
Security and Communication Networks, Volume 8
Volume 8, Number 1, January 2015
- Xueqi Cheng, Jinhong Yuan
, Ali Tajer, Aiqun Hu, Wanlei Zhou:
Special issue on recent advances in network and information security - security and communication networks journal. 1
- Li Tao, Hu Aiqun:
Efficient trust chain model based on turing machine. 2-12 - Lei Jiang, Jianlong Tan, Qiu Tang:
An efficient sparse matrix format for accelerating regular expression matching on field-programmable gate arrays. 13-24 - Xian Liu:
Secrecy capacity of wireless channels subject to log-normal fading. 25-35 - Jian Li, DanJie Song, Ruifan Li, Xiaofeng Lu:
A quantum secure direct communication protocol based on four-qubit cluster state. 36-42 - Shengbao Wang, Zhenfu Cao, Qi Xie, Wenhao Liu:
Practical identity-based encryption in multiple private key generator (PKG) environments. 43-50 - Lejun Fan, Yuanzhuo Wang, Xueqi Cheng, Jinming Li, Shuyuan Jin:
Privacy theft malware multi-process collaboration analysis. 51-67 - Buyun Qu, Zhibin Zhang, Xingquan Zhu, Dan Meng:
An empirical study of morphing on behavior-based network traffic classification. 68-79 - Xiang Cui, Lihua Yin, Shuyuan Jin, Zhiyu Hao, Shuhao Li:
Botnet spoofing: fighting botnet with itself. 80-89
Volume 8, Number 2, January 2015
- Wei Yu, David W. Griffith, Linqiang Ge, Sulabh Bhattarai, Nada Golmie:
An integrated detection system against false data injection attacks in the Smart Grid. 91-109 - Sara Nazari, Amir-Masoud Eftekhari-Moghadam
, Mohammad Shahram Moin
:
A novel image steganography scheme based on morphological associative memory and permutation schema. 110-121 - Ji-Jian Chin
, Rouzbeh Behnia, Swee-Huay Heng
, Raphael C.-W. Phan
:
Cryptanalysis of a certificateless identification scheme. 122-125 - Yuh-Min Tseng, Tung-Tso Tsai, Sen-Shan Huang:
Enhancement on strongly secure group key agreement. 126-135 - Niu Liu, Shaohua Tang, Lingling Xu, Daojing He:
Analyses of several recently proposed group key management schemes. 136-148 - Fahad Bin Muhaya:
Cryptanalysis and security enhancement of Zhu's authentication scheme for Telecare medicine information system. 149-158 - Hadi Kaveh, Mohammad Shahram Moin
:
A high-capacity and low-distortion 3D polygonal mesh steganography using surfacelet transform. 159-167 - Shenyun Che, Renjian Feng, Xuan Liang, Xiao Wang:
A lightweight trust management based on Bayesian and Entropy for wireless sensor networks. 168-175 - Youngsang Shin, Steven A. Myers, Minaxi Gupta, Predrag Radivojac:
A link graph-based approach to identify forum spam. 176-188 - Ya-Fen Chang:
A flexible hierarchical access control mechanism enforcing extension policies. 189-201 - Yun Song, Zhihui Li, Yongming Li
, Jing Li:
A new multi-use multi-secret sharing scheme based on the duals of minimal linear codes. 202-211 - Ahmed Moumena, Abdelrezzak Guessoum:
Fast anomaly detection using Boxplot rule for multivariate data in cooperative wideband cognitive radio in the presence of jammer. 212-219 - Tayeb Kenaza, Othmane Nait Hamoud
, Nadia Nouali-Taboudjemat:
Efficient centralized approach to prevent from replication attack in wireless sensor networks. 220-231 - Shuzhen Wang, Zonghua Zhang, Farid Naït-Abdesselam:
Towards cross-layer approaches to coping with misbehavior in mobile ad hoc networks: an anatomy of reputation systems. 232-244 - Lili Xu, Fan Wu:
An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity. 245-260 - Mostafa Mohammadpourfard, Mohammad-Ali Doostari, Mohammad Bagher Ghaznavi Ghoushchi
, Nafiseh Shakiba:
A new secure Internet voting protocol using Java Card 3 technology and Java information flow concept. 261-283 - Yilei Wang, Duncan S. Wong, Chuan Zhao, Qiuliang Xu:
Fair two-party computation with rational parties holding private types. 284-297 - Jiageng Chen, Mohammad Saiful Islam Mamun, Atsuko Miyaji:
An efficient batch verification system and its effect in a real time VANET environment. 298-310 - Zhenzhen Zhang, Jianjun Hou, Qinglong Ma, Zhaohong Li:
Efficient video frame insertion and deletion detection based on inconsistency of correlations between local binary pattern coded frames. 311-320 - Tinu Baby, Aswani Kumar Cherukuri:
On query execution over encrypted data. 321-331
- Youssef El Hajj Shehadeh, Dieter Hogrefe:
A survey on secret key generation mechanisms on the physical layer in wireless networks. 332-341
Volume 8, Number 3, February 2015
- Cristina Rottondi
, Marco Savi
, Giacomo Verticale
, Christoph Krauß:
Mitigation of peer-to-peer overlay attacks in the automatic metering infrastructure of smart grids. 343-359 - Samir Moalla, Maher Rahmouni:
Trust path: a distributed model of search paths of trust in a peer-to-peer system. 360-367 - Mohammad Nauman, Sohail Khan
, Abu Talib Othman, Shahrulniza Musa
:
Realization of a user-centric, privacy preserving permission framework for Android. 368-382 - Shijun Zhao, Li Xi, Qianying Zhang, Yu Qin, Dengguo Feng:
Security analysis of SM2 key exchange protocol in TPM2.0. 383-395 - Zhi-Yi Shao, Bo Yang:
Private set intersection via public key encryption with keywords search. 396-402 - Ignacio Sanchez, Gianmarco Baldini, David Shaw, Raimondo Giuliani:
Experimental passive eavesdropping of Digital Enhanced Cordless Telecommunication voice communications through low-cost software-defined radios. 403-417 - Soumya Maity, Soumya Kanti Ghosh, Ehab Al-Shaer:
PoliCon: a policy conciliation framework for heterogeneous mobile ad hoc networks. 418-430 - Mohammad Ehdaie, Nikolaos Alexiou, Mahmoud Ahmadian-Attari, Mohammad Reza Aref, Panos Papadimitratos:
Key splitting: making random key distribution schemes resistant against node capture. 431-445 - Kao Zhao, Hai Jin, Deqing Zou, Weiqi Dai, Yang Xiang
:
A privacy-preserving location tracking system for smartphones based on cloud storage. 446-458 - L. Xue, Guozi Sun:
Design and implementation of a malware detection system based on network behavior. 459-470 - Kwangsu Lee
, Intae Kim, Seong Oun Hwang:
Privacy preserving revocable predicate encryption revisited. 471-485 - Ioannis Psaroudakis, Vasilios Katos
, Pavlos S. Efraimidis:
A novel mechanism for anonymizing Global System for Mobile Communications calls using a resource-based Session Initiation Protocol community network. 486-500 - Qi Li, Jianfeng Ma, Rui Li, Jinbo Xiong, Ximeng Liu
:
Large universe decentralized key-policy attribute-based encryption. 501-509 - Masoud Afrakhteh, Jeong-A Lee:
Adaptive least significant bit matching revisited with the help of error images. 510-515 - Shakil Ahmed, Khairulmizam Samsudin
, Abdul Rahman Ramli, Fakhrul Zaman Rokhani
:
Advanced Encryption Standard-XTS implementation in field programmable gate array hardware. 516-522
Volume 8, Number 4, March 2015
- Fotios Gogoulos, Anna Antonakopoulou, Georgios V. Lioudakis
, Aziz S. Mousas, Dimitra I. Kaklamani, Iakovos S. Venieris:
An authorization model for cross-enterprise collaborations. 523-539 - Lili Wei, Dimitrios A. Pados, Stella N. Batalama, Rose Qingyang Hu, Michael J. Medley:
Optimal multiuser spread-spectrum data hiding in digital images. 540-549 - Zhengan Huang, Shengli Liu, Kefei Chen:
n-Evasive all-but-many lossy trapdoor function and its constructions. 550-564 - Walid Y. Zibideh, Mustafa M. Matalgah:
Modified data encryption standard encryption algorithm with improved error performance and enhanced security in wireless fading channels. 565-573 - Chin-Chen Chang, Chin-Yu Sun, Ting-Fang Cheng:
A dependable storage service system in cloud environment. 574-588 - Vijey Thayananthan, Ahmed Alzahrani
, Muhammad Shuaib Qureshi:
Efficient techniques of key management and quantum cryptography in RFID networks. 589-597 - Depeng Li, Zeyar Aung
, John R. Williams, Abel Sanchez:
Efficient and fault-diagnosable authentication architecture for AMI in smart grid. 598-616 - Liling Cao, Wancheng Ge:
Analysis and improvement of a multi-factor biometric authentication scheme. 617-625 - Jian Wang, Yiwen Xu, Jindong Zhang, Yanheng Liu, Weiwen Deng:
SAV4AV: securing authentication and verification for ad hoc vehicles. 626-636 - Alekha Kumar Mishra, Ashok Kumar Turuk:
Residual energy-based replica detection scheme for mobile wireless sensor networks. 637-648 - Fahimeh Rezaei, Michael Hempel, Hamid Sharif:
A novel automated framework for modeling and evaluating covert channel algorithms. 649-660 - Fiona Jiazi Liu, Ahmed Refaey, Xianbin Wang
, Helen Tang:
Reliability enhancement for CIR-based physical layer authentication. 661-671 - Zhiqiang Liu, Ya Liu, Qingju Wang, Dawu Gu, Wei Li:
Meet-in-the-middle fault analysis on word-oriented substitution-permutation network block ciphers. 672-681 - Min Zhang, Jiashu Zhang, Ying Zhang:
Remote three-factor authentication scheme based on Fuzzy extractors. 682-693 - Mohsen Toorani
:
Cryptanalysis of a new protocol of wide use for email with perfect forward secrecy. 694-701
Volume 8, Number 5, March 2015
- Ping Qi, Long-shu Li:
A fault recovery-based scheduling algorithm for cloud service reliability. 703-714 - Fu-Hau Hsu, Li-Han Chen
, Chia-Jun Lin:
Defeat scanning worms in cyber warfare. 715-726 - Che-Hung Liu, Jen-Sheng Wang, Chih-Chiang Peng, Joseph Z. Shyu:
Evaluating and selecting the biometrics in network security. 727-739 - Joonsang Baek
, Young-Ji Byon
, Eman Hableel, Mahmoud Al-Qutayri
:
Making air traffic surveillance more reliable: a new authentication framework for automatic dependent surveillance-broadcast (ADS-B) based on online/offline identity-based signature. 740-750 - Ashok Singh Sairam
, Sangita Roy, Rishikesh Sahay:
Coloring networks for attacker identification and response. 751-768 - Hailong Zhang, Yongbin Zhou, Dengguo Feng:
Mahalanobis distance similarity measure based distinguisher for template attack. 769-777 - Zheng Yang
:
A new efficient signcryption scheme in the standard model. 778-789 - Enes Pasalic
, Samed Bajric, Milan Djordjevic:
On cross-correlation properties of S-boxes and their design using semi-bent functions. 790-800 - Kee Sung Kim, Ik Rae Jeong:
A new certificateless signature scheme under enhanced security models. 801-810 - Qingbin Wang, Shaozhen Chen:
Attribute-based signature for threshold predicates from lattices. 811-821 - Mohammad GhasemiGol
, Abbas Ghaemi Bafghi:
E-correlator: an entropy-based alert correlation system. 822-836 - Ilija Basicevic, Stanislav Ocovaj, Miroslav Popovic
:
Evaluation of entropy-based detection of outbound denial-of-service attacks in edge networks. 837-844 - Muhammad Zubair, Xiangwei Kong, Saeed Mahfooz:
DMAM: distributed mobility and authentication mechanism in next generation networks. 845-863 - Karan Verma, Halabi Hasbullah:
Bloom-filter based IP-CHOCK detection scheme for denial of service attacks in VANET. 864-878
Volume 8, Number 6, April 2015
- Liao Zhenhua, Wang Jinmiao, Lang Bo:
A ciphertext-policy hidden vector encryption scheme supporting multiuser keyword search. 879-887 - Guang-Gang Geng
, Xiaodong Lee, Yan-Ming Zhang:
Combating phishing attacks via brand identity and authorization features. 888-898 - Chuan Qin, Chin-Chen Chang, Gwoboa Horng, Ying-Hsuan Huang, Yen-Chang Chen:
Reversible data embedding for vector quantization compressed images using search-order coding and index parity matching. 899-906 - Xiaoming Hu, Jian Wang, Huajie Xu, WenAn Tan:
A short and highly efficient identity-based designated verifier proxy signature scheme. 907-916 - Mahdiyeh Ali Mohammadi, Ali A. Pouyan:
Defense mechanisms against Sybil attack in vehicular ad hoc network. 917-936 - Wenfang Zhang, Xiaomin Wang, Muhammad Khurram Khan:
A virtual bridge certificate authority-based cross-domain authentication mechanism for distributed collaborative manufacturing systems. 937-951 - Yuede Ji, Qiang Li, Yukun He, Dong Guo:
BotCatch: leveraging signature and behavior for bot detection. 952-969 - Chun-Ying Huang
, Ying-Dar Lin, Peng-Yu Liao, Yuan-Cheng Lai:
Stateful traffic replay for web application proxies. 970-981 - Chandramohan Dhasarathan
, Vengattaraman Thirumal
, Dhavachelvan Ponnurangam:
Data privacy breach prevention framework for the cloud service. 982-1005 - Hao Zhang, Nenghai Yu, Yonggang Wen:
Mobile cloud computing based privacy protection in location-based information survey applications. 1006-1025 - Rong Jiang
, Rongxing Lu, Jun Luo, Chengzhe Lai, Xuemin Sherman Shen:
Efficient self-healing group key management with dynamic revocation and collusion resistance for SCADA in smart grid. 1026-1039 - Seyed Hossein Erfani, Hamid Haj Seyyed Javadi
, Amir Masoud Rahmani
:
A dynamic key management scheme for dynamic wireless sensor networks. 1040-1049 - R. Kumar, G. Kousalya:
Transactions based secure routing in wireless networks: a cognitive science approach. 1050-1062 - Mohammad Masdari, Sam Jabbehdari, Jamshid Bagherzadeh:
Secure publish/subscribe-based certificate status validations in mobile ad hoc networks. 1063-1076 - Ali Noorollahi Ravari, Mehran S. Fallah:
A nonmonotonic modal authorization logic for pervasive computing. 1077-1091 - Ismail Adel Al-Taharwa
, Hahn-Ming Lee, Albert B. Jeng, Kuo-Ping Wu, Cheng-Seen Ho, Shyi-Ming Chen
:
JSOD: JavaScript obfuscation detector. 1092-1107 - Yuesheng Zhu, Limin Ma, Jinjiang Zhang:
An enhanced Kerberos protocol with non-interactive zero-knowledge proof. 1108-1117 - Zheng Yang
, Wu Yang:
A practical strongly secure one-round authenticated key exchange protocol without random oracles. 1118-1131 - Tao Feng, Shining Han, Xian Guo, Donglin Ma:
A new method of formalizing anonymity based on protocol composition logic. 1132-1140
- Hani Almimi, Azman Samsudin
, Shahram Jahani:
Elliptic-curve scalar multiplication algorithm using ZOT structure. 1141-1154
Volume 8, Number 7, May 2015
- Fangyong Hou, Hongjun He:
Ultra simple way to encrypt non-volatile main memory. 1155-1168 - Seonho Choi, Kun Sun, Hyeonsang Eom, Edward Jung:
Multi-source broadcast authentication with Combined Key Chains for wireless ad hoc networks. 1169-1178 - Abdelfattah Amamra, Jean-Marc Robert
, Chamseddine Talhi:
Enhancing malware detection for Android systems using a system call filtering and abstraction process. 1179-1192 - Abdelouahid Derhab, Abdelghani Bouras
:
Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems. 1193-1212 - Hui Zhu, Xiaodong Lin, Yun Zhang, Rongxing Lu:
Duth: a user-friendly dual-factor authentication for Android smartphone devices. 1213-1222 - Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo:
A provably secure identity-based proxy ring signature based on RSA. 1223-1236
- Alfredo De Santis, Giancarlo De Maio, Umberto Ferraro Petrillo:
Using HTML5 to prevent detection of drive-by-download web malware. 1237-1255
- Jun-Po Yang, Wei-Guo Zhang:
Generating highly nonlinear resilient Boolean functions resistance against algebraic and fast algebraic attacks. 1256-1264 - Sevil Sen:
Sequence-based masquerade detection for different user groups. 1265-1278 - Yao Shen, Liusheng Huang, Xiaorong Lu, Wei Yang:
A novel comprehensive steganalysis of transmission control protocol/Internet protocol covert channels based on protocol behaviors and support vector machine. 1279-1290 - Le Chen, Rongxing Lu, Khalid Alharbi, Xiaodong Lin, Zhenfu Cao:
ReDD: recommendation-based data dissemination in privacy-preserving mobile social networks. 1291-1305 - Atefeh Asayesh, Mohammad Ali Hadavi, Rasool Jalili:
(t, k)-Hypergraph anonymization: an approach for secure data publishing. 1306-1317 - Sang-Ho Na, Eui-Nam Huh:
A broker-based cooperative security-SLA evaluation methodology for personal cloud computing. 1318-1331 - Chia-Hui Liu, Fong-Qi Lin, Chin-Sheng Chen, Tzer-Shyong Chen:
Design of secure access control scheme for personal health record-based cloud healthcare service. 1332-1346 - Orhan Ermis, Serif Bahtiyar, Emin Anarim, M. Ufuk Çaglayan
:
An improved conference-key agreement protocol for dynamic groups with efficient fault correction. 1347-1359 - Salima Smaoui, Mohammad S. Obaidat
, Faouzi Zarai, Kuei-Fang Hsiao:
A new secure and efficient scheme for network mobility management. 1360-1377
- Rajeev Singh, Teek Parval Sharma:
On the IEEE 802.11i security: a denial-of-service perspective. 1378-1407 - Xing-Tian Wang, Mingchu Li, Szu-Ting Wang, Chin-Chen Chang:
Reversible data hiding exploiting high-correlation regulation for high-quality images. 1408-1421 - Yeu-Pong Lai, Wei-Feng Wu:
The defense in-depth approach to the protection for browsing users against drive-by cache attacks. 1422-1430
Volume 8, Number 8, May 2015
- Yang Ming, Yumin Wang:
Proxy signcryption scheme in the standard model. 1431-1446
- Shyh-Yih Wang, Wu-Chuan Yang, Ying-Jen Lin:
Balanced double subset difference broadcast encryption scheme. 1447-1460 - Zheng Yang
:
An efficient strongly secure authenticated key exchange protocol without random oracles. 1461-1473 - Qingkuan Dong, Wenxiu Ding, Lili Wei:
Improvement and optimized implementation of cryptoGPS protocol for low-cost radio-frequency identification authentication. 1474-1484
- Zhenhua Chen, Shundong Li, Qianhong Wu, Qiong Huang:
A distributed secret share update scheme with public verifiability for ad hoc network. 1485-1493
- XiuXia Tian, Ling Huang, Yong Wang, Chaofeng Sha, Xiaoling Wang:
DualAcE: fine-grained dual access control enforcement with multi-privacy guarantee in DaaS. 1494-1508 - Jianhong Zhang, Wenjing Tang:
On the security of Kim et al. two ID-based broadcast signcryption schemes. 1509-1514 - Masoud Afrakhteh, Jeong-A Lee:
Parallel modular steganography using error images. 1515-1524 - Jinyong Chang, Rui Xue:
Practical key-dependent message chosen-ciphertext security based on decisional composite residuosity and quadratic residuosity assumptions. 1525-1536 - Hong Zhu
, Zhipeng Wang, Kevin Lü
, Meiyi Xie, Xiang Zou, Bing Chen:
A distributed scheme for row-based computational private information retrieval. 1537-1546 - Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman, Kazumasa Omote:
Generic constructions of secure-channel free searchable encryption with adaptive security. 1547-1560 - Tooska Dargahi
, Hamid H. S. Javadi
, Mehdi Hosseinzadeh:
Application-specific hybrid symmetric design of key pre-distribution for wireless sensor networks. 1561-1574 - Miaomiao Tian, Liusheng Huang:
Certificateless and certificate-based signatures from lattices. 1575-1586 - Hassan Asgharian, Ahmad Akbari
, Bijan Raahemi:
Feature engineering for detection of Denial of Service attacks in session initiation protocol. 1587-1601 - Chin-Chen Chang, Hai-Duong Le:
A provably secure smart card-based authenticated group key exchange protocol. 1602-1607 - Chi-Tung Chen, Cheng-Chi Lee
:
A two-factor authentication scheme with anonymity for multi-server environments. 1608-1625
Volume 8, Number 9, June 2015
- Mubashar Khan, Naveed Ahmed Azam:
Right translated AES gray S-boxes. 1627-1635