default search action
Security and Communication Networks, Volume 2017
Volume 2017, 2017
- Andronicus Ayobami Akinyelu, Aderemi Oluyinka Adewumi:
Improved Instance Selection Methods for Support Vector Machine Speed Optimization. 6790975:1-6790975:11 - Dapeng Man, Wu Yang, Shichang Xuan, Xiaojiang Du:
Thwarting Nonintrusive Occupancy Detection Attacks from Smart Meters. 5350201:1-5350201:9 - Jiguo Li, Fengjie Sha, Yichen Zhang, Xinyi Huang, Jian Shen:
Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length. 3596205:1-3596205:11 - Ankit Kumar Jain, Brij B. Gupta:
Phishing Detection: Analysis of Visual Similarity Based Approaches. 5421046:1-5421046:20 - Ying-Hao Hung, Yuh-Min Tseng, Sen-Shan Huang:
Revocable ID-Based Signature with Short Size over Lattices. 7571201:1-7571201:9 - Naveed Ahmed Azam:
A Novel Fuzzy Encryption Technique Based on Multiple Right Translated AES Gray S-Boxes and Phase Embedding. 5790189:1-5790189:9 - Dhanalakshmi Krishnan Sadhasivan, Kannapiran Balasubramanian:
A Fusion of Multiagent Functionalities for Effective Intrusion Detection System. 6216078:1-6216078:15 - Hongyan Cui, Xiaofei Liu, Tao Yu, Honggang Zhang, Yajun Fang, Zong-Guo Xia:
Cloud Service Scheduling Algorithm Research and Optimization. 2503153:1-2503153:7 - Je Sen Teh, Azman Samsudin:
A Chaos-Based Authenticated Cipher with Associated Data. 9040518:1-9040518:15 - Chalee Vorakulpipat, Soontorn Sirapaisan, Ekkachan Rattanalerdnusorn, Visut Savangsuk:
A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives. 2057260:1-2057260:11 - Yuan-Yu Tsai, Tsung-Chieh Cheng, Yao-Hsien Huang:
A Low-Complexity Region-Based Authentication Algorithm for 3D Polygonal Models. 1096463:1-1096463:11 - Nishaal J. Parmar, Pramode K. Verma:
A Comparative Evaluation of Algorithms in the Implementation of an Ultra-Secure Router-to-Router Key Exchange System. 1467614:1-1467614:7 - Jeyamala Chandrasekaran, S. J. Thiruvengadam:
A Hybrid Chaotic and Number Theoretic Approach for Securing DICOM Images. 6729896:1-6729896:12 - Gautam Kumar, Hemraj Saini:
Novel Noncommutative Cryptography Scheme Using Extra Special Group. 9036382:1-9036382:21 - Hector Santoyo-Garcia, Eduardo Fragoso-Navarro, Rogelio Reyes-Reyes, Clara Cruz-Ramos, Mariko Nakano-Miyatake:
Visible Watermarking Technique Based on Human Visual System for Single Sensor Digital Cameras. 7903198:1-7903198:18 - Murat Dener, Ömer Faruk Bay:
Practical Implementation of an Adaptive Detection-Defense Unit against Link Layer DoS Attacks for Wireless Sensor Networks. 1531928:1-1531928:9 - Mahalakshmi Gunasekaran, Subathra Periakaruppan:
GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack Detection in WSN. 9863032:1-9863032:10 - Probidita Roychoudhury, Basav Roychoudhury, Dilip Kumar Saikia:
Hierarchical Group Based Mutual Authentication and Key Agreement for Machine Type Communication in LTE and Future 5G Networks. 1701243:1-1701243:21 - Mervat Mikhail, Yasmine Abouelseoud, Galal A. Elkobrosy:
Two-Phase Image Encryption Scheme Based on FFCT and Fractals. 7367518:1-7367518:13 - Yiqin Lu, Meng Wang, Pengsen Huang:
An SDN-Based Authentication Mechanism for Securing Neighbor Discovery Protocol in IPv6. 5838657:1-5838657:9 - Xiaoming Hu, WenAn Tan, Huajie Xu, Jian Wang, Chuang Ma:
Strong Designated Verifier Signature Schemes with Undeniable Property and Their Applications. 7921782:1-7921782:9 - Seunghwan Chang, Hyang-Sook Lee, Juhee Lee, Seongan Lim:
Security Analysis of a Certificateless Signature from Lattices. 3413567:1-3413567:7 - Emir Husni:
Dynamic Rule Encryption for Mobile Payment. 4975302:1-4975302:11 - Dongmin Kim, Ik Rae Jeong:
Certificateless Public Auditing Protocol with Constant Verification Time. 6758618:1-6758618:14 - Ahmad Samer Wazan, Romain Laborde, David W. Chadwick, François Barrère, Abdelmalek Benzekri, Mustafa Kaiiali, Adib Habbal:
Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker. 6907146:1-6907146:23 - Mirko Köhler, Ivica Lukic, Visnja Krizanovic Cik:
Protecting Information with Subcodstanography. 9130683:1-9130683:13 - Trong-Minh Hoang, Van-Kien Bui, Thanh-Tra Nguyen:
The Performance Evaluation of an IEEE 802.11 Network Containing Misbehavior Nodes under Different Backoff Algorithms. 2459780:1-2459780:8 - Asish Kumar Dalai, Sanjay Kumar Jena:
Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications. 3825373:1-3825373:12 - Mohammad Ali Nematollahi, Chalee Vorakulpipat, Hamurabi Gamboa Rosales:
Optimization of a Blind Speech Watermarking Technique against Amplitude Scaling. 5454768:1-5454768:13 - Chien-Hua Tsai, Pin-Chang Su:
An ECC-Based Blind Signcryption Scheme for Multiple Digital Documents. 8981606:1-8981606:14 - Zheng Zhao, Fenlin Liu, Daofu Gong:
An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks. 1560594:1-1560594:12 - Anier Soria-Lorente, Stefan Berres:
A Secure Steganographic Algorithm Based on Frequency Domain for the Transmission of Hidden Information. 5397082:1-5397082:14 - Guoyong Han, Wenying Zhang:
Improved Biclique Cryptanalysis of the Lightweight Block Cipher Piccolo. 7589306:1-7589306:12 - Xingchun Yang, Chunxiang Xu, Chao Rong Li:
A Privacy Model for RFID Tag Ownership Transfer. 5084636:1-5084636:10 - Peng Li, Xiaotian Yu, He Xu, Jiewei Qian, Lu Dong, Huqing Nie:
Research on Secure Localization Model Based on Trust Valuation in Wireless Sensor Networks. 6102780:1-6102780:12 - Xiaoye Li, Jing Yang, Zhenlong Sun, Jianpei Zhang:
Differential Privacy for Edge Weights in Social Networks. 4267921:1-4267921:10 - Qingqing Gan, Xiaoming Wang, Daini Wu:
Revocable Key-Aggregate Cryptosystem for Data Sharing in Cloud. 2508693:1-2508693:11 - Vennila Ganesan, M. S. K. Manikandan:
A Secured Load Mitigation and Distribution Scheme for Securing SIP Server. 7821487:1-7821487:14 - Jingyu Hua, An Tang, Qingyun Pan, Kim-Kwang Raymond Choo, Hong Ding, Yizhi Ren:
Practical m-k-Anonymization for Collaborative Data Publishing without Trusted Third Party. 9532163:1-9532163:10 - Khairan D. Rajab:
New Hybrid Features Selection Method: A Case Study on Websites Phishing. 9838169:1-9838169:10 - Lan Liu, Ryan K. L. Ko, Guangming Ren, Xiaoping Xu:
Malware Propagation and Prevention Model for Time-Varying Community Networks within Software Defined Networks. 2910310:1-2910310:8 - Sang-Pil Kim, Myeong-Sun Gil, Hajin Kim, Mi-Jung Choi, Yang-Sae Moon, Hee-Sun Won:
Efficient Two-Step Protocol and Its Discriminative Feature Selections in Secure Similar Document Detection. 6841216:1-6841216:12 - Dina Shehada, Chan Yeob Yeun, M. Jamal Zemerly, Mahmoud Al-Qutayri, Yousof Al-Hammadi, Ernesto Damiani, Jiankun Hu:
BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications. 3606424:1-3606424:18 - Mohammed Abdulridha Hussain, Hai Jin, Zaid Alaa Hussien, Zaid Ameen Abduljabbar, Salah H. Abbdal, Ayad Ibrahim:
Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing. 9479476:1-9479476:15 - Jianxin Xu, Dongqin Feng:
Identification of ICS Security Risks toward the Analysis of Packet Interaction Characteristics Using State Sequence Matching Based on SF-FSM. 2430835:1-2430835:17 - An Wang, Yu Zhang, Liehuang Zhu, Weina Tian, Rixin Xu, Guoshuang Zhang:
RFA: R-Squared Fitting Analysis Model for Power Attack. 5098626:1-5098626:8 - Ju-Min Zhao, Ding Feng, Deng-ao Li, Wei Gong, Haoxiang Liu, Shimin Huo:
Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems. 8356983:1-8356983:9 - Lichen Zhang, Yingshu Li, Liang Wang, Junling Lu, Peng Li, Xiaoming Wang:
An Efficient Context-Aware Privacy Preserving Approach for Smartphones. 4842694:1-4842694:11 - Pan Yang, Xiaolin Gui, Jian An, Feng Tian:
An Efficient Secret Key Homomorphic Encryption Used in Image Processing Service. 7695751:1-7695751:11 - Yanping Xu, Chunhua Wu, Kangfeng Zheng, Xu Wang, Xinxin Niu, Tianliang Lu:
Computing Adaptive Feature Weights with PSO to Improve Android Malware Detection. 3284080:1-3284080:14 - Shihong Zou, Yanhong Xu, Honggang Wang, Zhouzhou Li, Shanzhi Chen, Bo Hu:
A Survey on Secure Wireless Body Area Networks. 3721234:1-3721234:9 - Jiaye Pan, Yi Zhuang:
PMCAP: A Threat Model of Process Memory Data on the Windows Operating System. 4621587:1-4621587:15 - Mansour Alsaleh, Noura Alomar, Monirah Alshreef, Abdulrahman Alarifi, AbdulMalik S. Al-Salman:
Performance-Based Comparative Assessment of Open Source Web Vulnerability Scanners. 6158107:1-6158107:14 - Xin Liu, Shundong Li, Xiubo Chen, Gang Xu, Xiaolin Zhang, Yong Zhou:
Efficient Solutions to Two-Party and Multiparty Millionaires' Problem. 5207386:1-5207386:11 - Pieter Robyns, Bram Bonné, Peter Quax, Wim Lamotte:
Noncooperative 802.11 MAC Layer Fingerprinting and Tracking of Mobile Devices. 6235484:1-6235484:21 - Hung-Yu Chien:
Group Authentication with Multiple Trials and Multiple Authentications. 3109624:1-3109624:7 - Changsheng Wan, Juan Zhang, Daoli Huang:
SCPR: Secure Crowdsourcing-Based Parking Reservation System. 1076419:1-1076419:9 - Zuochao Dou, Issa Khalil, Abdallah Khreishah:
CLAS: A Novel Communications Latency Based Authentication Scheme. 4286903:1-4286903:20 - Huiting Fan, Kai Xing, Lei Tan, Weikang Rui, Zhonghu Xu, Shuo Zhang, Jing Xu:
Privacy Preserved Self-Awareness on the Community via Crowd Sensing. 8026787:1-8026787:8 - Waqas Ahmed Imtiaz, Affaq Qamar, Atiq ur Rehman, Haider Ali, Adnan Rashid Chaudhry, Javed Iqbal:
Design and Analysis of Self-Healing Tree-Based Hybrid Spectral Amplitude Coding OCDMA System. 2524513:1-2524513:12 - Juha Partala:
Semantically Secure Symmetric Encryption with Error Correction for Distributed Storage. 4321296:1-4321296:10 - Hao Hu, Hongqi Zhang, Yuling Liu, Yongwei Wang:
Quantitative Method for Network Security Situation Based on Attack Prediction. 3407642:1-3407642:19 - Bingxin Zhu, Puwen Wei, Mingqiang Wang:
Adaptive Security of Broadcast Encryption, Revisited. 1404279:1-1404279:16 - Ran Ji, Jian Wang, Chaojing Tang, Ruilin Li:
Automatic Reverse Engineering of Private Flight Control Protocols of UAVs. 1308045:1-1308045:9 - Miguel Seijo Simó, Gregorio López López, José Ignacio Moreno:
Cybersecurity Vulnerability Analysis of the PLC PRIME Standard. 7369684:1-7369684:18 - Yuan Ping, Baocang Wang, Yuehua Yang, Shengli Tian:
Building Secure Public Key Encryption Scheme from Hidden Field Equations. 9289410:1-9289410:6 - Kai Fan, Panfei Song, Zhao Du, Haojin Zhu, Hui Li, Yintang Yang, Xinghua Li, Chao Yang:
NFC Secure Payment and Verification Scheme with CS E-Ticket. 4796373:1-4796373:9 - Xiangyang Zhu, Hua Dai, Xun Yi, Geng Yang, Xiao Li:
MUSE: An Efficient and Accurate Verifiable Privacy-Preserving Multikeyword Text Search over Encrypted Cloud Data. 1923476:1-1923476:17 - Chenyu Wang, Guoai Xu:
Cryptanalysis of Three Password-Based Remote User Authentication Schemes with Non-Tamper-Resistant Smart Card. 1619741:1-1619741:14 - Song Li, Jie Cui, Hong Zhong, Yiwen Zhang, Qiang He:
LEPA: A Lightweight and Efficient Public Auditing Scheme for Cloud-Assisted Wireless Body Sensor Networks. 4364376:1-4364376:16 - Guomin Zhou, Peng Zeng, Xiaohui Yuan, Siyuan Chen, Kim-Kwang Raymond Choo:
An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model. 1915239:1-1915239:7 - Caixue Zhou, Zhiqiang Zhao, Wan Zhou, Yuan Mei:
Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings. 8405879:1-8405879:17 - Anita Pradhan, Kolla Raja Sekhar, Gandharba Swain:
Adaptive PVD Steganography Using Horizontal, Vertical, and Diagonal Edges in Six-Pixel Blocks. 1924618:1-1924618:13 - Qinlong Huang, Licheng Wang, Yixian Yang:
Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities. 6426495:1-6426495:12 - Yi Liang, Zhipeng Cai, Qilong Han, Yingshu Li:
Location Privacy Leakage through Sensory Data. 7576307:1-7576307:12 - Rameez Asif, William J. Buchanan:
Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment. 7616847:1-7616847:10 - Chun-Juan Ouyang, Ming Leng, Jie-wu Xia, Huan Liu:
Vague Sets Security Measure for Steganographic System Based on High-Order Markov Model. 1790268:1-1790268:13 - Jingxuan Wang, Lucas C. K. Hui, Siu-Ming Yiu, Gang Zhou, Ruoqing Zhang:
F-DDIA: A Framework for Detecting Data Injection Attacks in Nonlinear Cyber-Physical Systems. 9602357:1-9602357:12 - Chao Yuan, Mixue Xu, Xueming Si:
Research on a New Signature Scheme on Blockchain. 4746586:1-4746586:10 - Ruhul Amin, SK Hafizul Islam, Muhammad Khurram Khan, Arijit Karati, Debasis Giri, Saru Kumari:
A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments. 5989151:1-5989151:15 - Zhihua Li, Ziyuan Li, Ning Yu, Steven Wen:
Locality-Based Visual Outlier Detection Algorithm for Time Series. 1869787:1-1869787:10 - Jiajun Shen, Dongqin Feng:
Stackelberg Interdependent Security Game in Distributed and Hierarchical Cyber-Physical Systems. 9017039:1-9017039:19 - Geovandro C. C. F. Pereira, Renan C. A. Alves, Felipe Leno da Silva, Roberto M. Azevedo, Bruno C. Albertini, Cíntia B. Margi:
Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems. 2046735:1-2046735:16 - Sufang Zhou, Shundong Li, Jiawei Dou, Yaling Geng, Xin Liu:
Efficient Secure Multiparty Subset Computation. 9717580:1-9717580:11 - Xin Wang, Dafang Zhang, Xin Su, Wenjia Li:
Mlifdect: Android Malware Detection Based on Parallel Machine Learning and Information Fusion. 6451260:1-6451260:14 - Yiyuan Luo, Xuejia Lai:
Improvements for Finding Impossible Differentials of Block Cipher Structures. 5980251:1-5980251:9 - Lein Harn, Ching-Fang Hsu:
A Novel Design of Membership Authentication and Group Key Establishment Protocol. 8547876:1-8547876:7 - Yu Liu, Huicong Liang, Wei Wang, Meiqin Wang:
New Linear Cryptanalysis of Chinese Commercial Block Cipher Standard SM4. 1461520:1-1461520:10 - Rong Ma, Zhenfu Cao, Xingkai Wang:
Efficient Asymmetric Index Encapsulation Scheme for Anonymous Content Centric Networking. 9248654:1-9248654:9 - Gang Han, Yu Yu, Xiangxue Li, Qifeng Zhou, Dong Zheng, Hui Li:
1-Resilient Boolean Functions on Even Variables with Almost Perfect Algebraic Immunity. 6268230:1-6268230:9 - Hongji Huang, Wanyou Sun, Jie Yang, Guan Gui:
Relay Selections for Security and Reliability in Mobile Communication Networks over Nakagami-m Fading Channels. 2569239:1-2569239:8 - Jiankuo Dong, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, Yuan Zhao:
Utilizing the Double-Precision Floating-Point Computing Power of GPUs for RSA Acceleration. 3508786:1-3508786:15 - Donghui Hu, Zhongjin Ma, Xiaotian Zhang, Peipei Li, Dengpan Ye, Baohong Ling:
The Concept Drift Problem in Android Malware Detection and Its Solution. 4956386:1-4956386:13 - Lukasz Krzywiecki, Tomasz Wlislocki:
Deniable Key Establishment Resistance against eKCI Attacks. 7810352:1-7810352:13 - Han Yan, Xiang Cheng, Sen Su, Siyao Zhang:
Authenticated Location-Aware Publish/Subscribe Services in Untrusted Outsourced Environments. 4215425:1-4215425:15 - Vitor Hugo Galhardo Moia, Marco Aurélio Amaral Henriques:
Similarity Digest Search: A Survey and Comparative Analysis of Strategies to Perform Known File Filtering Using Approximate Matching. 1306802:1-1306802:17 - Lein Harn, Ching-Fang Hsu, Zhe Xia, Junwei Zhou:
How to Share Secret Efficiently over Networks. 5437403:1-5437403:6 - Jongho Moon, Youngsook Lee, Jiye Kim, Dongho Won:
Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User. 1378128:1-1378128:13 - Nurmamat Helil, Kaysar Rahman:
CP-ABE Access Control Scheme for Sensitive Data Set Constraint with Hidden Access Policy and Constraint Policy. 2713595:1-2713595:13 - Xiaojuan Zhang, Xiutao Feng, Dongdai Lin:
Fault Attack on the Authenticated Cipher ACORN v2. 3834685:1-3834685:16 - Lu Zhou, Mingchao Liao, Cao Yuan, Haoyu Zhang:
Low-Rate DDoS Attack Detection Using Expectation of Packet Size. 3691629:1-3691629:14 - Iván García-Magariño, Raquel Lacuesta:
ABS-TrustSDN: An Agent-Based Simulator of Trust Strategies in Software-Defined Networks. 8575842:1-8575842:9 - Yanli Ren, Min Dong, Zhihua Niu, Xiaoni Du:
Noninteractive Verifiable Outsourcing Algorithm for Bilinear Pairing with Improved Checkability. 4892814:1-4892814:9 - Peipei Wang, Yun Cao, Xianfeng Zhao:
Segmentation Based Video Steganalysis to Detect Motion Vector Modification. 8051389:1-8051389:12 - Yuan Shi, Huanguo Zhang, Juan Wang, Feng Xiao, Jianwei Huang, Daochen Zha, Hongxin Hu, Fei Yan, Bo Zhao:
CHAOS: An SDN-Based Moving Target Defense System. 3659167:1-3659167:11 - Guomin Zhou, Peng Zeng, Xiaohui Yuan, Siyuan Chen, Kim-Kwang Raymond Choo:
Erratum to "An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model". 2041842:1 - Rafal Kozik, Michal Choras:
Pattern Extraction Algorithm for NetFlow-Based Botnet Activities Detection. 6047053:1-6047053:10 - Jie Zhang, Jie Chen, Aijun Ge, Chuangui Ma:
Shorter Decentralized Attribute-Based Encryption via Extended Dual System Groups. 7323158:1-7323158:19 - Fusheng Wu, Huanguo Zhang, Wengqing Wang, Jianwei Jia, Shi Yuan:
A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace. 7042835:1-7042835:15 - Mahmoud Khasawneh, Anjali Agarwal:
A Collaborative Approach for Monitoring Nodes Behavior during Spectrum Sensing to Mitigate Multiple Attacks in Cognitive Radio Networks. 3261058:1-3261058:16 - Elena Pagnin, Aikaterini Mitrokotsa:
Privacy-Preserving Biometric Authentication: Challenges and Directions. 7129505:1-7129505:9 - Tomasz Andrysiak, Lukasz Saganowski, Piotr Kiedrowski:
Predictive Abuse Detection for a PLC Smart Lighting Network Based on Automatically Created Models of Exponential Smoothing. 7892182:1-7892182:19 - Long Nguyen-Vu, Ngoc-Tu Chau, Seongeun Kang, Souhwan Jung:
Android Rooting: An Arms Race between Evasion and Detection. 4121765:1-4121765:13 - Guoyin Zhang, Liang Kou, Liguo Zhang, Chao Liu, Qingan Da, Jianguo Sun:
A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT. 3126010:1-3126010:12 - Jian Mao, Wenqian Tian, Yan Zhang, Jian Cui, Hanjun Ma, Jingdong Bian, Jianwei Liu, Jianhong Zhang:
Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment. 2948025:1-2948025:13 - Ivan Vaccari, Enrico Cambiaso, Maurizio Aiello:
Remotely Exploiting AT Command Attacks on ZigBee Networks. 1723658:1-1723658:9 - Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang, Lei Shu:
Authentication Protocols for Internet of Things: A Comprehensive Survey. 6562953:1-6562953:41 - Chao Yuan, Mixue Xu, Xueming Si:
Corrigendum to "Research on a New Signature Scheme on Blockchain". 8295275:1 - Rabia Riaz, Tae-Sun Chung, Sanam Shahla Rizvi, Nazish Yaqub:
BAS: The Biphase Authentication Scheme for Wireless Sensor Networks. 7041381:1-7041381:10 - Muhammad Hilmi Kamarudin, Carsten Maple, Tim Watson, Nader Sohrabi Safa:
A New Unified Intrusion Anomaly Detection in Identifying Unseen Web Attacks. 2539034:1-2539034:18 - Li Kuang, Yin Wang, Pengju Ma, Long Yu, Chuanbin Li, Lan Huang, Mengyao Zhu:
An Improved Privacy-Preserving Framework for Location-Based Services Based on Double Cloaking Regions with Supplementary Information Constraints. 7495974:1-7495974:15 - Xiaolong Xu, Xuan Zhao, Feng Ruan, Jie Zhang, Wei Tian, Wanchun Dou, Alex X. Liu:
Data Placement for Privacy-Aware Applications over Big Data in Hybrid Clouds. 2376484:1-2376484:15 - Shuo Li, Zhanjie Song, Wenhuan Lu, Daniel Sun, Jianguo Wei:
Parameterization of LSB in Self-Recovery Speech Watermarking Framework in Big Data Mining. 3847092:1-3847092:12 - Donghui Hu, Qiang Shen, Shengnan Zhou, Xueliang Liu, Yuqi Fan, Lina Wang:
Adaptive Steganalysis Based on Selection Region and Combined Convolutional Neural Networks. 2314860:1-2314860:9 - Hong Rong, Huimei Wang, Jian Liu, Jialu Hao, Ming Xian:
Privacy-Preserving k-Means Clustering under Multiowner Setting in Distributed Cloud Environments. 3910126:1-3910126:19 - Xiancui Xiao, Xiangwei Zheng, Yuang Zhang:
A Multidomain Survivable Virtual Network Mapping Algorithm. 5258010:1-5258010:12 - Ming-Hung Wang, Hanchi Wang, You-Ru Chen, Chin-Laung Lei:
Automatic Test Pattern Generator for Fuzzing Based on Finite State Machine. 7819590:1-7819590:11 - Junling Lu, Zhipeng Cai, Xiaoming Wang, Lichen Zhang, Zhuojun Duan:
An Edge Correlation Based Differentially Private Network Data Release Method. 8408253:1-8408253:14 - Vishal Sharma, Kyungroul Lee, Soonhyun Kwon, Jiyoon Kim, Hyungjoon Park, Kangbin Yim, Sun-Young Lee:
A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT. 4749085:1-4749085:24 - Yujia Liu, Weiming Zhang, Nenghai Yu:
Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth. 1897438:1-1897438:15 - Yang Yu, Jun Long, Zhiping Cai:
Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders. 4184196:1-4184196:10 - Qing Yang, Rongxing Lu, Yacine Challal, Maryline Laurent:
Security and Privacy in Emerging Wireless Networks. 5618742:1-5618742:2 - Wenjie Yang, Jian Weng, Weiqi Luo, Anjia Yang:
Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC. 5704865:1-5704865:8 - Abdul Razaq, Awais Yousaf, Umer Shuaib, Nasir Siddiqui, Atta Ullah, Adil Waheed:
A Novel Construction of Substitution Box Involving Coset Diagram and a Bijective Map. 5101934:1-5101934:16 - Wei Yin, Jadwiga Indulska, Hongjian Zhou:
Protecting Private Data by Honey Encryption. 6760532:1-6760532:9 - Tong Li, Yuhui Zheng, Ti Zhou:
Efficient Anonymous Authenticated Key Agreement Scheme for Wireless Body Area Networks. 4167549:1-4167549:8 - Mikel Iturbe, Iñaki Garitano, Urko Zurutuza, Roberto Uribeetxeberria:
Towards Large-Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends. 9150965:1-9150965:17 - Dhruti Sharma, Devesh C. Jinwala:
Multiuser Searchable Encryption with Token Freshness Verification. 6435138:1-6435138:16 - Feng Li, Yali Si, Ning Lu, Zhen Chen, Limin Shen:
A Security and Efficient Routing Scheme with Misbehavior Detection in Delay-Tolerant Networks. 2761486:1-2761486:16 - Mahdi Madani, Ilyas Benkhaddra, Camel Tanougast, Salim Chitroub, Loïc Siéler:
Digital Implementation of an Improved LTE Stream Cipher Snow-3G Based on Hyperchaotic PRNG. 5746976:1-5746976:15 - Tengfei Tu, Lu Rao, Hua Zhang, Qiaoyan Wen, Jia Xiao:
Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud. 4603237:1-4603237:17 - Fu-Hau Hsu, Chih-Wen Ou, Yanling Hwang, Ya-Ching Chang, Po-Ching Lin:
Detecting Web-Based Botnets Using Bot Communication Traffic Features. 5960307:1-5960307:11 - Xiaona Xia, Jiguo Yu, Shanshan Zhang, Shu Wu:
Trusted Service Scheduling and Optimization Strategy Design of Service Recommendation. 9192084:1-9192084:9 - Keyang Liu, Weiming Zhang, Xiaojuan Dong:
A Cloud-User Protocol Based on Ciphertext Watermarking Technology. 4376282:1-4376282:14 - Shuai Han, Shengli Liu, Lin Lyu:
Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption. 2148534:1-2148534:27 - Ji Li, Jianghong Wei, Wenfen Liu, Xuexian Hu:
PMDP: A Framework for Preserving Multiparty Data Privacy in Cloud Computing. 6097253:1-6097253:14 - Ke Yin:
Research on the Effectiveness Evaluation Model of the Prison Physical Protection System Based on Grey Analytic Hierarchy Process. 6207437:1-6207437:9 - Yi Liu, Hongqi Zhang, Jiang Liu, Yingjie Yang:
A New Approach for Delivering Customized Security Everywhere: Security Service Chain. 9534754:1-9534754:17 - Xing Guo, Shanshan Chen, Yiwen Zhang, Wei Li:
Service Composition Optimization Method Based on Parallel Particle Swarm Algorithm on Spark. 9097616:1-9097616:8 - Hao Chen, Tao Wang, Fan Zhang, Xinjie Zhao, Wei He, Lumin Xu, Yunfei Ma:
Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher. 8051728:1-8051728:15 - Jun Chen, Xiangyang Luo, Yanqing Guo, Yi Zhang, Daofu Gong:
A Survey on Breaking Technique of Text-Based CAPTCHA. 6898617:1-6898617:15 - Shin-Yan Chiou, Tsung-Ju Wang, Jiun-Ming Chen:
Design and Implementation of a Mobile Voting System Using a Novel Oblivious and Proxy Signature. 3075210:1-3075210:16 - Yang Zhou, Wei Ni, Kangfeng Zheng, Ren Ping Liu, Yixian Yang:
Scalable Node-Centric Route Mutation for Defense of Large-Scale Software-Defined Networks. 4651395:1-4651395:13 - Qian Meng, Jianfeng Ma, Kefei Chen, Yinbin Miao, Tengfei Yang:
Comparable Encryption Scheme over Encrypted Cloud Data in Internet of Everything. 6430850:1-6430850:11 - Ru Zhang, Yanyu Huo, Jianyi Liu, Fangyu Weng:
Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering. 7536381:1-7536381:9 - Zhen Liu, Huanyu Meng, Shuang Ren, Feng Liu:
Reliable Collaborative Filtering on Spatio-Temporal Privacy Data. 9127612:1-9127612:11
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.