default search action
Security and Communication Networks, Volume 6
Volume 6, Number 1, January 2013
- Jie Zhang, Chen Chen, Robin Cohen:
Trust modeling for message relay control and local action decision making in VANETs. 1-14 - Humphrey Waita Njogu, Jiawei Luo, Jane Nduta Kiere:
Network specific vulnerability based alert reduction approach. 15-27 - Tsu-Yang Wu, Yuh-Min Tseng:
Further analysis of pairing-based traitor tracing schemes for broadcast encryption. 28-32 - Wei Wang, Ilona Murynets, Jeffrey Bickford, Christopher Van Wart, Gang Xu:
What you see predicts what you get - lightweight agent-based malware detection. 33-48 - Xixiang Lv, Hui Li, Baocang Wang:
Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks. 49-57 - Tao Gong, Bharat K. Bhargava:
Immunizing mobile ad hoc networks against collaborative attacks using cooperative immune model. 58-68 - Zhenhua Liu, Yupu Hu, Xiangsong Zhang, Fagen Li:
Efficient and strongly unforgeable identity-based signature scheme from lattices in the standard model. 69-77 - Emmanouil Magkos, Markos Avlonitis, Panayiotis Kotzanikolaou, Michalis Stefanidakis:
Toward early warning against Internet worms based on critical-sized networks. 78-88 - Yuanzhuo Wang, Jingyuan Li, Kun Meng, Chuang Lin, Xueqi Cheng:
Modeling and security analysis of enterprise network using attack-defense stochastic game Petri nets. 89-99 - Hsing-Chung Chen:
Secure multicast key protocol for electronic mail systems with providing perfect forward secrecy. 100-107 - Tzung-Her Chen, Bing-Jian Wang, Tai-Yuan Tu, Chih-Hung Wang:
A security-enhanced key agreement protocol based on chaotic maps. 108-114 - Mehdi Chehel Amirani, Mohsen Toorani, Sara Mihandoost:
Feature-based Type Identification of File Fragments. 115-128
Volume 6, Number 2, February 2013
- Laszlo Gyongyosi, Sándor Imre:
Information geometric security analysis of differential phase-shift quantum key distribution protocol. 129-150
- Hwajeong Seo, Kyung-Ah Shim, Howon Kim:
Performance enhancement of TinyECC based on multiplication optimizations. 151-160 - Hoda Jannati, Mahmoud Salmasizadeh, Javad Mohajeri, Amir Moradi:
Introducing proxy zero-knowledge proof and utilization in anonymous credential systems. 161-172 - Hongbing Wang, Zhenfu Cao:
More efficient CCA-secure unidirectional proxy re-encryption schemes without random oracles. 173-181 - Tao Hong, Mao-zhong Song, Yu Liu:
Directional spread-spectrum modulation signal for physical layer security communication applications. 182-193 - Marwan H. Abu-Amara, Abdulaziz Al-Baiz, Ashraf S. Mahmoud, Mohammed H. Sqalli, Farag Azzedin:
A scalable NAT-based solution to Internet access denial by higher-tier ISPs. 194-209 - Cong Jin, Shu-Wei Jin, Hua-Yong Tan:
Computer virus propagation model based on bounded rationality evolutionary game theory. 210-218 - Haitham S. Al-Sinani, Chris J. Mitchell:
Enabling interoperation between Shibboleth and Information Card systems. 219-229 - Guowei Wu, Xiaojie Chen, Mohammad S. Obaidat, Chi Lin:
A high efficient node capture attack algorithm in wireless sensor network based on route minimum key set. 230-238 - Zongqu Zhao, Junfeng Wang, Chonggang Wang:
An unknown malware detection scheme based on the features of graph. 239-246 - Zi-Yao Cheng, Yun Liu, Chin-Chen Chang, Shih-Chang Chang:
Authenticated RFID security mechanism based on chaotic maps. 247-256
Volume 6, Number 3, March 2013
- Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan, Wei Yu:
Blind detection of spread spectrum flow watermarks. 257-274 - Neminath Hubballi, Santosh Biswas, Sukumar Nandi:
Towards reducing false alarms in network intrusion detection systems with data summarization technique. 275-285 - Liana Khamis Qabajeh, Miss Laiha Mat Kiah, Mohammad Moustafa Qabajeh:
A more secure and scalable routing protocol for mobile ad hoc networks. 286-308 - Ciza Thomas:
Improving intrusion detection for imbalanced network traffic. 309-324 - Dongdong Sun, Colin Boyd, Juan Manuel González Nieto:
Predicate encryption for multi-inner-products. 325-339 - Qiong Pu, Jian Wang, Shuhua Wu:
Secure SIP authentication scheme supporting lawful interception. 340-350 - Baodong Qin, Shengli Liu:
Efficient chosen ciphertext secure public-key encryption under factoring assumption. 351-360 - Xuefeng Liu, Yuqing Zhang:
A privacy-preserving acceleration authentication protocol for mobile pay-TV systems. 361-372 - Ch. Aswani Kumar:
Designing role-based access control using formal concept analysis. 373-383
Volume 6, Number 4, April 2013
- Benahmed Khelifa, Madjid Merabti, Hafid Haffaf:
Distributed monitoring for misbehaviour detection in wireless sensor networks. 388-400 - Sanaa Taha, Xuemin (Sherman) Shen:
ALPP: anonymous and location privacy preserving scheme for mobile IPv6 heterogeneous networks. 401-419 - Paolo Ballarini, Lynda Mokdad, Quentin Monnet:
Modeling tools for detecting DoS attacks in WSNs. 420-436 - Yesica Imelda Saavedra Benitez, Jalel Ben-Othman, Jean-Pierre Claudé:
Performance comparison between IBE-HWMP and ECDSA-HWMP. 437-449 - Antonio Corradi, Mario Fanelli, Luca Foschini, Marcello Cinque:
Context data distribution with quality guarantees for Android-based mobile systems. 450-460 - Kashif Kifayat, Madjid Merabti, Qi Shi, Sohail Abbas:
Component-based security system (COMSEC) with QoS for wireless sensor networks. 461-472 - Kaouther Abrougui, Azzedine Boukerche:
Efficient group-based authentication protocol for location-based service discovery in intelligent transportation systems. 473-484 - Yingsong Huang, Shiwen Mao, Yihan Li:
On downlink power allocation for multiuser variable-bit-rate video streaming. 485-497 - Eric Southern, Abdelkader H. Ouda, Abdallah Shami:
Wireless security: securing mobile UMTS communications from interoperation of GSM. 498-508 - Szymon Szott, Marek Natkaniec, Andrzej R. Pach:
Improving QoS and security in wireless ad hoc networks by mitigating the impact of selfish behaviors: a game-theoretic approach. 509-522 - Soyoung Park, Baber Aslam, Damla Turgut, Cliff Changchun Zou:
Defense against Sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support. 523-538 - Farah I. Kandah, Yashaswi Singh, Weiyi Zhang, Chonggang Wang:
Mitigating colluding injected attack using monitoring verification in mobile ad-hoc networks. 539-547
Volume 6, Number 5, May 2013
- Namita Tiwari, Sahadeo Padhye:
Analysis on the generalization of proxy signature. 549-566
- Mohammed H. Sqalli, Syed Naeem Firdous, Khaled Salah, Marwan H. Abu-Amara:
Classifying malicious activities in Honeynets using entropy and volume-based thresholds. 567-583 - Chi Sing Chum, Xiaowen Zhang:
Hash function-based secret sharing scheme designs. 584-592 - Zuowen Tan:
Efficient pairing-free provably secure identity-based proxy blind signature scheme. 593-601 - Eun-Kyung Ryu, Kee-Young Yoo:
Certificateless broadcast authentication for vehicular ad hoc networks. 602-611 - Jingqiang Lin, Peng Liu, Jiwu Jing, Qiongxiao Wang:
Impossibility of finding any third family of server protocols integrating Byzantine quorum systems with threshold signature schemes. 612-630 - Xiaowei Li, Yuqing Zhang, Geifei Zhang:
A new certificateless authenticated key agreement protocol for SIP with different KGCs. 631-643 - Faouzi Zarai, Ikbel Daly, Mohammad S. Obaidat, Lotfi Kamoun:
Secured and fast handoff in wireless mesh networks. 644-657 - Liang Chen, Lansheng Han, Jiandu Jing, Dongping Hu:
A post-quantum provable data possession protocol in cloud. 658-667
Volume 6, Number 6, June 2013
- Osman Khalid, Samee Ullah Khan, Sajjad Ahmad Madani, Khizar Hayat, Majid Iqbal Khan, Nasro Min-Allah, Joanna Kolodziej, Lizhe Wang, Sherali Zeadally, Dan Chen:
Comparative study of trust and reputation systems for wireless sensor networks. 669-688
- Lifei Wei, Zhenfu Cao, Xiaolei Dong:
Secure identity-based multisignature schemes under quadratic residue assumptions. 689-701 - Suat Ozdemir, Yang Xiao:
FTDA: outlier detection-based fault-tolerant data aggregation for wireless sensor networks. 702-710 - Xiaowei Li, Yuqing Zhang:
A simple and robust anonymous two-factor authenticated key exchange protocol. 711-722 - Chang Xu, Hua Guo, Zhoujun Li, Yi Mu:
New construction of affiliation-hiding authenticated group key agreement. 723-734 - B. R. Purushothama, B. B. Amberker:
Secure group and multi-layer group communication schemes based on polynomial interpolation. 735-756 - Tzong-Sun Wu, Han-Yu Lin:
A novel probabilistic signature based on bilinear square Diffie-Hellman problem and its extension. 757-764 - Che-Jen Hsieh, Jung-Shian Li, Wei-Cheng Liu:
Digital evidence collection for web image access. 765-776 - Xiaonan Wang, Yi Mu:
A secure IPv6 address configuration scheme for a MANET. 777-789 - Zhenzhou Guo, Mingchu Li, Xinxin Fan:
Attribute-based ring signcryption scheme. 790-796
Volume 6, Number 7, July 2013
- Mansour Sheikhan, Maryam Sharifi Rad:
Using particle swarm optimization in fuzzy association rules-based feature selection and fuzzy ARTMAP-based attack recognition. 797-811 - Seongan Lim, Juhee Lee, Youngjoo An:
Key exposure free chameleon hash schemes based on discrete logarithm problem. 812-817 - Deguang Kong, Donghai Tian, Qiha Pan, Peng Liu, Dinghao Wu:
Semantic aware attribution analysis of remote exploits. 818-832 - Alina Olteanu, Yang Xiao, Jing Liu, Thomas M. Chen, C. L. Philip Chen:
Nonintrusive tracing in the Internet. 833-843 - Chia-Mei Chen, Sheng-Tzong Cheng, Ruei-Yu Zeng:
A proactive approach to intrusion detection and malware collection. 844-853 - Zuowen Tan:
A communication and computation-efficient three-party authenticated key agreement protocol. 854-863 - Shahriyar Mohammadi, Mohammad Hussein Sherkat, Mona Jamporazmey:
A taxonomy framework based on ITU-TX-805 security architecture for quantitative determination of computer network vulnerabilities. 864-880 - Wei Yuan, Liang Hu, Hongtu Li, Jianfeng Chu:
Secure event signature protocol for peer-to-peer massive multiplayer online games using bilinear pairing. 881-888 - Huan Yang, Yuqing Zhang, Yu-pu Hu, Qixu Liu:
IKE vulnerability discovery based on fuzzing. 889-901 - Meijiao Duan, Jing Xu, Dengguo Feng:
Efficient identity-based strong designated verifier signature schemes. 902-911 - Lize Gu, Licheng Wang, Kaoru Ota, Mianxiong Dong, Zhenfu Cao, Yixian Yang:
New public key cryptosystems based on non-Abelian factorization problems. 912-922
Volume 6, Number 8, August 2013
- Gianmarco Baldini, Igor Nai Fovino, Stefano Braghin, Alberto Trombetta:
Distributed access control policies for spectrum sharing. 925-935 - Lin Ding, Jie Guan:
Cryptanalysis of MICKEY family of stream ciphers. 936-941 - Xiannuan Liang, Yang Xiao, Suat Ozdemir, Athanasios V. Vasilakos, Hongmei Deng:
Cipher feedback mode under go-back-N and selective-reject protocols in error channels. 942-954 - Yi-Ning Liu, Jihong Yan:
A lightweight micropayment scheme based on Lagrange interpolation formula. 955-960 - Fatiha Djebbar, Beghdad Ayad, Karim Abed-Meraim, Habib Hamam:
Unified phase and magnitude speech spectra data hiding algorithm. 961-971 - Chin-Chen Chang, Shih-Chang Chang, Jen-Ho Yang:
A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment. 972-984 - Jingwei Li, Chunfu Jia, Zheli Liu, Zongqing Dong:
Cycle-walking revisited: consistency, security, and efficiency. 985-992 - Hung-Yu Chien, Chin-I Lee, Tzong-Chen Wu:
Comments on IMBAS: identity-based multi-user broadcast authentication in wireless sensor networks. 993-998 - Mahdi R. Alagheband, Mohammad Reza Aref:
Unified privacy analysis of new-found RFID authentication protocols. 999-1009 - Lei Zhang, Qianhong Wu, Bo Qin:
Identity-based optimistic fair exchange in the standard model. 1010-1020 - Chih-Ta Yen, Ming-Huang Guo, Nai-Wei Lo, Der-Jiunn Deng:
Authentication with low-cost RFID tags in mobile networks. 1021-1027 - Yan-Xiao Liu, Yuqing Zhang, Lein Harn, Yu-pu Hu:
Verifiable symmetric polynomial-based key distribution schemes. 1028-1034 - Ming-Huang Guo, Horng-Twu Liaw, Der-Jiunn Deng, Han-Chieh Chao:
Centralized group key management mechanism for VANET. 1035-1043 - Mingwu Zhang, Bo Yang, Zhenhua Chen, Tsuyoshi Takagi:
Efficient and adaptively secure broadcast encryption systems. 1044-1052
Volume 6, Number 9, September 2013
- Manish Kumar Thukral, Karma Sonam Sherpa:
Chaotic modulation-based spread spectrum communication using complex dynamics of chaotic DC-DC current mode controlled boost converter. 1053-1063 - Wenjuan An, Mangui Liang:
A new intrusion detection method based on SVM with minimum within-class scatter. 1064-1074 - Sami Zhioua:
Tor traffic analysis using Hidden Markov Models. 1075-1086 - Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan L. Clarke:
Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM). 1087-1116 - Fei Peng, Chen Li, Min Long:
A reversible watermark scheme for 2D vector map based on reversible contrast mapping. 1117-1125 - Xinxin Fan, Mingchu Li, Hui Zhao, Xiaodong Chen, Zhenzhou Guo, Dong Jiao, Weifeng Sun:
Peer cluster: a maximum flow-based trust mechanism in P2P file sharing networks. 1126-1142 - Ang Gao, Zengzhi Li:
Free global ID against collusion attack on multi-authority attribute-based encryption. 1143-1152 - Chithra Selvaraj, Sheila Anand:
Outlier detection in reputation management system for P2P networks using rough set theory. 1153-1160 - Her-Tyan Yeh, Bing-Chang Chen, Yi-Cong Wu:
Mobile user authentication system in cloud environment. 1161-1168 - Hui Zhao, Jonathan Z. Sun, Fengying Wang, Lei Zhao:
A finite equivalence of multisecret sharing based on Lagrange interpolating polynomial. 1169-1175
Volume 6, Number 10, October 2013
- Pablo Najera, Rodrigo Roman, Javier López:
User-centric secure integration of personal RFID tags and sensor networks. 1177-1197 - Juliano F. Kazienko, Igor Cesar Gonzalez Ribeiro, Igor M. Moraes, Célio Vinicius N. de Albuquerque:
SENSORLock: a lightweight key management scheme for wireless sensor networks. 1198-1210 - Hichem Sedjelmaci, Sidi-Mohammed Senouci, Mohammed Feham:
An efficient intrusion detection framework in cluster-based wireless sensor networks. 1211-1224 - Han-Wei Hsiao, Huey-Min Sun, Wei-Cheng Fan:
Detecting stepping-stone intrusion using association rule mining. 1225-1235 - Xiaoqi Jia, Rui Wang, Jun Jiang, Shengzhi Zhang, Peng Liu:
Defending return-oriented programming based on virtualization techniques. 1236-1249 - Tung-Tso Tsai, Yuh-Min Tseng, Tsu-Yang Wu:
Provably secure revocable ID-based signature in the standard model. 1250-1260 - Chien-Chang Yang, Kuo-Jui Wei, Bo Li, Jung-San Lee:
HORME: hierarchical-object-relational medical management for electronic record. 1261-1270 - Chih-Hung Chao, Ching-Fang Yang, Po-Ting Lin, Jung-Shian Li:
Novel distributed key revocation scheme for wireless sensor networks. 1271-1280 - Wenbo Shi:
A sealed-bid multi-attribute auction protocol with strong bid privacy and bidder privacy. 1281-1289 - Zongmin Cui, Hong Zhu, Lianhua Chi:
Lightweight key management on sensitive data in the cloud. 1290-1299
Volume 6, Number 11, November 2013
- Iraj Sadegh Amiri, Mehrnaz Nikmaram, Ali Shahidinejad, Jalil Ali:
Generation of potential wells used for quantum codes transmission via a TDMA network communication system. 1301-1309 - Mohsen Sharifi, Hadi Salimi, Ebrahim Asadi:
Alamut: a high-performance network intrusion detection system in support of virtualized environments. 1310-1318 - Jingbo Yan, Yuqing Zhang, Dingning Yang:
Structurized grammar-based fuzz testing for programs with highly structured inputs. 1319-1330 - Liehuang Zhu, Dan Liu, Litao Yu, Yuzhou Xie, Mingzhong Wang:
Content integrity and non-repudiation preserving audio-hiding scheme based on robust digital signature. 1331-1343 - Syh-Yuan Tan, Zhe Jin, Andrew Beng Jin Teoh:
Argument on biometrics identity-based encryption schemes. 1344-1352 - Tian-Fu Lee, I-Pin Chang, Ching-Cheng Wang:
Efficient three-party encrypted key exchange using trapdoor functions. 1353-1358 - Bin Wang, Qing Zhao:
Server-aided batch verification signature schemes in the multiple-signer setting. 1359-1366 - Amrita Ghosal, Sipra Das Bit:
A jamming-attack-defending data forwarding scheme based on channel surfing in wireless sensor networks. 1367-1388 - Abhishek Parakh:
A probabilistic quantum key transfer protocol. 1389-1395 - Xinpeng Zhang:
Commutative reversible data hiding and encryption. 1396-1403 - Tian-Fu Lee:
User authentication scheme with anonymity, unlinkability and untrackability for global mobility networks. 1404-1413
- Wojciech Mazurczyk, Krzysztof Szczypiorski, Hui Tian, Yali Liu:
Trends in modern information hiding: techniques, applications and detection. 1414-1415
Volume 6, Number 12, December 2013
- Devrim Unal, M. Ufuk Çaglayan:
XFPM-RBAC: XML-based specification language for security policies in multidomain mobile networks. 1420-1444 - Dichao Peng, Wei Chen, Qunsheng Peng:
TrustVis: visualizing trust toward attack identification in distributed computing environments. 1445-1459 - Fatemeh Raji, Ali Miri, Mohammad Davarpanah Jazi, Behzad Malek:
DEFF: a new architecture for private online social networks. 1460-1470 - Zhiwei Wang:
Improved group key transfer protocols from the protocol of Harn et al. 1471-1477 - Elias Bou-Harb, Makan Pourzandi, Mourad Debbabi, Chadi Assi:
A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks. 1478-1489 - Hung-Yu Chien, Chu-Sing Yang, Hung-Pin Hou:
Non-linearity cannot help RFID resist full-disclosure attacks and terrorist fraud attacks. 1490-1495 - Behzad Malek, Ali Miri:
Chaotic masking for securing RFID systems against relay attacks. 1496-1508 - He Liu, Mangui Liang:
Efficient identity-based hierarchical access authentication protocol for mobile network. 1509-1521
- Peng Liu, Refik Molva, Jiwu Jing:
Special issue on "security and privacy in pervasive and ubiquitous computing and communication systems". 1522-1523
- Issa Khalil, Saurabh Bagchi, Najah AbuAli, Mohammad Hayajneh:
DISA: Detection and isolation of sneaky attackers in locally monitored multi-hop wireless networks. 1524-1538 - Bazara I. A. Barry, H. Anthony Chan:
Architecture and performance evaluation of a hybrid intrusion detection system for IP telephony. 1539-1555 - Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim:
Attacking the kad network - real world evaluation and high fidelity simulation using DVN. 1556-1575 - Abhijit Bose, Kang G. Shin:
Agent-based modeling of malware dynamics in heterogeneous environments. 1576-1589 - Shawn Embleton, Sherri Sparks, Cliff Changchun Zou:
SMM rootkit: a new breed of OS independent malware. 1590-1605
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.