default search action
Security and Communication Networks, Volume 4
Volume 4, Number 1, January 2011
- Guojun Wang, Laurence Tianruo Yang, Kouichi Sakurai:
Guest editorial: Trusted computing and communications. 1-2
- Huiyun Li, Keke Wu, Fengqi Yu:
Enhanced correlation power analysis attack against trusted systems. 3-10 - Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao:
Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks. 11-22 - Neyire Deniz Sarier:
A new biometric identity based encryption scheme secure against DoS attacks. 23-32 - Benfano Soewito, Lucas Vespa, Ning Weng, Haibo Wang:
Hybrid pattern matching for trusted intrusion detection. 33-43 - Antonio Muñoz, Antonio Maña:
TPM-based protection for mobile agents. 45-60 - Yizhi Ren, Mingchu Li, Kouichi Sakurai:
FineTrust: a fine-grained trust model for peer-to-peer networks. 61-69 - Pei-Te Chen, Chi-Sung Laih:
A challenge-based trust establishment protocol for peer-to-peer networks. 71-78 - Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl:
Enhancing identity trust in cryptographic key management systems for dynamic environments. 79-94 - A. Srinivasan, F. Li, J. Wu:
Secure reputation monitoring system - a novel connected dominating set-based framework for WSNs. 95-108
Volume 4, Number 2, February 2011
- Tran Thanh Dai, Johnson I. Agbinya:
Combating key-swapping collusion attack on random pairwise key pre-distribution schemes for wireless sensor networks. 109-121 - Jun Shao, Zhenfu Cao, Peng Liu:
SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption. 122-135 - Khaled Salah, Karim Sattar, Mohammed H. Sqalli, Ehab Al-Shaer:
A potential low-rate DoS attack against network firewalls. 136-146 - Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis:
Synthesis of attack actions using model checking for the verification of security protocols. 147-161 - Ashok Kumar Das:
An efficient random key distribution scheme for large-scale distributed sensor networks. 162-180 - N. K. Sreelaja, G. A. Vijayalakshmi Pai:
Swarm intelligence based key generation for stream cipher. 181-194 - Carlisle Adams:
Achieving non-transferability in credential systems using hidden biometrics. 195-206 - Mohsen Toorani, Abolfazl Falahati:
A secure cryptosystem based on affine transformation. 207-215 - Suleyman Kondakci, Cemali Dinçer:
Internet epidemiology: healthy, susceptible, infected, quarantined, and recovered. 216-238
Volume 4, Number 3, March 2011
- Matteo Cesana, Azzedine Boukerche, Albert Y. Zomaya:
Security for QoS assured wireless and mobile networks. 239-241
- Fabio Martignon, Stefano Paris, Antonio Capone:
DSA-Mesh: a distributed security architecture for wireless mesh networks. 242-256 - Thomas Gamer, Lars Völker, Martina Zitterbart:
Differentiated security in wireless mesh networks. 257-266 - Rodolphe Marques, Edgar Araújo, André Zúquete:
Fast 802.11 handovers with 802.1X reauthentications. 267-283 - Soufiene Djahel, Farid Naït-Abdesselam, Damla Turgut:
Characterizing the greedy behavior in wireless ad hoc networks. 284-298 - Gabriele Cecchetti, Anna Lina Ruscelli:
Real-time support for HCCA function in IEEE 802.11e networks: a performance evaluation. 299-315 - Soon-Young Oh, Gustavo Marfia, Mario Gerla:
MANET QoS support without reservations. 316-328 - Dario Rossi, Roberta Fracchia, Michela Meo:
On the quality of broadcast services in vehicular ad hoc networks. 329-346
Volume 4, Number 4, April 2011
- Quoc-Cuong Le, Patrick Bellot:
A novel approach to build QKD relaying models. 347-356 - Jieyan Fan, Dapeng Wu, Antonio Nucci, Ram Keralapura, Lixin Gao:
Protocol oblivious classification of multimedia traffic. 357-371 - Fang Qi, Zhe Tang, Guojun Wang, Jie Wu:
SSL-enabled trusted communication: Spoofing and protecting the non-cautious users. 372-383 - Sourour Meharouech, Adel Bouhoula, Tarek Abbes:
Trusted intrusion detection architecture for high-speed networks based on traffic classification, load balancing and high availability mechanism. 384-394
- Shao-Hsiu Hung, Jui-Hung Yeh, Jyh-Cheng Chen:
sRAMP: secure reconfigurable architecture and mobility platform. 395-409
- Subrat Kumar Dash, Krupa Sagar Reddy, Arun K. Pujari:
Adaptive Naive Bayes method for masquerade detection. 410-417 - Sandeep K. Sood, Anil Kumar Sarje, Kuldip Singh:
Dynamic identity-based single password anti-phishing protocol. 418-427 - Franjieh El Khoury, Marcel Egea, Nada Meskaoui, Nagi Wakim:
An iris recognition model for secured access to data. 428-435 - Han-Ching Wu, Shou-Hsuan Stephen Huang:
Packet-based algorithms for stepping-stone detection with chaff perturbation. 436-446 - Sana Hoor Arisar, Andrew H. Kemp:
A comprehensive investigation of secure location estimation techniques for WSN applications. 447-459 - Hongyan Yao:
Role-based authentication protocol. 460-470 - Rajadurai Rajavelsamy, Jicheol Lee, Sungho Choi:
Towards security architecture for Home (evolved) NodeB: challenges, requirements and solutions. 471-481
Volume 4, Number 5, May 2011
- Jiankun Hu, Vijayakumar Bhagavatula, Mohammed Bennamoun, Kar-Ann Toh:
Biometric security for mobile computing. 483-486
- Kai Xi, Tohari Ahmad, Fengling Han, Jiankun Hu:
A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment. 487-499 - Byounggyu Choi, Youngsung Kim, Kar-Ann Toh:
Fusion of visual and infrared face verification systems. 500-514 - Fahim K. Sufi, Fengling Han, Ibrahim Khalil, Jiankun Hu:
A chaos-based encryption technique to protect ECG packets for time critical telecardiology applications. 515-524 - Foteini Agrafioti, Francis Minhthang Bui, Dimitrios Hatzinakos:
Medical biometrics in mobile health monitoring. 525-539 - Hwee Keong Lam, Zujun Hou, Wei-Yun Yau, Tai Pang Chen, Jun Li, K. Y. Sim:
A topological interpretation of fingerprint reference point. 540-547 - Julien Bringer, Hervé Chabanne, Bruno Kindarji:
Identification with encrypted biometric data. 548-562 - Arathi Arakala, Kathy J. Horadam, Jason Jeffers, Serdar Boztas:
Protection of minutiae-based templates using biocryptographic constructs in the set difference metric. 563-576 - S. M. Prasad, V. K. Govindan, P. S. Sathidevi:
Palmprint authentication using fusion of wavelet and contourlet features. 577-590 - Zujun Hou, Wei-Yun Yau, Yue Wang:
A review on fingerprint orientation estimation. 591-599
Volume 4, Number 6, June 2011
- Lu Xiao, Gregory G. Rose:
Attacks on a lightweight cipher based on a multiple recursive generator. 601-607 - Georgios Androulidakis, Symeon Papavassiliou:
Two-stage selective sampling for anomaly detection: analysis and evaluation. 608-621 - Xia Yin, Zhiliang Wang, Chuanming Jing, Jianping Wu:
A formal approach to robustness testing of network protocol with time constraints. 622-632 - Divya Muthukumaran, Joshua Schiffman, Mohamed Hassan, Anuj Sawani, Vikhyath Rao, Trent Jaeger:
Protecting the integrity of trusted applications in mobile phone systems. 633-650
- Ahmad Samer Wazan, Romain Laborde, François Barrère, Abdelmalek Benzekri:
A formal model of trust for calculating the quality of X.509 certificate. 651-665
- Sudip Misra, P. Venkata Krishna, Kiran Isaac Abraham:
A stochastic learning automata-based solution for intrusion detection in vehicular ad hoc networks. 666-677 - Xiaodong Lin:
A provably secure threshold signature scheme based on DDH assumption. 678-684 - Wen Gu, Pramode K. Verma, Stamatios V. Kartalopoulos:
A unified security framework for WiMAX over EPON access networks. 685-696 - Abdelrahman Desoky:
Matlist: Mature linguistic steganography methodology. 697-718 - Patrick Traynor, Chaitrali Amrutkar, Vikhyath Rao, Trent Jaeger, Patrick D. McDaniel, Thomas La Porta:
From mobile phones to responsible devices. 719-726
Volume 4, Number 7, July 2011
- Naveen K. Chilamkurti, Ben Soh, Tai-Hoon Kim:
Special issue on security and privacy in wireless systems. 727-728 - Leonidas Kazatzopoulos, Constantinos Delakouridis, Giannis F. Marias:
A privacy-aware overlay routing scheme in WSNs. 729-743 - Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini:
Secure topology maintenance and events collection in WSNs. 744-762 - Avinash Srinivasan:
SecLoc - secure localization in WSNs using CDS. 763-770 - Zhengming Li, Chunxiao Chigan:
RAMV: ensuring resource-aware message verification in VANETs. 771-784 - Hesiri Weerasinghe, Raymond Tackett, Huirong Fu:
Verifying position and velocity for vehicular ad-hoc networks. 785-791
Volume 4, Number 8, August 2011
- Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini:
TOGBAD - an approach to detect routing attacks in tactical environments. 793-806 - Wassim El-Hajj, Hazem M. Hajj, Zouheir Trabelsi, Fadi A. Aloul:
Updating snort with a customized controller to thwart port scanning. 807-814 - Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang:
A robust user authentication scheme with self-certificates for wireless sensor networks. 815-824 - D. A. Knox, C. Adams:
Digital credentials with privacy-preserving delegation. 825-838 - Adel Ali Ahmed, Norsheila Fisal:
Secure real-time routing protocol with load distribution in wireless sensor networks. 839-869 - Lei Wu, Jerome Harrington, Corey Kuwanoe, Cliff Changchun Zou:
Harnessing the power of BitTorrent for distributed denial-of-service attacks. 860-870 - Alexander J. O'Ree, Mohammad S. Obaidat:
Security enhancements for UDDI. 871-887 - Thaier Hayajneh, Razvi Doomun, Prashant Krishnamurthy, David Tipper:
Source - destination obfuscation in wireless ad hocnetworks. 888-901 - Jiankun Hu, Xuan Dau Hoang, Ibrahim Khalil:
An embedded DSP hardware encryption module for secure e-commerce transactions. 902-909 - Ming-Yang Su, Sheng-Cheng Yeh:
A study on the prevention of sniffing nodes in mobile ad hoc networks. 910-918 - Fazirulhisyam Hashim, Abbas Jamalipour:
A generic sampling framework for improving anomaly detection in the next generation network. 919-936 - Haitham Rashwan, Ernst M. Gabidulin, Bahram Honary:
Security of the GPT cryptosystem and its applications to cryptography. 937-946 - Asaf Shabtai, Dennis Potashnik, Yuval Fledel, Robert Moskovitch, Yuval Elovici:
Monitoring, analysis, and filtering system for purifying network traffic of known and unknown malicious content. 947-965 - Yanling Chen, A. J. Han Vinck:
Secrecy coding for the binary symmetric wiretap channel. 966-978
Volume 4, Number 9, September 2011
- Sudip Misra, Mieso K. Denko, Hussein T. Mouftah:
Security challenges in emerging and next-generation wireless communication networks. 979-980 - Padmalochan Bera, Soumya Kanti Ghosh, Pallab Dasgupta:
A WLAN security management framework based on formal spatio-temporal RBAC model. 981-993 - Sandhya Khurana, Neelima Gupta:
End-to-end protocol to secure ad hoc networks against wormhole attacks. 994-1002
- Amit Shirsat, Bharat K. Bhargava:
Local geometric algorithm for hole boundary detection in sensor networks. 1003-1012
- Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, Jinfang Jiang, Lei Shu, Guangjie Han:
An efficient approach of secure group association management in densely deployed heterogeneous distributed sensor network. 1013-1026 - R. Aparna, B. B. Amberker:
An efficient scheme to handle bursty behavior in secure group communication using binomial key trees. 1027-1043 - Hai-Cheng Chu, Der-Jiunn Deng, Han-Chieh Chao:
Digital forensics of WLM 8.1 via check point methodology within corporate intranet in future communication security. 1044-1062 - Jung-Shian Li, Che-Jen Hsieh, Chih-Ying Chang, Naveen K. Chilamkurti:
Improved IPsec performance utilizing transport-layer-aware compression architecture. 1063-1074 - Jahangir H. Sarker, Hussein T. Mouftah:
A self-stabilized random access protocol against denial of service attack in wireless networks. 1075-1087
Volume 4, Number 10, October 2011
- Scott Fowler, Sherali Zeadally, Naveen K. Chilamkurti:
Impact of denial of service solutions on network quality of service. 1089-1103 - Zhen Li, Qi Liao, Andrew Blaich, Aaron Striegel:
Fighting botnets with economic uncertainty. 1104-1113 - Joon S. Park, Gaeil An, Ivy Y. Liu:
Active access control (AAC) with fine-granularity and scalability. 1114-1129 - Hai Huang, Zhenfu Cao:
Authenticated key exchange protocol with enhanced freshness properties. 1130-1136 - Marshall Riley, Kemal Akkaya, Kenny Fong:
A survey of authentication schemes for vehicular ad hoc networks. 1137-1152 - Hai Huang, Zhenfu Cao:
IDOAKE: strongly secure ID-based one-pass authenticated key exchange protocol. 1153-1161 - Thomas E. Carroll, Daniel Grosu:
A game theoretic investigation of deception in network security. 1162-1172 - Hedieh Sajedi, Mansour Jamzad:
HYSA: HYbrid steganographic approach using multiple steganography methods. 1173-1184 - Giovanni Di Crescenzo, Tao Zhang, Stanley Pietrowicz:
Anonymity notions and techniques for public-key infrastructures in vehicular networks. 1185-1198 - Ali Kanso:
Cryptosystems based on continued fractions. 1199-1211 - Vladimir B. Balakirsky, A. J. Han Vinck:
Performance of the verification for binary memoryless channels. 1212-1225
Volume 4, Number 11, November 2011
- Petros Belsis, Dimitris Vassis, Christos Skourlas:
Identifying and utilizing secure paths in ad hoc assistive medical environments. 1231-1242 - Gauri Vakde, Radhika Bibikar, Zhengyi Le, Matthew K. Wright:
EnPassant: anonymous routing for disruption-tolerant networks with applications in assistive environments. 1243-1256 - Oscar García Morchon, Thomas Falck, Klaus Wehrle:
Sensor network security for pervasive e-health. 1257-1273 - Christopher Armbrust, Syed Atif Mehdi, Max Reichardt, Jan Koch, Karsten Berns:
Using an autonomous robot to maintain privacy in assistive environments. 1275-1293 - Thanassis Giannetsos, Tassos Dimitriou, Neeli R. Prasad:
People-centric sensing in assistive healthcare: Privacy challenges and directions. 1295-1307
- Yee Wei Law, Giorgi Moniava, Zheng Gong, Pieter H. Hartel, Marimuthu Palaniswami:
KALwEN: a new practical and interoperable key management scheme for body sensor networks. 1309-1329 - Huawang Qin, Yuewei Dai, Zhiquan Wang:
Identity-based multi-receiver threshold signcryption scheme. 1331-1337 - Neminath Hubballi, Santosh Biswas, Sukumar Nandi:
Network specific false alarm reduction in intrusion detection system. 1339-1349 - Fahim K. Sufi, Ibrahim Khalil, Ibrahim Habib:
Cardioids-based faster authentication and diagnosis of remote cardiovascular patients. 1351-1368
Volume 4, Number 12, December 2011
- Qian Chen, Jun Tian, Lei Yang, Dapeng Wu:
A robust video hash scheme based on 2D-DCT temporal maximum occurrence. 1369-1377 - Lei Yang, Qian Chen, Jun Tian, Dapeng Wu:
Content based image hashing using companding and gray code. 1378-1386 - Mahmoud Mostafa, Anas Abou El Kalam, Mohamed Maachaoui, Noureddine Idboufker:
Specification, implementation and performance evaluation of the QoS-friendly encapsulating security payload (Q-ESP) protocol. 1387-1404 - Hisham Dahshan, James Irvine:
An elliptic curve secret sharing key management scheme for mobile ad hoc networks. 1405-1419 - Mohamed F. Younis, Osama Farrag, Sookyoung Lee, William D'Amico:
Optimized packet formation in multi-level security wireless data acquisition networks. 1420-1439 - Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen:
An efficient and provably secure public key encryption scheme based on coding theory. 1440-1447 - Einar Petana, Sanjeev Kumar:
TCP SYN-based DDoS attack on EKG signals monitored via a wireless sensor network. 1448-1460 - Hui Zhao, Mingchu Li, Xinxin Fan:
A formal separation method of protocols to eliminate parallel attacks in virtual organization. 1461-1468 - Marshall Riley, Kemal Akkaya, Kenny Fong:
Group-based hybrid authentication scheme for cooperative collision warnings in VANETs. 1469-1482 - Xuejiao Liu, Chengfang Fang, Debao Xiao:
Intrusion diagnosis and prediction with expert system. 1483-1494
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.