Volume 5, Number 1, January 2012 Focus on Security and privacy in emerging information technologies
, Jia Ding
: LPA: a new location-based privacy-preserving authentication protocol in VANET.
: The most recent SSL security attacks: origins, implementation, evaluation, and suggested countermeasures.
Volume 5, Number 2, February 2012 Research Articles
Ming Hour Yang
, Hung Yuan Hu
: Protocol for ownership transfer across authorities: with the ability to assign transfer target.
, Xiao-Yan Wang
: Analysis and control stratagems of flash disk virus dynamic propagation model.
Volume 5, Number 3, March 2012
, Dawu Gu
, Lei Zhang
: Security analysis and enhancement for three-party password-based authenticated key exchange protocol.
: Convertible ring signatures with gradual revelation of non-signers.
, Sung Deok Cha
: Threat scenario-based security risk analysis using use case modeling in information systems.
, Randy Goebel
: Adaptive-capacity and robust natural language watermarking for agglutinative languages.
Volume 5, Number 4, April 2012 Research Articles
, Hongmei Sun
: Discovering AODV-based multipath routes in wireless ad hoc networks.
Volume 5, Number 5, May 2012 Research Articles
, Hai Yuan
: Dependability evaluation of integrated circuits at design time against laser fault injection.
Volume 5, Number 6, June 2012 Research Articles
, Nirwan Ansari
: Anti-virus in-the-cloud service: are we ready for the security evolution?
, Huiyun Li
, Dingju Zhu
: Fast and scalable parallel processing of scalar multiplication in elliptic curve cryptosystems.
Volume 5, Number 7, July 2012 Research Articles
, Haifeng Qian
: Practical round-optimal blind signatures without random oracles or non-interactive zero-knowledge proofs.
Volume 5, Number 8, August 2012 Defending Against Insider Threats and Internal Data Leakage
, Yi-Ming Chen
: MalPEFinder: fast and retrospective assessment of data breaches in malware attacks.
Volume 5, Number 9, September 2012 Research Articles
Giannis F. Marias
, João Barros
, Markus Fiedler
, Andreas Fischer
, Harald Hauff
, Ralph Herkenhöner
, Antonio Grillo
, Alessandro Lentini
, Luísa Lima
, Charlott Lorentzen
, Wojciech Mazurczyk
, Hermann de Meer
, Paulo F. Oliveira
, George C. Polyzos
, Enric Pujol
, Krzysztof Szczypiorski
, João P. Vilela
, Tiago T. V. Vinhoza
: Security and privacy issues for the network of the future.
Volume 5, Number 10, October 2012 Next Generation Communication and Network Security Editorial
Special Issue Papers
: Study on the security of the extended version for the ISO/IEC international standardized block cipher SEED.
Volume 5, Number 11, November 2012 Editorial
Special Issue Papers
Muhammad Khurram Khan
, Debiao He
: A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography.
Volume 5, Number 12, December 2012 Research Articles
: Public key encryption supporting plaintext equality test and user-specified authorization.
: Lost audio packets steganography: the first practical evaluation.
, Zhong Chen
, Fagen Li
: Efficient privacy-preserving authentication protocol for vehicular communications with trustworthy.
: Intelligent network security assessment with modeling and analysis of attack patterns.