Search dblp for Publications

export results for "toc:db/journals/scn/scn6.bht:"

 download as .bib file

@article{DBLP:journals/scn/0005MJ13,
  author       = {Peng Liu and
                  Refik Molva and
                  Jiwu Jing},
  title        = {Special issue on "security and privacy in pervasive and ubiquitous
                  computing and communication systems"},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1522--1523},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.947},
  doi          = {10.1002/SEC.947},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/0005MJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AbrouguiB13,
  author       = {Kaouther Abrougui and
                  Azzedine Boukerche},
  title        = {Efficient group-based authentication protocol for location-based service
                  discovery in intelligent transportation systems},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {4},
  pages        = {473--484},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.641},
  doi          = {10.1002/SEC.641},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AbrouguiB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Abu-AmaraAMSA13,
  author       = {Marwan H. Abu{-}Amara and
                  Abdulaziz Al{-}Baiz and
                  Ashraf S. Mahmoud and
                  Mohammed H. Sqalli and
                  Farag Azzedin},
  title        = {A scalable NAT-based solution to Internet access denial by higher-tier
                  ISPs},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {2},
  pages        = {194--209},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.557},
  doi          = {10.1002/SEC.557},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Abu-AmaraAMSA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Al-SinaniM13,
  author       = {Haitham S. Al{-}Sinani and
                  Chris J. Mitchell},
  title        = {Enabling interoperation between Shibboleth and Information Card systems},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {2},
  pages        = {219--229},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.560},
  doi          = {10.1002/SEC.560},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Al-SinaniM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AlaghebandA13,
  author       = {Mahdi R. Alagheband and
                  Mohammad Reza Aref},
  title        = {Unified privacy analysis of new-found {RFID} authentication protocols},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {8},
  pages        = {999--1009},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.650},
  doi          = {10.1002/SEC.650},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AlaghebandA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AmiraniTM13,
  author       = {Mehdi Chehel Amirani and
                  Mohsen Toorani and
                  Sara Mihandoost},
  title        = {Feature-based Type Identification of File Fragments},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {1},
  pages        = {115--128},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.553},
  doi          = {10.1002/SEC.553},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AmiraniTM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AmiriNSA13,
  author       = {Iraj Sadegh Amiri and
                  Mehrnaz Nikmaram and
                  Ali Shahidinejad and
                  Jalil Ali},
  title        = {Generation of potential wells used for quantum codes transmission
                  via a {TDMA} network communication system},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {11},
  pages        = {1301--1309},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.712},
  doi          = {10.1002/SEC.712},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AmiriNSA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AnL13,
  author       = {Wenjuan An and
                  Mangui Liang},
  title        = {A new intrusion detection method based on {SVM} with minimum within-class
                  scatter},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {9},
  pages        = {1064--1074},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.666},
  doi          = {10.1002/SEC.666},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AnL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AnuarPFC13,
  author       = {Nor Badrul Anuar and
                  Maria Papadaki and
                  Steven Furnell and
                  Nathan L. Clarke},
  title        = {Incident prioritisation using analytic hierarchy process {(AHP):}
                  Risk Index Model {(RIM)}},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {9},
  pages        = {1087--1116},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.673},
  doi          = {10.1002/SEC.673},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AnuarPFC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BaldiniFBT13,
  author       = {Gianmarco Baldini and
                  Igor Nai Fovino and
                  Stefano Braghin and
                  Alberto Trombetta},
  title        = {Distributed access control policies for spectrum sharing},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {8},
  pages        = {925--935},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.629},
  doi          = {10.1002/SEC.629},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/BaldiniFBT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BallariniMM13,
  author       = {Paolo Ballarini and
                  Lynda Mokdad and
                  Quentin Monnet},
  title        = {Modeling tools for detecting DoS attacks in WSNs},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {4},
  pages        = {420--436},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.630},
  doi          = {10.1002/SEC.630},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/BallariniMM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BarryC13,
  author       = {Bazara I. A. Barry and
                  H. Anthony Chan},
  title        = {Architecture and performance evaluation of a hybrid intrusion detection
                  system for {IP} telephony},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1539--1555},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.174},
  doi          = {10.1002/SEC.174},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/BarryC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BenitezBC13,
  author       = {Yesica Imelda Saavedra Benitez and
                  Jalel Ben{-}Othman and
                  Jean{-}Pierre Claud{\'{e}}},
  title        = {Performance comparison between {IBE-HWMP} and {ECDSA-HWMP}},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {4},
  pages        = {437--449},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.632},
  doi          = {10.1002/SEC.632},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/BenitezBC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BoseS13,
  author       = {Abhijit Bose and
                  Kang G. Shin},
  title        = {Agent-based modeling of malware dynamics in heterogeneous environments},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1576--1589},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.298},
  doi          = {10.1002/SEC.298},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/BoseS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Bou-HarbPDA13,
  author       = {Elias Bou{-}Harb and
                  Makan Pourzandi and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {A secure, efficient, and cost-effective distributed architecture for
                  spam mitigation on {LTE} 4G mobile networks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1478--1489},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.413},
  doi          = {10.1002/SEC.413},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Bou-HarbPDA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChangCY13,
  author       = {Chin{-}Chen Chang and
                  Shih{-}Chang Chang and
                  Jen{-}Ho Yang},
  title        = {A practical secure and efficient enterprise digital rights management
                  mechanism suitable for mobile environment},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {8},
  pages        = {972--984},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.647},
  doi          = {10.1002/SEC.647},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChangCY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChaoYLL13,
  author       = {Chih{-}Hung Chao and
                  Ching{-}Fang Yang and
                  Po{-}Ting Lin and
                  Jung{-}Shian Li},
  title        = {Novel distributed key revocation scheme for wireless sensor networks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {10},
  pages        = {1271--1280},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.707},
  doi          = {10.1002/SEC.707},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChaoYLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Chen13,
  author       = {Hsing{-}Chung Chen},
  title        = {Secure multicast key protocol for electronic mail systems with providing
                  perfect forward secrecy},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {1},
  pages        = {100--107},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.536},
  doi          = {10.1002/SEC.536},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Chen13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChenCZ13,
  author       = {Chia{-}Mei Chen and
                  Sheng{-}Tzong Cheng and
                  Ruei{-}Yu Zeng},
  title        = {A proactive approach to intrusion detection and malware collection},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {7},
  pages        = {844--853},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.619},
  doi          = {10.1002/SEC.619},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChenCZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChenHJH13,
  author       = {Liang Chen and
                  Lansheng Han and
                  Jiandu Jing and
                  Dongping Hu},
  title        = {A post-quantum provable data possession protocol in cloud},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {5},
  pages        = {658--667},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.691},
  doi          = {10.1002/SEC.691},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChenHJH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChenWTW13,
  author       = {Tzung{-}Her Chen and
                  Bing{-}Jian Wang and
                  Tai{-}Yuan Tu and
                  Chih{-}Hung Wang},
  title        = {A security-enhanced key agreement protocol based on chaotic maps},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {1},
  pages        = {108--114},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.537},
  doi          = {10.1002/SEC.537},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChenWTW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChengLCC13,
  author       = {Zi{-}Yao Cheng and
                  Yun Liu and
                  Chin{-}Chen Chang and
                  Shih{-}Chang Chang},
  title        = {Authenticated {RFID} security mechanism based on chaotic maps},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {2},
  pages        = {247--256},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.709},
  doi          = {10.1002/SEC.709},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChengLCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChienLW13,
  author       = {Hung{-}Yu Chien and
                  Chin{-}I Lee and
                  Tzong{-}Chen Wu},
  title        = {Comments on {IMBAS:} identity-based multi-user broadcast authentication
                  in wireless sensor networks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {8},
  pages        = {993--998},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.649},
  doi          = {10.1002/SEC.649},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChienLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChienYH13,
  author       = {Hung{-}Yu Chien and
                  Chu{-}Sing Yang and
                  Hung{-}Pin Hou},
  title        = {Non-linearity cannot help {RFID} resist full-disclosure attacks and
                  terrorist fraud attacks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1490--1495},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.410},
  doi          = {10.1002/SEC.410},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChienYH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChumZ13,
  author       = {Chi Sing Chum and
                  Xiaowen Zhang},
  title        = {Hash function-based secret sharing scheme designs},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {5},
  pages        = {584--592},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.576},
  doi          = {10.1002/SEC.576},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChumZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/CorradiFFC13,
  author       = {Antonio Corradi and
                  Mario Fanelli and
                  Luca Foschini and
                  Marcello Cinque},
  title        = {Context data distribution with quality guarantees for Android-based
                  mobile systems},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {4},
  pages        = {450--460},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.633},
  doi          = {10.1002/SEC.633},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/CorradiFFC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/CuiZC13,
  author       = {Zongmin Cui and
                  Hong Zhu and
                  Lianhua Chi},
  title        = {Lightweight key management on sensitive data in the cloud},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {10},
  pages        = {1290--1299},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.850},
  doi          = {10.1002/SEC.850},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/CuiZC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DingG13,
  author       = {Lin Ding and
                  Jie Guan},
  title        = {Cryptanalysis of {MICKEY} family of stream ciphers},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {8},
  pages        = {936--941},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.637},
  doi          = {10.1002/SEC.637},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/DingG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DjebbarAAH13,
  author       = {Fatiha Djebbar and
                  Beghdad Ayad and
                  Karim Abed{-}Meraim and
                  Habib Hamam},
  title        = {Unified phase and magnitude speech spectra data hiding algorithm},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {8},
  pages        = {961--971},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.644},
  doi          = {10.1002/SEC.644},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/DjebbarAAH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DuanXF13,
  author       = {Meijiao Duan and
                  Jing Xu and
                  Dengguo Feng},
  title        = {Efficient identity-based strong designated verifier signature schemes},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {7},
  pages        = {902--911},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.645},
  doi          = {10.1002/SEC.645},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/DuanXF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/EmbletonSZ13,
  author       = {Shawn Embleton and
                  Sherri Sparks and
                  Cliff Changchun Zou},
  title        = {{SMM} rootkit: a new breed of {OS} independent malware},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1590--1605},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.166},
  doi          = {10.1002/SEC.166},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/EmbletonSZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/FanLZCGJS13,
  author       = {Xinxin Fan and
                  Mingchu Li and
                  Hui Zhao and
                  Xiaodong Chen and
                  Zhenzhou Guo and
                  Dong Jiao and
                  Weifeng Sun},
  title        = {Peer cluster: a maximum flow-based trust mechanism in {P2P} file sharing
                  networks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {9},
  pages        = {1126--1142},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.682},
  doi          = {10.1002/SEC.682},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/FanLZCGJS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/FeiLM13,
  author       = {Fei Peng and
                  Chen Li and
                  Min Long},
  title        = {A reversible watermark scheme for 2D vector map based on reversible
                  contrast mapping},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {9},
  pages        = {1117--1125},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.680},
  doi          = {10.1002/SEC.680},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/FeiLM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/GaoL13,
  author       = {Ang Gao and
                  Zengzhi Li},
  title        = {Free global {ID} against collusion attack on multi-authority attribute-based
                  encryption},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {9},
  pages        = {1143--1152},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.683},
  doi          = {10.1002/SEC.683},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/GaoL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/GhosalB13,
  author       = {Amrita Ghosal and
                  Sipra Das Bit},
  title        = {A jamming-attack-defending data forwarding scheme based on channel
                  surfing in wireless sensor networks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {11},
  pages        = {1367--1388},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.719},
  doi          = {10.1002/SEC.719},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/GhosalB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/GongB13,
  author       = {Tao Gong and
                  Bharat K. Bhargava},
  title        = {Immunizing mobile ad hoc networks against collaborative attacks using
                  cooperative immune model},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {1},
  pages        = {58--68},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.530},
  doi          = {10.1002/SEC.530},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/GongB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/GuWODCY13,
  author       = {Lize Gu and
                  Licheng Wang and
                  Kaoru Ota and
                  Mianxiong Dong and
                  Zhenfu Cao and
                  Yixian Yang},
  title        = {New public key cryptosystems based on non-Abelian factorization problems},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {7},
  pages        = {912--922},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.710},
  doi          = {10.1002/SEC.710},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/GuWODCY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/GuoLDC13,
  author       = {Ming{-}Huang Guo and
                  Horng{-}Twu Liaw and
                  Der{-}Jiunn Deng and
                  Han{-}Chieh Chao},
  title        = {Centralized group key management mechanism for {VANET}},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {8},
  pages        = {1035--1043},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.676},
  doi          = {10.1002/SEC.676},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/GuoLDC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/GuoLF13,
  author       = {Zhenzhou Guo and
                  Mingchu Li and
                  Xinxin Fan},
  title        = {Attribute-based ring signcryption scheme},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {6},
  pages        = {790--796},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.614},
  doi          = {10.1002/SEC.614},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/GuoLF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/GyongyosiI13,
  author       = {Laszlo Gyongyosi and
                  S{\'{a}}ndor Imre},
  title        = {Information geometric security analysis of differential phase-shift
                  quantum key distribution protocol},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {2},
  pages        = {129--150},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.542},
  doi          = {10.1002/SEC.542},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/GyongyosiI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HongSL13,
  author       = {Tao Hong and
                  Mao{-}zhong Song and
                  Yu Liu},
  title        = {Directional spread-spectrum modulation signal for physical layer security
                  communication applications},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {2},
  pages        = {182--193},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.554},
  doi          = {10.1002/SEC.554},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HongSL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HsiaoSF13,
  author       = {Han{-}Wei Hsiao and
                  Huey{-}Min Sun and
                  Wei{-}Cheng Fan},
  title        = {Detecting stepping-stone intrusion using association rule mining},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {10},
  pages        = {1225--1235},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.692},
  doi          = {10.1002/SEC.692},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HsiaoSF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HsiehLL13,
  author       = {Che{-}Jen Hsieh and
                  Jung{-}Shian Li and
                  Wei{-}Cheng Liu},
  title        = {Digital evidence collection for web image access},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {6},
  pages        = {765--776},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.610},
  doi          = {10.1002/SEC.610},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HsiehLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HuangML13,
  author       = {Yingsong Huang and
                  Shiwen Mao and
                  Yihan Li},
  title        = {On downlink power allocation for multiuser variable-bit-rate video
                  streaming},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {4},
  pages        = {485--497},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.642},
  doi          = {10.1002/SEC.642},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HuangML13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HubballiBN13,
  author       = {Neminath Hubballi and
                  Santosh Biswas and
                  Sukumar Nandi},
  title        = {Towards reducing false alarms in network intrusion detection systems
                  with data summarization technique},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {3},
  pages        = {275--285},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.562},
  doi          = {10.1002/SEC.562},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HubballiBN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/JannatiSMM13,
  author       = {Hoda Jannati and
                  Mahmoud Salmasizadeh and
                  Javad Mohajeri and
                  Amir Moradi},
  title        = {Introducing proxy zero-knowledge proof and utilization in anonymous
                  credential systems},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {2},
  pages        = {161--172},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.543},
  doi          = {10.1002/SEC.543},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/JannatiSMM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/JiaTLFXY13,
  author       = {Weijia Jia and
                  Fung Po Tso and
                  Zhen Ling and
                  Xinwen Fu and
                  Dong Xuan and
                  Wei Yu},
  title        = {Blind detection of spread spectrum flow watermarks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {3},
  pages        = {257--274},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.540},
  doi          = {10.1002/SEC.540},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/JiaTLFXY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/JiaWJZL13,
  author       = {Xiaoqi Jia and
                  Rui Wang and
                  Jun Jiang and
                  Shengzhi Zhang and
                  Peng Liu},
  title        = {Defending return-oriented programming based on virtualization techniques},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {10},
  pages        = {1236--1249},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.693},
  doi          = {10.1002/SEC.693},
  timestamp    = {Mon, 27 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/JiaWJZL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/JinJT13,
  author       = {Cong Jin and
                  Shu{-}Wei Jin and
                  Hua{-}Yong Tan},
  title        = {Computer virus propagation model based on bounded rationality evolutionary
                  game theory},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {2},
  pages        = {210--218},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.558},
  doi          = {10.1002/SEC.558},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/JinJT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KandahSZW13,
  author       = {Farah I. Kandah and
                  Yashaswi Singh and
                  Weiyi Zhang and
                  Chonggang Wang},
  title        = {Mitigating colluding injected attack using monitoring verification
                  in mobile ad-hoc networks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {4},
  pages        = {539--547},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.681},
  doi          = {10.1002/SEC.681},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KandahSZW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KazienkoRMA13,
  author       = {Juliano F. Kazienko and
                  Igor Cesar Gonzalez Ribeiro and
                  Igor M. Moraes and
                  C{\'{e}}lio Vinicius N. de Albuquerque},
  title        = {SENSORLock: a lightweight key management scheme for wireless sensor
                  networks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {10},
  pages        = {1198--1210},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.686},
  doi          = {10.1002/SEC.686},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/KazienkoRMA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KhalidKMHKMKWZC13,
  author       = {Osman Khalid and
                  Samee Ullah Khan and
                  Sajjad Ahmad Madani and
                  Khizar Hayat and
                  Majid Iqbal Khan and
                  Nasro Min{-}Allah and
                  Joanna Kolodziej and
                  Lizhe Wang and
                  Sherali Zeadally and
                  Dan Chen},
  title        = {Comparative study of trust and reputation systems for wireless sensor
                  networks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {6},
  pages        = {669--688},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.597},
  doi          = {10.1002/SEC.597},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KhalidKMHKMKWZC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KhalilBAH13,
  author       = {Issa Khalil and
                  Saurabh Bagchi and
                  Najah AbuAli and
                  Mohammad Hayajneh},
  title        = {{DISA:} Detection and isolation of sneaky attackers in locally monitored
                  multi-hop wireless networks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1524--1538},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.152},
  doi          = {10.1002/SEC.152},
  timestamp    = {Mon, 21 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/KhalilBAH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KhelifaMH13,
  author       = {Benahmed Khelifa and
                  Madjid Merabti and
                  Hafid Haffaf},
  title        = {Distributed monitoring for misbehaviour detection in wireless sensor
                  networks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {4},
  pages        = {388--400},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.624},
  doi          = {10.1002/SEC.624},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KhelifaMH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KifayatMSA13,
  author       = {Kashif Kifayat and
                  Madjid Merabti and
                  Qi Shi and
                  Sohail Abbas},
  title        = {Component-based security system {(COMSEC)} with QoS for wireless sensor
                  networks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {4},
  pages        = {461--472},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.634},
  doi          = {10.1002/SEC.634},
  timestamp    = {Mon, 09 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/KifayatMSA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KongTPLW13,
  author       = {Deguang Kong and
                  Donghai Tian and
                  Qiha Pan and
                  Peng Liu and
                  Dinghao Wu},
  title        = {Semantic aware attribution analysis of remote exploits},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {7},
  pages        = {818--832},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.613},
  doi          = {10.1002/SEC.613},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KongTPLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Kumar13,
  author       = {Ch. Aswani Kumar},
  title        = {Designing role-based access control using formal concept analysis},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {3},
  pages        = {373--383},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.589},
  doi          = {10.1002/SEC.589},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Kumar13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Lee13,
  author       = {Tian{-}Fu Lee},
  title        = {User authentication scheme with anonymity, unlinkability and untrackability
                  for global mobility networks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {11},
  pages        = {1404--1413},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.734},
  doi          = {10.1002/SEC.734},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Lee13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LeeCW13,
  author       = {Tian{-}Fu Lee and
                  I{-}Pin Chang and
                  Ching{-}Cheng Wang},
  title        = {Efficient three-party encrypted key exchange using trapdoor functions},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {11},
  pages        = {1353--1358},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.717},
  doi          = {10.1002/SEC.717},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LeeCW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiJLD13,
  author       = {Jingwei Li and
                  Chunfu Jia and
                  Zheli Liu and
                  Zongqing Dong},
  title        = {Cycle-walking revisited: consistency, security, and efficiency},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {8},
  pages        = {985--992},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.648},
  doi          = {10.1002/SEC.648},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiJLD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiZ13,
  author       = {Xiaowei Li and
                  Yuqing Zhang},
  title        = {A simple and robust anonymous two-factor authenticated key exchange
                  protocol},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {6},
  pages        = {711--722},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.605},
  doi          = {10.1002/SEC.605},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiZZ13,
  author       = {Xiaowei Li and
                  Yuqing Zhang and
                  Geifei Zhang},
  title        = {A new certificateless authenticated key agreement protocol for {SIP}
                  with different KGCs},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {5},
  pages        = {631--643},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.595},
  doi          = {10.1002/SEC.595},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiZZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiangXOVD13,
  author       = {Xiannuan Liang and
                  Yang Xiao and
                  Suat Ozdemir and
                  Athanasios V. Vasilakos and
                  Hongmei Deng},
  title        = {Cipher feedback mode under go-back-N and selective-reject protocols
                  in error channels},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {8},
  pages        = {942--954},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.638},
  doi          = {10.1002/SEC.638},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiangXOVD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LimLA13,
  author       = {Seongan Lim and
                  Juhee Lee and
                  Youngjoo An},
  title        = {Key exposure free chameleon hash schemes based on discrete logarithm
                  problem},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {7},
  pages        = {812--817},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.612},
  doi          = {10.1002/SEC.612},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LimLA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LinLJW13,
  author       = {Jingqiang Lin and
                  Peng Liu and
                  Jiwu Jing and
                  Qiongxiao Wang},
  title        = {Impossibility of finding any third family of server protocols integrating
                  Byzantine quorum systems with threshold signature schemes},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {5},
  pages        = {612--630},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.593},
  doi          = {10.1002/SEC.593},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LinLJW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuHZL13,
  author       = {Zhenhua Liu and
                  Yupu Hu and
                  Xiangsong Zhang and
                  Fagen Li},
  title        = {Efficient and strongly unforgeable identity-based signature scheme
                  from lattices in the standard model},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {1},
  pages        = {69--77},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.531},
  doi          = {10.1002/SEC.531},
  timestamp    = {Wed, 22 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiuHZL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuL13,
  author       = {He Liu and
                  Mangui Liang},
  title        = {Efficient identity-based hierarchical access authentication protocol
                  for mobile network},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1509--1521},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.412},
  doi          = {10.1002/SEC.412},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiuL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuY13,
  author       = {Yi{-}Ning Liu and
                  Jihong Yan},
  title        = {A lightweight micropayment scheme based on Lagrange interpolation
                  formula},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {8},
  pages        = {955--960},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.643},
  doi          = {10.1002/SEC.643},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiuY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuZ13,
  author       = {Xuefeng Liu and
                  Yuqing Zhang},
  title        = {A privacy-preserving acceleration authentication protocol for mobile
                  pay-TV systems},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {3},
  pages        = {361--372},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.584},
  doi          = {10.1002/SEC.584},
  timestamp    = {Fri, 03 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/LiuZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuZHH13,
  author       = {Yan{-}Xiao Liu and
                  Yuqing Zhang and
                  Lein Harn and
                  Yu{-}pu Hu},
  title        = {Verifiable symmetric polynomial-based key distribution schemes},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {8},
  pages        = {1028--1034},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.671},
  doi          = {10.1002/SEC.671},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiuZHH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LvLW13,
  author       = {Xixiang Lv and
                  Hui Li and
                  Baocang Wang},
  title        = {Virtual private key generator based escrow-free certificateless public
                  key cryptosystem for mobile ad hoc networks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {1},
  pages        = {49--57},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.529},
  doi          = {10.1002/SEC.529},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LvLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MagkosAKS13,
  author       = {Emmanouil Magkos and
                  Markos Avlonitis and
                  Panayiotis Kotzanikolaou and
                  Michalis Stefanidakis},
  title        = {Toward early warning against Internet worms based on critical-sized
                  networks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {1},
  pages        = {78--88},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.534},
  doi          = {10.1002/SEC.534},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/MagkosAKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MalekM13,
  author       = {Behzad Malek and
                  Ali Miri},
  title        = {Chaotic masking for securing {RFID} systems against relay attacks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1496--1508},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.586},
  doi          = {10.1002/SEC.586},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MalekM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MazurczykSTL13,
  author       = {Wojciech Mazurczyk and
                  Krzysztof Szczypiorski and
                  Hui Tian and
                  Yali Liu},
  title        = {Trends in modern information hiding: techniques, applications and
                  detection},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {11},
  pages        = {1414--1415},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.919},
  doi          = {10.1002/SEC.919},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MazurczykSTL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MohammadiSJ13,
  author       = {Shahriyar Mohammadi and
                  Mohammad Hussein Sherkat and
                  Mona Jamporazmey},
  title        = {A taxonomy framework based on {ITU-TX-805} security architecture for
                  quantitative determination of computer network vulnerabilities},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {7},
  pages        = {864--880},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.623},
  doi          = {10.1002/SEC.623},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MohammadiSJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/NajeraRL13,
  author       = {Pablo Najera and
                  Rodrigo Roman and
                  Javier L{\'{o}}pez},
  title        = {User-centric secure integration of personal {RFID} tags and sensor
                  networks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {10},
  pages        = {1177--1197},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.684},
  doi          = {10.1002/SEC.684},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/NajeraRL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/NjoguLK13,
  author       = {Humphrey Waita Njogu and
                  Jiawei Luo and
                  Jane Nduta Kiere},
  title        = {Network specific vulnerability based alert reduction approach},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {1},
  pages        = {15--27},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.520},
  doi          = {10.1002/SEC.520},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/NjoguLK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/OlteanuXLCC13,
  author       = {Alina Olteanu and
                  Yang Xiao and
                  Jing Liu and
                  Thomas M. Chen and
                  C. L. Philip Chen},
  title        = {Nonintrusive tracing in the Internet},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {7},
  pages        = {833--843},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.616},
  doi          = {10.1002/SEC.616},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/OlteanuXLCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/OzdemirX13,
  author       = {Suat Ozdemir and
                  Yang Xiao},
  title        = {{FTDA:} outlier detection-based fault-tolerant data aggregation for
                  wireless sensor networks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {6},
  pages        = {702--710},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.604},
  doi          = {10.1002/SEC.604},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/OzdemirX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Parakh13,
  author       = {Abhishek Parakh},
  title        = {A probabilistic quantum key transfer protocol},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {11},
  pages        = {1389--1395},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.736},
  doi          = {10.1002/SEC.736},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Parakh13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ParkATZ13,
  author       = {Soyoung Park and
                  Baber Aslam and
                  Damla Turgut and
                  Cliff Changchun Zou},
  title        = {Defense against Sybil attack in the initial deployment stage of vehicular
                  ad hoc network based on roadside unit support},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {4},
  pages        = {523--538},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.679},
  doi          = {10.1002/SEC.679},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ParkATZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/PengCP13,
  author       = {Dichao Peng and
                  Wei Chen and
                  Qunsheng Peng},
  title        = {TrustVis: visualizing trust toward attack identification in distributed
                  computing environments},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1445--1459},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.521},
  doi          = {10.1002/SEC.521},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/PengCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/PuWW13,
  author       = {Qiong Pu and
                  Jian Wang and
                  Shuhua Wu},
  title        = {Secure {SIP} authentication scheme supporting lawful interception},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {3},
  pages        = {340--350},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.568},
  doi          = {10.1002/SEC.568},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/PuWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/PurushothamaA13,
  author       = {B. R. Purushothama and
                  B. B. Amberker},
  title        = {Secure group and multi-layer group communication schemes based on
                  polynomial interpolation},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {6},
  pages        = {735--756},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.607},
  doi          = {10.1002/SEC.607},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/PurushothamaA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/QabajehKQ13,
  author       = {Liana Khamis Qabajeh and
                  Miss Laiha Mat Kiah and
                  Mohammad Moustafa Qabajeh},
  title        = {A more secure and scalable routing protocol for mobile ad hoc networks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {3},
  pages        = {286--308},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.563},
  doi          = {10.1002/SEC.563},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/QabajehKQ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/QinL13,
  author       = {Baodong Qin and
                  Shengli Liu},
  title        = {Efficient chosen ciphertext secure public-key encryption under factoring
                  assumption},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {3},
  pages        = {351--360},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.571},
  doi          = {10.1002/SEC.571},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/QinL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/RajiMJM13,
  author       = {Fatemeh Raji and
                  Ali Miri and
                  Mohammad Davarpanah Jazi and
                  Behzad Malek},
  title        = {{DEFF:} a new architecture for private online social networks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1460--1470},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.533},
  doi          = {10.1002/SEC.533},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/RajiMJM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/RyuY13,
  author       = {Eun{-}Kyung Ryu and
                  Kee{-}Young Yoo},
  title        = {Certificateless broadcast authentication for vehicular ad hoc networks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {5},
  pages        = {602--611},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.590},
  doi          = {10.1002/SEC.590},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/RyuY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SedjelmaciSF13,
  author       = {Hichem Sedjelmaci and
                  Sidi{-}Mohammed Senouci and
                  Mohammed Feham},
  title        = {An efficient intrusion detection framework in cluster-based wireless
                  sensor networks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {10},
  pages        = {1211--1224},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.687},
  doi          = {10.1002/SEC.687},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SedjelmaciSF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SelvarajA13,
  author       = {Chithra Selvaraj and
                  Sheila Anand},
  title        = {Outlier detection in reputation management system for {P2P} networks
                  using rough set theory},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {9},
  pages        = {1153--1160},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.685},
  doi          = {10.1002/SEC.685},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SelvarajA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SeoSK13,
  author       = {Hwajeong Seo and
                  Kyung{-}Ah Shim and
                  Howon Kim},
  title        = {Performance enhancement of TinyECC based on multiplication optimizations},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {2},
  pages        = {151--160},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.422},
  doi          = {10.1002/SEC.422},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/SeoSK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SharifiSA13,
  author       = {Mohsen Sharifi and
                  Hadi Salimi and
                  Ebrahim Asadi},
  title        = {Alamut: a high-performance network intrusion detection system in support
                  of virtualized environments},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {11},
  pages        = {1310--1318},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.713},
  doi          = {10.1002/SEC.713},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SharifiSA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SheikhanR13,
  author       = {Mansour Sheikhan and
                  Maryam Sharifi Rad},
  title        = {Using particle swarm optimization in fuzzy association rules-based
                  feature selection and fuzzy ARTMAP-based attack recognition},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {7},
  pages        = {797--811},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.609},
  doi          = {10.1002/SEC.609},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SheikhanR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Shi13,
  author       = {Wenbo Shi},
  title        = {A sealed-bid multi-attribute auction protocol with strong bid privacy
                  and bidder privacy},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {10},
  pages        = {1281--1289},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.708},
  doi          = {10.1002/SEC.708},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Shi13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SouthernOS13,
  author       = {Eric Southern and
                  Abdelkader H. Ouda and
                  Abdallah Shami},
  title        = {Wireless security: securing mobile {UMTS} communications from interoperation
                  of {GSM}},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {4},
  pages        = {498--508},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.674},
  doi          = {10.1002/SEC.674},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/SouthernOS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SqalliFSA13,
  author       = {Mohammed H. Sqalli and
                  Syed Naeem Firdous and
                  Khaled Salah and
                  Marwan H. Abu{-}Amara},
  title        = {Classifying malicious activities in Honeynets using entropy and volume-based
                  thresholds},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {5},
  pages        = {567--583},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.575},
  doi          = {10.1002/SEC.575},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SqalliFSA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SunBN13,
  author       = {Dongdong Sun and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Predicate encryption for multi-inner-products},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {3},
  pages        = {325--339},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.566},
  doi          = {10.1002/SEC.566},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SunBN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SzottNP13,
  author       = {Szymon Szott and
                  Marek Natkaniec and
                  Andrzej R. Pach},
  title        = {Improving QoS and security in wireless ad hoc networks by mitigating
                  the impact of selfish behaviors: a game-theoretic approach},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {4},
  pages        = {509--522},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.677},
  doi          = {10.1002/SEC.677},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SzottNP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TahaS13,
  author       = {Sanaa Taha and
                  Xuemin (Sherman) Shen},
  title        = {{ALPP:} anonymous and location privacy preserving scheme for mobile
                  IPv6 heterogeneous networks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {4},
  pages        = {401--419},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.625},
  doi          = {10.1002/SEC.625},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/TahaS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Tan13,
  author       = {Zuowen Tan},
  title        = {Efficient pairing-free provably secure identity-based proxy blind
                  signature scheme},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {5},
  pages        = {593--601},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.582},
  doi          = {10.1002/SEC.582},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Tan13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Tan13a,
  author       = {Zuowen Tan},
  title        = {A communication and computation-efficient three-party authenticated
                  key agreement protocol},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {7},
  pages        = {854--863},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.622},
  doi          = {10.1002/SEC.622},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Tan13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TanJT13,
  author       = {Syh{-}Yuan Tan and
                  Zhe Jin and
                  Andrew Beng Jin Teoh},
  title        = {Argument on biometrics identity-based encryption schemes},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {11},
  pages        = {1344--1352},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.716},
  doi          = {10.1002/SEC.716},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/TanJT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Thomas13,
  author       = {Ciza Thomas},
  title        = {Improving intrusion detection for imbalanced network traffic},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {3},
  pages        = {309--324},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.564},
  doi          = {10.1002/SEC.564},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Thomas13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ThukralS13,
  author       = {Manish Kumar Thukral and
                  Karma Sonam Sherpa},
  title        = {Chaotic modulation-based spread spectrum communication using complex
                  dynamics of chaotic {DC-DC} current mode controlled boost converter},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {9},
  pages        = {1053--1063},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.665},
  doi          = {10.1002/SEC.665},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ThukralS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TiwariP13,
  author       = {Namita Tiwari and
                  Sahadeo Padhye},
  title        = {Analysis on the generalization of proxy signature},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {5},
  pages        = {549--566},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.581},
  doi          = {10.1002/SEC.581},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/TiwariP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TsaiTW13,
  author       = {Tung{-}Tso Tsai and
                  Yuh{-}Min Tseng and
                  Tsu{-}Yang Wu},
  title        = {Provably secure revocable ID-based signature in the standard model},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {10},
  pages        = {1250--1260},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.696},
  doi          = {10.1002/SEC.696},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/TsaiTW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/UnalC13,
  author       = {Devrim Unal and
                  M. Ufuk {\c{C}}aglayan},
  title        = {{XFPM-RBAC:} XML-based specification language for security policies
                  in multidomain mobile networks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1420--1444},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.411},
  doi          = {10.1002/SEC.411},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/UnalC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Wang13,
  author       = {Zhiwei Wang},
  title        = {Improved group key transfer protocols from the protocol of Harn \emph{et
                  al}},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1471--1477},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.415},
  doi          = {10.1002/SEC.415},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Wang13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangC13,
  author       = {Hongbing Wang and
                  Zhenfu Cao},
  title        = {More efficient CCA-secure unidirectional proxy re-encryption schemes
                  without random oracles},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {2},
  pages        = {173--181},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.552},
  doi          = {10.1002/SEC.552},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangLMLC13,
  author       = {Yuanzhuo Wang and
                  Jingyuan Li and
                  Kun Meng and
                  Chuang Lin and
                  Xueqi Cheng},
  title        = {Modeling and security analysis of enterprise network using attack-defense
                  stochastic game Petri nets},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {1},
  pages        = {89--99},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.535},
  doi          = {10.1002/SEC.535},
  timestamp    = {Wed, 10 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangLMLC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangM13,
  author       = {Xiaonan Wang and
                  Yi Mu},
  title        = {A secure IPv6 address configuration scheme for a {MANET}},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {6},
  pages        = {777--789},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.611},
  doi          = {10.1002/SEC.611},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangMBWX13,
  author       = {Wei Wang and
                  Ilona Murynets and
                  Jeffrey Bickford and
                  Christopher Van Wart and
                  Gang Xu},
  title        = {What you see predicts what you get - lightweight agent-based malware
                  detection},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {1},
  pages        = {33--48},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.528},
  doi          = {10.1002/SEC.528},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangMBWX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangTCMKHK13,
  author       = {Peng Wang and
                  James Tyra and
                  Eric Chan{-}Tin and
                  Tyson Malchow and
                  Denis Foo Kune and
                  Nicholas Hopper and
                  Yongdae Kim},
  title        = {Attacking the kad network - real world evaluation and high fidelity
                  simulation using {DVN}},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1556--1575},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.172},
  doi          = {10.1002/SEC.172},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/WangTCMKHK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangZ13,
  author       = {Bin Wang and
                  Qing Zhao},
  title        = {Server-aided batch verification signature schemes in the multiple-signer
                  setting},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {11},
  pages        = {1359--1366},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.718},
  doi          = {10.1002/SEC.718},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WeiCD13,
  author       = {Lifei Wei and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {Secure identity-based multisignature schemes under quadratic residue
                  assumptions},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {6},
  pages        = {689--701},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.600},
  doi          = {10.1002/SEC.600},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WeiCD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WuCOL13,
  author       = {Guowei Wu and
                  Xiaojie Chen and
                  Mohammad S. Obaidat and
                  Chi Lin},
  title        = {A high efficient node capture attack algorithm in wireless sensor
                  network based on route minimum key set},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {2},
  pages        = {230--238},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.570},
  doi          = {10.1002/SEC.570},
  timestamp    = {Fri, 24 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/WuCOL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WuL13,
  author       = {Tzong{-}Sun Wu and
                  Han{-}Yu Lin},
  title        = {A novel probabilistic signature based on bilinear square Diffie-Hellman
                  problem and its extension},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {6},
  pages        = {757--764},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.608},
  doi          = {10.1002/SEC.608},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WuL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WuT13,
  author       = {Tsu{-}Yang Wu and
                  Yuh{-}Min Tseng},
  title        = {Further analysis of pairing-based traitor tracing schemes for broadcast
                  encryption},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {1},
  pages        = {28--32},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.522},
  doi          = {10.1002/SEC.522},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WuT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/XuGLM13,
  author       = {Chang Xu and
                  Hua Guo and
                  Zhoujun Li and
                  Yi Mu},
  title        = {New construction of affiliation-hiding authenticated group key agreement},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {6},
  pages        = {723--734},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.606},
  doi          = {10.1002/SEC.606},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/XuGLM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YanZY13,
  author       = {Jingbo Yan and
                  Yuqing Zhang and
                  Dingning Yang},
  title        = {Structurized grammar-based fuzz testing for programs with highly structured
                  inputs},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {11},
  pages        = {1319--1330},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.714},
  doi          = {10.1002/SEC.714},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YanZY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YangWLL13,
  author       = {Chien{-}Chang Yang and
                  Kuo{-}Jui Wei and
                  Bo Li and
                  Jung{-}San Lee},
  title        = {{HORME:} hierarchical-object-relational medical management for electronic
                  record},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {10},
  pages        = {1261--1270},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.704},
  doi          = {10.1002/SEC.704},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YangWLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YangZHL13,
  author       = {Huan Yang and
                  Yuqing Zhang and
                  Yu{-}pu Hu and
                  Qixu Liu},
  title        = {{IKE} vulnerability discovery based on fuzzing},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {7},
  pages        = {889--901},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.628},
  doi          = {10.1002/SEC.628},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YangZHL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YehCW13,
  author       = {Her{-}Tyan Yeh and
                  Bing{-}Chang Chen and
                  Yi{-}Cong Wu},
  title        = {Mobile user authentication system in cloud environment},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {9},
  pages        = {1161--1168},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.688},
  doi          = {10.1002/SEC.688},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YehCW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YenGLD13,
  author       = {Chih{-}Ta Yen and
                  Ming{-}Huang Guo and
                  Nai{-}Wei Lo and
                  Der{-}Jiunn Deng},
  title        = {Authentication with low-cost {RFID} tags in mobile networks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {8},
  pages        = {1021--1027},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.667},
  doi          = {10.1002/SEC.667},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YenGLD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YuanHLC13,
  author       = {Wei Yuan and
                  Liang Hu and
                  Hongtu Li and
                  Jianfeng Chu},
  title        = {Secure event signature protocol for peer-to-peer massive multiplayer
                  online games using bilinear pairing},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {7},
  pages        = {881--888},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.627},
  doi          = {10.1002/SEC.627},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YuanHLC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZaraiDOK13,
  author       = {Faouzi Zarai and
                  Ikbel Daly and
                  Mohammad S. Obaidat and
                  Lotfi Kamoun},
  title        = {Secured and fast handoff in wireless mesh networks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {5},
  pages        = {644--657},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.596},
  doi          = {10.1002/SEC.596},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZaraiDOK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Zhang13,
  author       = {Xinpeng Zhang},
  title        = {Commutative reversible data hiding and encryption},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {11},
  pages        = {1396--1403},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.742},
  doi          = {10.1002/SEC.742},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Zhang13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangCC13,
  author       = {Jie Zhang and
                  Chen Chen and
                  Robin Cohen},
  title        = {Trust modeling for message relay control and local action decision
                  making in VANETs},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {1},
  pages        = {1--14},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.519},
  doi          = {10.1002/SEC.519},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangWQ13,
  author       = {Lei Zhang and
                  Qianhong Wu and
                  Bo Qin},
  title        = {Identity-based optimistic fair exchange in the standard model},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {8},
  pages        = {1010--1020},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.652},
  doi          = {10.1002/SEC.652},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangWQ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangYCT13,
  author       = {Mingwu Zhang and
                  Bo Yang and
                  Zhenhua Chen and
                  Tsuyoshi Takagi},
  title        = {Efficient and adaptively secure broadcast encryption systems},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {8},
  pages        = {1044--1052},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.678},
  doi          = {10.1002/SEC.678},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangYCT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhaoSWZ13,
  author       = {Hui Zhao and
                  Jonathan Z. Sun and
                  Fengying Wang and
                  Lei Zhao},
  title        = {A finite equivalence of multisecret sharing based on Lagrange interpolating
                  polynomial},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {9},
  pages        = {1169--1175},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.694},
  doi          = {10.1002/SEC.694},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhaoSWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhaoWW13,
  author       = {Zongqu Zhao and
                  Junfeng Wang and
                  Chonggang Wang},
  title        = {An unknown malware detection scheme based on the features of graph},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {2},
  pages        = {239--246},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.524},
  doi          = {10.1002/SEC.524},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhaoWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Zhioua13,
  author       = {Sami Zhioua},
  title        = {Tor traffic analysis using Hidden Markov Models},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {9},
  pages        = {1075--1086},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.669},
  doi          = {10.1002/SEC.669},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/Zhioua13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhuLYXW13,
  author       = {Liehuang Zhu and
                  Dan Liu and
                  Litao Yu and
                  Yuzhou Xie and
                  Mingzhong Wang},
  title        = {Content integrity and non-repudiation preserving audio-hiding scheme
                  based on robust digital signature},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {11},
  pages        = {1331--1343},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.715},
  doi          = {10.1002/SEC.715},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhuLYXW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics