Wioletta W{\'{o}}jtowicz and Marek R. Ogiela}, title = {Biometric watermarks based on face recognition methods for authentication of digital images}, journal = {Secur. Commun. Networks}, volume = {8}, number = {9}, pages = {1672--1687}, year = {2015}, url = {https://doi.org/10.1002/sec.1114}, doi = {10.1002/SEC.1114}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WojtowiczO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WuCBGC15, author = {Jianliang Wu and Tingting Cui and Tao Ban and Shanqing Guo and Lizhen Cui}, title = {PaddyFrog: systematically detecting confused deputy vulnerability in Android applications}, journal = {Secur. Commun. Networks}, volume = {8}, number = {13}, pages = {2338--2349}, year = {2015}, url = {https://doi.org/10.1002/sec.1179}, doi = {10.1002/SEC.1179}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WuCBGC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WuXKLA15, author = {Fan Wu and Lili Xu and Saru Kumari and Xiong Li and Abdulhameed Alelaiwi}, title = {A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3847--3863}, year = {2015}, url = {https://doi.org/10.1002/sec.1305}, doi = {10.1002/SEC.1305}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WuXKLA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WuZ15, author = {Songyang Wu and Yong Zhang}, title = {Secure cloud storage using anonymous and blackbox traceable data access control}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4308--4318}, year = {2015}, url = {https://doi.org/10.1002/sec.1343}, doi = {10.1002/SEC.1343}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WuZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WuZRWY15, author = {Yue Wu and Yimeng Zhao and Michel Riguidel and Guanghao Wang and Ping Yi}, title = {Security and trust management in opportunistic networks: a survey}, journal = {Secur. Commun. Networks}, volume = {8}, number = {9}, pages = {1812--1827}, year = {2015}, url = {https://doi.org/10.1002/sec.1116}, doi = {10.1002/SEC.1116}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WuZRWY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WuZSL15, author = {Xueping Wu and Dafang Zhang and Xin Su and Wenwei Li}, title = {Detect repackaged Android application based on {HTTP} traffic similarity}, journal = {Secur. Commun. Networks}, volume = {8}, number = {13}, pages = {2257--2266}, year = {2015}, url = {https://doi.org/10.1002/sec.1170}, doi = {10.1002/SEC.1170}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WuZSL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/XuW15, author = {Lili Xu and Fan Wu}, title = {An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity}, journal = {Secur. Commun. Networks}, volume = {8}, number = {2}, pages = {245--260}, year = {2015}, url = {https://doi.org/10.1002/sec.977}, doi = {10.1002/SEC.977}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/XuW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/XueS15, author = {L. Xue and Guozi Sun}, title = {Design and implementation of a malware detection system based on network behavior}, journal = {Secur. Commun. Networks}, volume = {8}, number = {3}, pages = {459--470}, year = {2015}, url = {https://doi.org/10.1002/sec.993}, doi = {10.1002/SEC.993}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/XueS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YajamMS15, author = {Habib Allah Yajam and Javad Mohajeri and Mahmoud Salmasizadeh}, title = {Identity-based universal re-encryption for mixnets}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {2992--3001}, year = {2015}, url = {https://doi.org/10.1002/sec.1226}, doi = {10.1002/SEC.1226}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YajamMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YanLFPS15, author = {Guanglu Yan and Senlin Luo and Fan Feng and Limin Pan and Qamas Gul Khan Safi}, title = {{MOSKG:} countering kernel rootkits with a secure paging mechanism}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3580--3591}, year = {2015}, url = {https://doi.org/10.1002/sec.1282}, doi = {10.1002/SEC.1282}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YanLFPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YanTY15, author = {Danfeng Yan and Yuan Tian and Fangchun Yang}, title = {Privacy-preserving authorization method for mashups}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4421--4435}, year = {2015}, url = {https://doi.org/10.1002/sec.1322}, doi = {10.1002/SEC.1322}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YanTY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YanWDYY15, author = {Jianhua Yan and Licheng Wang and Mianxiong Dong and Yixian Yang and Wenbin Yao}, title = {Identity-based signcryption from lattices}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3751--3770}, year = {2015}, url = {https://doi.org/10.1002/sec.1297}, doi = {10.1002/SEC.1297}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YanWDYY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Yang15, author = {Zheng Yang}, title = {A new efficient signcryption scheme in the standard model}, journal = {Secur. Commun. Networks}, volume = {8}, number = {5}, pages = {778--789}, year = {2015}, url = {https://doi.org/10.1002/sec.1034}, doi = {10.1002/SEC.1034}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Yang15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Yang15a, author = {Zheng Yang}, title = {An efficient strongly secure authenticated key exchange protocol without random oracles}, journal = {Secur. Commun. Networks}, volume = {8}, number = {8}, pages = {1461--1473}, year = {2015}, url = {https://doi.org/10.1002/sec.1095}, doi = {10.1002/SEC.1095}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Yang15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Yang15b, author = {Zheng Yang}, title = {On constructing practical multi-recipient key-encapsulation with short ciphertext and public key}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4191--4202}, year = {2015}, url = {https://doi.org/10.1002/sec.1334}, doi = {10.1002/SEC.1334}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Yang15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YangHLWJP15, author = {Longqi Yang and Guyu Hu and Dong Li and Yibing Wang and Bo Jia and Zhisong Pan}, title = {Anomaly detection based on efficient Euclidean projection}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {3229--3237}, year = {2015}, url = {https://doi.org/10.1002/sec.1247}, doi = {10.1002/SEC.1247}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YangHLWJP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YangLZWJ15, author = {Anjia Yang and Kaitai Liang and Yunhui Zhuang and Duncan S. Wong and Xiaohua Jia}, title = {A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2836--2849}, year = {2015}, url = {https://doi.org/10.1002/sec.1208}, doi = {10.1002/SEC.1208}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/YangLZWJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YangMZ15, author = {Xiaopeng Yang and Wenping Ma and Chengli Zhang}, title = {Group authenticated key exchange schemes via learning with errors}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {3142--3156}, year = {2015}, url = {https://doi.org/10.1002/sec.1239}, doi = {10.1002/SEC.1239}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YangMZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YangRM15, author = {Chao Yang and Jian Ren and Jianfeng Ma}, title = {Provable ownership of files in deduplication cloud storage}, journal = {Secur. Commun. Networks}, volume = {8}, number = {14}, pages = {2457--2468}, year = {2015}, url = {https://doi.org/10.1002/sec.784}, doi = {10.1002/SEC.784}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YangRM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YangY15, author = {Zheng Yang and Wu Yang}, title = {A practical strongly secure one-round authenticated key exchange protocol without random oracles}, journal = {Secur. Commun. Networks}, volume = {8}, number = {6}, pages = {1118--1131}, year = {2015}, url = {https://doi.org/10.1002/sec.1067}, doi = {10.1002/SEC.1067}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YangY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YangYZZ15, author = {Zheng Yang and Wu Yang and Lingyun Zhu and Daigu Zhang}, title = {Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3356--3371}, year = {2015}, url = {https://doi.org/10.1002/sec.1263}, doi = {10.1002/SEC.1263}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YangYZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YangZ15, author = {Jun{-}Po Yang and Wei{-}Guo Zhang}, title = {Generating highly nonlinear resilient Boolean functions resistance against algebraic and fast algebraic attacks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {7}, pages = {1256--1264}, year = {2015}, url = {https://doi.org/10.1002/sec.1078}, doi = {10.1002/SEC.1078}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YangZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YapLTG15, author = {Wun{-}She Yap and Joseph K. Liu and Syh{-}Yuan Tan and Bok{-}Min Goi}, title = {On the security of a lightweight authentication and encryption scheme for mobile ad hoc network}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {3094--3098}, year = {2015}, url = {https://doi.org/10.1002/sec.1234}, doi = {10.1002/SEC.1234}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YapLTG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YasudaS15, author = {Masaya Yasuda and Yuka Sugimura}, title = {Biometric key-binding using lattice masking\({}^{\mbox{\emph{{\textdagger}}}}\)}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3405--3414}, year = {2015}, url = {https://doi.org/10.1002/sec.1267}, doi = {10.1002/SEC.1267}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YasudaS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YasudaSKYK15, author = {Masaya Yasuda and Takeshi Shimoyama and Jun Kogure and Kazuhiro Yokoyama and Takeshi Koshiba}, title = {New packing method in somewhat homomorphic encryption and its applications}, journal = {Secur. Commun. Networks}, volume = {8}, number = {13}, pages = {2194--2213}, year = {2015}, url = {https://doi.org/10.1002/sec.1164}, doi = {10.1002/SEC.1164}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YasudaSKYK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YeQH15, author = {Feng Ye and Yi Qian and Rose Qingyang Hu}, title = {HIBaSS: hierarchical identity-based signature scheme for {AMI} downlink transmission}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2901--2908}, year = {2015}, url = {https://doi.org/10.1002/sec.1217}, doi = {10.1002/SEC.1217}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YeQH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YinS15, author = {Xin Yin and Yaqiu Sun}, title = {Secure and efficient integration of big data for multi-cells based on micro images}, journal = {Secur. Commun. Networks}, volume = {8}, number = {14}, pages = {2411--2415}, year = {2015}, url = {https://doi.org/10.1002/sec.778}, doi = {10.1002/SEC.778}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YinS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YuGGBG15, author = {Wei Yu and David W. Griffith and Linqiang Ge and Sulabh Bhattarai and Nada Golmie}, title = {An integrated detection system against false data injection attacks in the Smart Grid}, journal = {Secur. Commun. Networks}, volume = {8}, number = {2}, pages = {91--109}, year = {2015}, url = {https://doi.org/10.1002/sec.957}, doi = {10.1002/SEC.957}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YuGGBG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YuLZ15, author = {Qihong Yu and Jiguo Li and Yichen Zhang}, title = {Leakage-resilient certificate-based encryption}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3346--3355}, year = {2015}, url = {https://doi.org/10.1002/sec.1258}, doi = {10.1002/SEC.1258}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YuLZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YuanL15, author = {Shitong Yuan and Jing Liang}, title = {Energy efficient comparator for successive approximation register ADCs with application to encryption schemes in wireless communication}, journal = {Secur. Commun. Networks}, volume = {8}, number = {14}, pages = {2440--2446}, year = {2015}, url = {https://doi.org/10.1002/sec.797}, doi = {10.1002/SEC.797}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YuanL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZakeriDA15, author = {Mohaddeseh Zakeri and Fatemeh Faraji Daneshgar and Maghsoud Abbaspour}, title = {A static heuristic approach to detecting malware targets}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {3015--3027}, year = {2015}, url = {https://doi.org/10.1002/sec.1228}, doi = {10.1002/SEC.1228}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZakeriDA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZengXC15, author = {Lei Zeng and Yang Xiao and Hui Chen}, title = {Auditing overhead, auditing adaptation, and benchmark evaluation in Linux}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3523--3534}, year = {2015}, url = {https://doi.org/10.1002/sec.1277}, doi = {10.1002/SEC.1277}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/ZengXC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangFZLL15, author = {Gefei Zhang and Dan Fan and Yuqing Zhang and Xiaowei Li and Xuefeng Liu}, title = {A privacy preserving authentication scheme for roaming services in global mobility networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2850--2859}, year = {2015}, url = {https://doi.org/10.1002/sec.1209}, doi = {10.1002/SEC.1209}, timestamp = {Fri, 03 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/ZhangFZLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangGF15, author = {Kai Zhang and Jie Guan and Xuliang Fei}, title = {Improved conditional differential cryptanalysis}, journal = {Secur. Commun. Networks}, volume = {8}, number = {9}, pages = {1801--1811}, year = {2015}, url = {https://doi.org/10.1002/sec.1144}, doi = {10.1002/SEC.1144}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangGF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangHML15, author = {Zhenzhen Zhang and Jianjun Hou and Qinglong Ma and Zhaohong Li}, title = {Efficient video frame insertion and deletion detection based on inconsistency of correlations between local binary pattern coded frames}, journal = {Secur. Commun. Networks}, volume = {8}, number = {2}, pages = {311--320}, year = {2015}, url = {https://doi.org/10.1002/sec.981}, doi = {10.1002/SEC.981}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangHML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangL0M15, author = {Baoju Zhang and Qing Lei and Wei Wang and Jiasong Mu}, title = {Distributed video coding of secure compressed sensing}, journal = {Secur. Commun. Networks}, volume = {8}, number = {14}, pages = {2416--2419}, year = {2015}, url = {https://doi.org/10.1002/sec.828}, doi = {10.1002/SEC.828}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangL0M15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangMY15, author = {Junwei Zhang and Jianfeng Ma and Chao Yang}, title = {Protocol Derivation System for the Needham-Schroeder family}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2687--2703}, year = {2015}, url = {https://doi.org/10.1002/sec.565}, doi = {10.1002/SEC.565}, timestamp = {Wed, 03 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/ZhangMY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangT15, author = {Jianhong Zhang and Wenjing Tang}, title = {On the security of Kim \emph{et al}. two ID-based broadcast signcryption schemes}, journal = {Secur. Commun. Networks}, volume = {8}, number = {8}, pages = {1509--1514}, year = {2015}, url = {https://doi.org/10.1002/sec.1099}, doi = {10.1002/SEC.1099}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangWK15, author = {Wenfang Zhang and Xiaomin Wang and Muhammad Khurram Khan}, title = {A virtual bridge certificate authority-based cross-domain authentication mechanism for distributed collaborative manufacturing systems}, journal = {Secur. Commun. Networks}, volume = {8}, number = {6}, pages = {937--951}, year = {2015}, url = {https://doi.org/10.1002/sec.1051}, doi = {10.1002/SEC.1051}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangWK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangWWMZ15, author = {Zhenbin Zhang and Liji Wu and An Wang and Zhaoli Mu and Xiangmin Zhang}, title = {A novel bit scalable leakage model based on genetic algorithm}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3896--3905}, year = {2015}, url = {https://doi.org/10.1002/sec.1308}, doi = {10.1002/SEC.1308}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangWWMZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangXTF15, author = {Hongli Zhang and Dongliang Xu and Zhihong Tian and Yujian Fan}, title = {An efficient parallel algorithm for exact multi-pattern matching}, journal = {Secur. Commun. Networks}, volume = {8}, number = {9}, pages = {1688--1697}, year = {2015}, url = {https://doi.org/10.1002/sec.1115}, doi = {10.1002/SEC.1115}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangXTF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangYW15, author = {Hao Zhang and Nenghai Yu and Yonggang Wen}, title = {Mobile cloud computing based privacy protection in location-based information survey applications}, journal = {Secur. Commun. Networks}, volume = {8}, number = {6}, pages = {1006--1025}, year = {2015}, url = {https://doi.org/10.1002/sec.1055}, doi = {10.1002/SEC.1055}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangYW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangZF15, author = {Hailong Zhang and Yongbin Zhou and Dengguo Feng}, title = {Mahalanobis distance similarity measure based distinguisher for template attack}, journal = {Secur. Commun. Networks}, volume = {8}, number = {5}, pages = {769--777}, year = {2015}, url = {https://doi.org/10.1002/sec.1033}, doi = {10.1002/SEC.1033}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangZF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangZPLW15, author = {Yujin Zhang and Chenglin Zhao and Yiming Pi and Shenghong Li and Shilin Wang}, title = {Image-splicing forgery detection based on local binary patterns of {DCT} coefficients}, journal = {Secur. Commun. Networks}, volume = {8}, number = {14}, pages = {2386--2395}, year = {2015}, url = {https://doi.org/10.1002/sec.721}, doi = {10.1002/SEC.721}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangZPLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangZZ15, author = {Min Zhang and Jiashu Zhang and Ying Zhang}, title = {Remote three-factor authentication scheme based on Fuzzy extractors}, journal = {Secur. Commun. Networks}, volume = {8}, number = {4}, pages = {682--693}, year = {2015}, url = {https://doi.org/10.1002/sec.1016}, doi = {10.1002/SEC.1016}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhaoJZDX15, author = {Kao Zhao and Hai Jin and Deqing Zou and Weiqi Dai and Yang Xiang}, title = {A privacy-preserving location tracking system for smartphones based on cloud storage}, journal = {Secur. Commun. Networks}, volume = {8}, number = {3}, pages = {446--458}, year = {2015}, url = {https://doi.org/10.1002/sec.992}, doi = {10.1002/SEC.992}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhaoJZDX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhaoLYL15, author = {Tong Zhao and Shanbo Lu and Wei Yan and Xiaoming Li}, title = {A connectivity resilient dynamic multi-channel assignment method for {VANET}}, journal = {Secur. Commun. Networks}, volume = {8}, number = {10}, pages = {1855--1864}, year = {2015}, url = {https://doi.org/10.1002/sec.1032}, doi = {10.1002/SEC.1032}, timestamp = {Tue, 17 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/ZhaoLYL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhaoSLS15, author = {Guangyao Zhao and Bing Sun and Chao Li and Jinshu Su}, title = {Truncated differential cryptanalysis of {PRINCE}}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2875--2887}, year = {2015}, url = {https://doi.org/10.1002/sec.1213}, doi = {10.1002/SEC.1213}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/ZhaoSLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhaoXZQF15, author = {Shijun Zhao and Li Xi and Qianying Zhang and Yu Qin and Dengguo Feng}, title = {Security analysis of {SM2} key exchange protocol in {TPM2.0}}, journal = {Secur. Commun. Networks}, volume = {8}, number = {3}, pages = {383--395}, year = {2015}, url = {https://doi.org/10.1002/sec.987}, doi = {10.1002/SEC.987}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhaoXZQF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhengYC15, author = {Hongying Zheng and Quan Yuan and Jianyong Chen}, title = {A framework for protecting personal information and privacy}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2867--2874}, year = {2015}, url = {https://doi.org/10.1002/sec.1212}, doi = {10.1002/SEC.1212}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhengYC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhengZ15, author = {Lei Zheng and Shao{-}Wu Zhang}, title = {FFT-based multidimensional linear attack on {PRESENT} using the 2-bit-fixed characteristic}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3535--3545}, year = {2015}, url = {https://doi.org/10.1002/sec.1278}, doi = {10.1002/SEC.1278}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhengZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhenhuaJB15, author = {Liao Zhenhua and Wang Jinmiao and Lang Bo}, title = {A ciphertext-policy hidden vector encryption scheme supporting multiuser keyword search}, journal = {Secur. Commun. Networks}, volume = {8}, number = {6}, pages = {879--887}, year = {2015}, url = {https://doi.org/10.1002/sec.1044}, doi = {10.1002/SEC.1044}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhenhuaJB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Zhioua15, author = {Sami Zhioua}, title = {The web browser factor in traffic analysis attacks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4227--4241}, year = {2015}, url = {https://doi.org/10.1002/sec.1338}, doi = {10.1002/SEC.1338}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Zhioua15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhongZPW15, author = {Zhen Zhong and Chenglin Zhao and Yiming Pi and Lingming Wang}, title = {Security assurance in wireless acoustic sensors via event forecasting and detection}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2671--2677}, year = {2015}, url = {https://doi.org/10.1002/sec.538}, doi = {10.1002/SEC.538}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhongZPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Zhu15, author = {Hongfeng Zhu}, title = {One-time identity-password authenticated key agreement scheme based on biometrics}, journal = {Secur. Commun. Networks}, volume = {8}, number = {13}, pages = {2350--2360}, year = {2015}, url = {https://doi.org/10.1002/sec.1182}, doi = {10.1002/SEC.1182}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Zhu15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Zhu15a, author = {Hongfeng Zhu}, title = {Cryptanalysis and provable improvement of a chaotic maps-based mobile dynamic {ID} authenticated key agreement scheme}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {2981--2991}, year = {2015}, url = {https://doi.org/10.1002/sec.1225}, doi = {10.1002/SEC.1225}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Zhu15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhuLZL15, author = {Hui Zhu and Xiaodong Lin and Yun Zhang and Rongxing Lu}, title = {Duth: a user-friendly dual-factor authentication for Android smartphone devices}, journal = {Secur. Commun. Networks}, volume = {8}, number = {7}, pages = {1213--1222}, year = {2015}, url = {https://doi.org/10.1002/sec.1075}, doi = {10.1002/SEC.1075}, timestamp = {Tue, 21 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/ZhuLZL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhuMZ15, author = {Yuesheng Zhu and Limin Ma and Jinjiang Zhang}, title = {An enhanced Kerberos protocol with non-interactive zero-knowledge proof}, journal = {Secur. Commun. Networks}, volume = {8}, number = {6}, pages = {1108--1117}, year = {2015}, url = {https://doi.org/10.1002/sec.1066}, doi = {10.1002/SEC.1066}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhuMZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhuWLXZC15, author = {Hong Zhu and Zhipeng Wang and Kevin L{\"{u}} and Meiyi Xie and Xiang Zou and Bing Chen}, title = {A distributed scheme for row-based computational private information retrieval}, journal = {Secur. Commun. Networks}, volume = {8}, number = {8}, pages = {1537--1546}, year = {2015}, url = {https://doi.org/10.1002/sec.1102}, doi = {10.1002/SEC.1102}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/ZhuWLXZC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZibidehM15, author = {Walid Y. Zibideh and Mustafa M. Matalgah}, title = {Modified data encryption standard encryption algorithm with improved error performance and enhanced security in wireless fading channels}, journal = {Secur. Commun. Networks}, volume = {8}, number = {4}, pages = {565--573}, year = {2015}, url = {https://doi.org/10.1002/sec.1003}, doi = {10.1002/SEC.1003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZibidehM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZouZL15, author = {Shihong Zou and Jing Zhang and Xiaodong Lin}, title = {An effective behavior-based Android malware detection system}, journal = {Secur. Commun. Networks}, volume = {8}, number = {12}, pages = {2079--2089}, year = {2015}, url = {https://doi.org/10.1002/sec.1155}, doi = {10.1002/SEC.1155}, timestamp = {Thu, 23 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/ZouZL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZubaSPCZ15, author = {Michael Zuba and Zhijie Shi and Zheng Peng and Jun{-}Hong Cui and Shengli Zhou}, title = {Vulnerabilities of underwater acoustic networks to denial-of-service jamming attacks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2635--2645}, year = {2015}, url = {https://doi.org/10.1002/sec.507}, doi = {10.1002/SEC.507}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZubaSPCZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZubairKM15, author = {Muhammad Zubair and Xiangwei Kong and Saeed Mahfooz}, title = {{DMAM:} distributed mobility and authentication mechanism in next generation networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {5}, pages = {845--863}, year = {2015}, url = {https://doi.org/10.1002/sec.1041}, doi = {10.1002/SEC.1041}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZubairKM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.