default search action
Security and Communication Networks, Volume 9
Volume 9, Number 1, January 2016
- Yongming Xie, Yan Zhang:
A secure, service priority-based incentive scheme for delay tolerant networks. 5-18 - Mohsen Toorani:
Cryptanalysis of a robust key agreement based on public key authentication. 19-26 - Mohammad Hossein Faghihi Sereshgi, Mohammad Dakhilalian, Mohsen Shakiba:
Biclique cryptanalysis of MIBS-80 and PRESENT-80 block ciphers. 27-33 - Changhui Hu, Lidong Han, Siu-Ming Yiu:
Efficient and secure multi-functional searchable symmetric encryption schemes. 34-42 - Yushu Zhang, Di Xiao, Kwok-Wo Wong, Jiantao Zhou, Sen Bai, Moting Su:
Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization. 43-53 - Jianhong Zhang, Xubing Zhao, Jian Mao:
Attack on Chen et al.'s certificateless aggregate signature scheme. 54-59 - Xuping Zhang, Feng Ye, Sucheng Fan, Jinghong Guo, Guoliang Xu, Yi Qian:
An adaptive security protocol for a wireless sensor-based monitoring network in smart grid transmission lines. 60-71
Volume 9, Number 2, January 2016
- Edith C. H. Ngai:
On providing sink anonymity for wireless sensor networks. 77-86 - Geoffrey Ottoy, Tom Hamelinckx, Bart Preneel, Lieven De Strycker, Jean-Pierre Goemaere:
On the choice of the appropriate AES data encryption method for ZigBee nodes. 87-93 - Emmanouil Magkos, Panayiotis Kotzanikolaou:
SCN-SI-021 achieving privacy and access control in pervasive computing environments. 94-105 - Jan Vossaert, Jorn Lapon, Bart De Decker, Vincent Naessens:
Symmetric key infrastructure for authenticated key establishment between resource constrained nodes and powerful devices. 106-117 - Krzysztof Szczypiorski, Wojciech Mazurczyk:
Steganography in IEEE 802.11 OFDM symbols. 118-129 - Martin Werner:
Privacy-protected communication for location-based services. 130-138 - Chin-Feng Lee, Chi-Yao Weng, Aneesh Sharma:
Steganographic access control in data hiding using run-length encoding and modulo-operations. 139-148 - Christophe Huygens, Nelson Matthys, Wouter Joosen:
Optimizing resource and data security in shared sensor networks. 149-165 - Zhiwei Wang:
Improvement on the fault-tolerant group key agreement protocol of Zhao et al. 166-170 - Binod Vaidya, Dimitrios Makrakis, Hussein T. Mouftah:
Two-factor mutual authentication with key agreement in wireless sensor networks. 171-183
Volume 9, Number 3, February 2016
- Ki Tak Kim, Jong Hwan Park, Dong Hoon Lee:
Selectively chosen ciphertext security in threshold public-key encryption. 189-200 - Kumar Sridharamurthy, Abhilash Pernaje Govinda, Jyothi D. Gopal, Golla Varaprasad:
Violation detection method for vehicular ad hoc networking. 201-207 - Pedro Javier Fernández Ruiz, Fernando Bernal-Hidalgo, Cristian A. Nieto Guerra, Antonio Fernandez Gómez-Skarmeta:
Mobility and security in a real VANET deployed in a heterogeneous networks. 208-219 - Leron Lightfoot, Yun Li, Jian Ren:
STaR: design and quantitative measurement of source-location privacy for wireless sensor networks. 220-228 - Jian Ren, Yun Li, Tingting Jiang, Tongtong Li:
Anonymous communication in overlay networks. 229-240 - Ming-Huang Guo, Horng-Twu Liaw, Meng-Yu Chiu, Der-Jiunn Deng:
On decentralized group key management mechanism for vehicular ad hoc networks. 241-247 - Jungha Paik, Kwantae Cho, Boo Geum Jung, Dong Hoon Lee:
Client cloud Web service: reducing traffic consumption. 248-261 - Paria Jokar, Nasim Arianpoo, Victor C. M. Leung:
A survey on security issues in smart grids. 262-273
Volume 9, Number 4, March 2016
- Noureddine Chaib, Nasreddine Lagraa, Mohamed Bachir Yagoubi, Abderrahmane Lakas:
SDRP: a secure distributed revocation protocol for vehicular environments. 279-289 - Zhifeng Xiao, Nandhakumar Kathiresshan, Yang Xiao:
A survey of accountability in computer networks and distributed systems. 290-315 - Fernando Sanchez, Zhenhai Duan, Yingfei Dong:
Blocking spam by separating end-user machines from legitimate mail server machines. 316-326 - Tiago A. Almeida, Akebo Yamakami:
Compression-based spam filter. 327-335 - Olivier Thonnard, Pierre-Antoine Vervier, Marc Dacier:
Spammers operations: a multifaceted strategic analysis. 336-356 - Jinwei Wang, Leiming Yan, Jin Han, Yuxiang Wang:
Secure hybrid multibit multiplicative watermarking for media distribution over mobile Internet. 357-365
Volume 9, Number 5, March 2016
- Ji Wu, Wei Wang, Qilian Liang, Xiaorong Wu, Baoju Zhang:
Compressive sensing-based data encryption system with application to sense-through-wall UWB noise radar. 371-379 - Chun-I Fan, Yu-Kuang Liang, Chien-Nan Wu:
Privacy enhancement for fair PayWord-based micropayment. 380-388 - Peter Teufl, Michaela Ferk, Andreas Fitzek, Daniel M. Hein, Stefan Kraxberger, Clemens Orthacker:
Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play). 389-419 - Isaac Woungang, Sanjay Kumar Dhurandher, Mohammad S. Obaidat, Rajender Dheeraj Peddi:
A DSR-based routing protocol for mitigating blackhole attacks on mobile ad hoc networks. 420-428 - Nils Ulltveit-Moe, Vladimir A. Oleshchuk:
Enforcing mobile security with location-aware role-based access control. 429-439 - Geir M. Køien:
A privacy enhanced device access protocol for an IoT context. 440-450
Volume 9, Number 6, April 2016
- Jong Hyuk Park, Stefanos Gritzalis, Bo-Chao Cheng, Ning Zhang:
Challenges and opportunities in next-generation cyberspace security. 455-456
- Yuxue Piao, Jin-Hyuk Jung, Jeong Hyun Yi:
Server-based code obfuscation scheme for APK tamper detection. 457-467 - Wei-Chen Wu, Horng-Twu Liaw:
An authentication, authorization, and accounting mechanism for 3G/WLAN networks. 468-480 - Haider Abbas, Moeen Qaemi Mahmoodzadeh, Farrukh Aslam Khan, Maruf Pasha:
Identifying an OpenID anti-phishing scheme for cyberspace. 481-491 - Aziz Nasridinov, Young-Sik Jeong, JeongYong Byun, Young-Ho Park:
A histogram-based method for efficient detection of rewriting attacks in simple object access protocol messages. 492-499 - Namje Park, Hyo-Chan Bang:
Mobile middleware platform for secure vessel traffic system in IoT service environment. 500-512 - Hisain Elshaafi, Dmitri Botvich:
Optimisation-based collaborative determination of component trustworthiness in service compositions. 513-527 - Jong Hyuk Park, Dohyun Kim, Ji Soo Park, Sangjin Lee:
An enhanced security framework for reliable Android operating system. 528-534 - Sang-Ho Seo, Byung-Ok Jung, Byung-Su Koh, James Jeong:
A study on SW-Blackbox to ensure the reliability of content distribution using file system event monitoring of online service providers. 535-541 - Georgios Kambourakis, Dimitrios Damopoulos, Dimitrios Papamartzivanos, Emmanouil Pavlidakis:
Introducing touchstroke: keystroke-based authentication system for smartphones. 542-554 - Jong-Ho Kim, Jun-Jae Park, Sang-Ho Ahn, Deok-Gyu Lee, Daesung Moon, Sang-Kyoon Kim:
Small target detection using morphology and modified Gaussian distance function. 555-560 - Geon Woo Kim, Jong Wook Han, Deok-Gyu Lee, Sang Wook Kim:
Single authentication through in convergence space using collaborative smart cameras. 561-570 - Nikolaos Marangos, Panagiotis Rizomiliotis, Lilian Mitrou:
Time synchronization: pivotal element in cloud forensics. 571-582
Volume 9, Number 7, May 2016
- Junjie Lv, Chen Zhao:
Security analysis of online digital goods business based on stochastic game net model. 587-598 - Lukas Malina, Jan Hajny, Vaclav Zeman:
Light-weight group signatures with time-bound membership. 599-612 - Wei Luo, Wenping Ma, Qiang Gao:
A dynamic trust management system for wireless sensor networks. 613-621 - Donglai Fu, Xinguang Peng, Yuli Yang:
Unbalanced tree-formed verification data for trusted platforms. 622-633 - Brindha Murugan, Ammasai Gounden Nanjappa Gounder, Sriram Manohar:
A hybrid image encryption algorithm using chaos and Conway's game-of-life cellular automata. 634-651 - Tzer-Long Chen, Yu-Ting Liao, Yi-Fan Chang, Jen-Hung Hwang:
Security approach to controlling access to personal health records in healthcare service. 652-666 - Tzonelih Hwang, Prosanta Gope:
Robust stream-cipher mode of authenticated encryption for secure communication in wireless sensor network. 667-679 - Fuzhi Zhang, Honghong Chen:
An ensemble method for detecting shilling attacks based on ordered item sequences. 680-696
- Yilei Wang, Zhe Liu, Qiuliang Xu:
Corrigendum to "New Rational Parties Relying on Reputation". 697
Volume 9, Number 8, May 2016
- Wojciech Mazurczyk, Krzysztof Szczypiorski, Artur Janicki, Hui Tian:
Trends in modern information hiding: techniques, applications, and detection. 703-704
- Emanuele Maiorana, Patrizio Campisi:
Multi-bit watermarking of high dynamic range images based on perceptual models. 705-720 - Zhao-Xia Yin, Bin Luo:
MDE-based image steganography with large embedding capacity. 721-728 - Fengyong Li, Xinpeng Zhang, Hang Cheng, Jiang Yu:
Digital image steganalysis based on local textural features and double dimensionality reduction. 729-736 - Qilin Qi, Aaron Sharp, Dongming Peng, Hamid Sharif:
Real-time audio steganography attack based on automatic objective quality feedback. 737-746 - Shanyu Tang, Qing Chen, Wei Zhang, Yongfeng Huang:
Universal steganography model for low bit-rate speech codec. 747-754 - Rennie Archibald, Dipak Ghosal:
Design and performance evaluation of a covert timing channel. 755-770 - Pawel Laka, Lukasz Maksymiuk:
Steganographic transmission in optical networks with the use of direct spread spectrum technique. 771-780 - Wojciech Mazurczyk, Steffen Wendzel, Ignacio Azagra Villares, Krzysztof Szczypiorski:
On importance of steganographic cost for network steganography. 781-790 - Weiwei Liu, Guangjie Liu, Yuewei Dai:
Matrix embedding in multicast steganography: analysis in privacy, security and immediacy. 791-802
Volume 9, Number 9, June 2016
Editorial
- Shaoen Wu, Honggang Wang, Dalei Wu, Periklis Chatzimisios, Zhigang Chen:
Security and networking for cyber-physical systems. 807
- Todd Baumeister, Yingfei Dong:
Towards secure identity management for the smart grid. 808-822 - Mi Wen, Kuan Zhang, Jingsheng Lei, Xiaohui Liang, Ruilong Deng, Xuemin (Sherman) Shen:
CIT: A credit-based incentive tariff scheme with fraud-traceability for smart grid. 823-832 - Qingyu Yang, Liguo Chang, Wei Yu:
On false data injection attacks against Kalman filtering in power system dynamic state estimation. 833-849 - Pengbo Si, Jia Liu, Yanhua Sun, Yanhua Zhang:
Quality of service-aware and security-aware dynamic spectrum management in cyber-physical surveillance systems for transportation. 850-861 - Wei An, Song Ci, Haiyan Luo, Yanni Han, Tao Lin, Ding Tang, Ying Qi:
Vulnerability-constrained multiple minimum cost paths for multi-source wireless sensor networks. 862-873 - Mohammed Raza Kanjee, Hong Liu:
Authentication and key relay in medical cyber-physical systems. 874-885 - Qing Yang, Alvin S. Lim, Xiaojun Ruan, Xiao Qin, Dongjin Kim:
Location-preserved contention-based routing in vehicular ad hoc networks. 886-898 - Wen-Yong Wang, Li-Sheng Huang, Chang-Chun Li, Xin Wang:
TCP-polite rate control based on cooperative measurement. 899-909 - Suryakant Bhandare, Taha Ben Brahim, Saad Biaz, Prathima Agrawal:
Performance evaluation of collision avoidance schemes in ad hoc networks. 910-937
Volume 9, Number 10, July 2016
- Ruo Jun Cai, Xue Jun Li, Peter Han Joo Chong:
A novel self-checking ad hoc routing scheme against active black hole attacks. 943-957 - Ilija Basicevic, Stanislav Ocovaj, Miroslav Popovic:
The value of flow size distribution in entropy-based detection of DoS attacks. 958-965 - Liaojun Pang, Deyu Miao, Chunfeng Lian:
User-friendly random-grid-based visual secret sharing for general access structures. 966-976 - Eric McCary, Yang Xiao:
Home area network accountability with varying consumption devices in smart grid. 977-995 - Kunpeng Bai, Chuankun Wu:
A secure white-box SM4 implementation. 996-1006 - Hong Zhong, Jie Cui, Runhua Shi, Chao Xia:
Many-to-one homomorphic encryption scheme. 1007-1015 - Jiguo Li, Yuyan Guo, Qihong Yu, Yang Lu, Yichen Zhang:
Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage. 1016-1024 - Bhawana Rudra, Om Prakash Vyas:
Investigation of security issues for service-oriented network architecture. 1025-1039 - Wenli Shang, Peng Zeng, Ming Wan, Lin Li, Panfeng An:
Intrusion detection algorithm based on OCSVM in industrial control system. 1040-1049 - Tonko Kovacevic, Toni Perkovic, Mario Cagalj:
Flashing displays: user-friendly solution for bootstrapping secure associations between multiple constrained wireless devices. 1050-1071 - Zohreh Saffarian Eidgahi, Vahid Rafe:
Security analysis of network protocols through model checking: a case study on mobile IPv6. 1072-1084 - Vankamamidi Srinivasa Naresh, Nistala V. E. S. Murthy:
Provably secure group key agreement protocol based on ECDH with integrated signature. 1085-1102 - Tala Tafazzoli, Babak Sadeghiyan:
A stochastic model for the size of worm origin. 1103-1118 - Boris Damjanovic, Dejan Simic:
Tweakable parallel OFB mode of operation with delayed thread synchronization. 1119-1131 - Qussai Yaseen, Qutaibah Althebyan, Brajendra Panda, Yaser Jararweh:
Mitigating insider threat in cloud relational databases. 1132-1145 - Shuo Chen, Maode Ma, Zhenxing Luo:
An authentication scheme with identity-based cryptography for M2M security in cyber-physical systems. 1146-1157 - Shaghayegh Bakhtiari Chehelcheshmeh, Mehdi Hosseinzadeh:
Quantum-resistance authentication in centralized cognitive radio networks. 1158-1172 - Yibin Dai, Shaozhen Chen:
Security analysis of Khudra: a lightweight block cipher for FPGAs. 1173-1185 - Tzonelih Hwang, Prosanta Gope:
PFX: an essence of authencryption for block-cipher security. 1186-1197 - Madhusanka Liyanage, Pardeep Kumar, Mika Ylianttila, Andrei V. Gurtov:
Novel secure VPN architectures for LTE backhaul networks. 1198-1215 - Yilmaz Kaya, Ömer Faruk Ertugrul:
A novel approach for spam email detection based on shifted binary patterns. 1216-1225
- Charalampos Manifavas, George Hatzivasilis, Konstantinos Fysarakis, Yannis Papaefstathiou:
A survey of lightweight stream ciphers for embedded systems. 1226-1246 - Yefeng Ruan, Sivapriya Kalyanasundaram, Xukai Zou:
Survey of return-oriented programming defense mechanisms. 1247-1265
Volume 9, Number 11, July 2016
- Yacine Rebahi, Mateusz Khalil, Simon Hohberg, Pascal Lorenz:
An Android based new German eID solution for policy making processes. 1271-1284 - Ünal Çavusoglu, Akif Akgul, Sezgin Kaçar, Ihsan Pehlivan, Ahmet Zengin:
A novel chaos-based encryption algorithm over TCP data packet for secure communication. 1285-1296 - Eunsoo Seo, Gulustan Dogan, Tarek F. Abdelzaher, Theodore Brown:
Root cause diagnosis in error-propagating networks. 1297-1308 - Hui Zhu, Xiaoxia Liu, Rongxing Lu, Hui Li:
EPCS: an efficient and privacy-preserving classification service query framework for SVM. 1309-1320 - Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
Cryptanalysis and improvement of a chaotic maps-based anonymous authenticated key agreement protocol for multiserver architecture. 1321-1330 - Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
Robust anonymous two-factor authenticated key exchange scheme for mobile client-server environment. 1331-1339 - Mingchu Li, Xiaodong Xu, Cheng Guo, Xing Tan:
AD-ASGKA - authenticated dynamic protocols for asymmetric group key agreement. 1340-1352 - Liangliang Wang, Kefei Chen, Yu Long, Huige Wang:
Cryptanalysis of a certificateless aggregate signature scheme. 1353-1358 - Ziwen Sun, Yao Wang, Gang Qu, Zhiping Zhou:
A 3-D hand gesture signature based biometric authentication system for smartphones. 1359-1373 - Kamal Adli Mehr, Javad Musevi Niya:
Security bootstrapping of mobile ad hoc networks using identity-based cryptography. 1374-1383 - Zuowen Tan:
A privacy-preserving multi-server authenticated key-agreement scheme based on Chebyshev chaotic maps. 1384-1397 - Nan Run Zhou, Xiao Rong Liang, Zhihong Zhou, Ahmed Farouk:
Relay selection scheme for amplify-and-forward cooperative communication system with artificial noise. 1398-1404 - Hai-Cheng Chu, Han-Chieh Chao:
Testifying the digital artifacts for line application program under Mac OS X from the aspects of witness experts. 1405-1416 - Shifeng Sun, Dawu Gu, Shengli Liu:
Efficient chosen ciphertext secure identity-based encryption against key leakage attacks. 1417-1434 - Junfeng Yu, Qingfeng Huang, Chee Hoo Yian:
DroidScreening: a practical framework for real-world Android malware analysis. 1435-1449 - Ahmad M. Manasrah, Basim Najim Al-Din:
Mapping private keys into one public key using binary matrices and masonic cipher: Caesar cipher as a case study. 1450-1461 - Dongwoo Kang, Jaewook Jung, Jongho Mun, Donghoon Lee, Younsung Choi, Dongho Won:
Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain. 1462-1476 - Shashank Gupta, Brij Bhooshan Gupta:
JS-SAN: defense mechanism for HTML5-based web applications against javascript code injection vulnerabilities. 1477-1495