Journal: Computer Communications

Volume 34, Issue 3

223 -- 225Jong Hyuk Park, Sheikh Iqbal Ahamed, Willy Susilo, Michela Taufer. Special issue of computer communications on information and future communication security
226 -- 235Georgios Kambourakis, Constantinos Kolias, Stefanos Gritzalis, Jong Hyuk Park. DoS attacks exploiting signaling in UMTS and IMS
236 -- 240Ming-Huang Guo, Horng-Twu Liaw, Der-Jiunn Deng, Han-Chieh Chao. An RFID secure authentication mechanism in WLAN
241 -- 249Yufeng Wang, Akihiro Nakao, Athanasios V. Vasilakos, Jianhua Ma. P2P soft security: On evolutionary dynamics of P2P incentive mechanism
250 -- 256Yu-Yi Chen, Meng-Lin Tsai, Jinn-ke Jan. The design of RFID access control protocol using the strategy of indefinite-index and challenge-response
257 -- 263Ying Sun, Chunxiang Xu, Yong Yu, Bo Yang. Improvement of a proxy multi-signature scheme without random oracles
264 -- 273Qixu Liu, Yuqing Zhang. VRSS: A new system for rating and scoring vulnerabilities
274 -- 280Ren-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei. Robust authentication and key agreement scheme preserving the privacy of secret key
281 -- 294Sudip Misra, Ankur Vaish. Reputation-based role assignment for role-based access control in wireless sensor networks
295 -- 304Jong Sik Moon, Im-Yeong Lee. An AAA scheme using ID-based ticket with anonymity in future mobile communication
305 -- 309Muhammad Khurram Khan, Soo-Kyun Kim, Khaled Alghathbar. Cryptanalysis and security enhancement of a more efficient & secure dynamic ID-based remote user authentication scheme
310 -- 318Bo-Chao Cheng, Ryh-Yuh Tseng. A Context Adaptive Intrusion Detection System for MANET
319 -- 325Jing Xu, Wen Tao Zhu, Dengguo Feng. An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks
326 -- 336Binod Vaidya, Jong Hyuk Park, Sang-Soo Yeo, Joel J. P. C. Rodrigues. Robust one-time password authentication scheme using smart card for home network environment
337 -- 341Tzu-Chang Yeh, Chien-Hung Wu, Yuh-Min Tseng. Improvement of the RFID authentication scheme based on quadratic residues
342 -- 343The Anh Pham. The improvement of the knapsack cipher
344 -- 352Zhengping Jin, Qiaoyan Wen. Certificateless multi-proxy signature
353 -- 357Taek-Young Youn, Changhoon Lee, Young-Ho Park. An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes
358 -- 366Jia Zhang, Hai-Xin Duan, Wu Liu, Jianping Wu. Anonymity analysis of P2P anonymous communication systems
367 -- 374Daojing He, Maode Ma, Yan Zhang, Chun Chen, Jiajun Bu. A strong user authentication scheme with smart cards for wireless communications
375 -- 383Jian Wang, Yanheng Liu, Yu Jiao. Novel access and remediation scheme in hierarchical trusted network
384 -- 390Dang Nguyen Duc, Kwangjo Kim. Defending RFID authentication protocols against DoS attacks
391 -- 397Jung-Sik Cho, Sang-Soo Yeo, Sung Kwon Kim. Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value
398 -- 406Mieso K. Denko, Tao Sun, Isaac Woungang. Trust management in ubiquitous computing: A Bayesian approach
407 -- 422Dwaine E. Clarke. Design and implementation of a public key-based group collaboration system
423 -- 428Longjiang Li, Yuming Mao, Supeng Leng. Privacy addressing and autoconfiguration for mobile ad hoc networks
429 -- 435Liang Zhou, Athanasios V. Vasilakos, Naixue Xiong, Yan Zhang, Shiguo Lian. Scheduling security-critical multimedia applications in heterogeneous networks
436 -- 446Qi Zhang, Yi Mu, Minjie Zhang. Attribute-based authentication for multi-agent systems with dynamic groups
447 -- 456Lo-Yao Yeh, Yen-Cheng Chen, Jiun-Long Huang. PAACP: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks
457 -- 467Lars Völker, Marcel Noe, Oliver P. Waldhorst, Christoph Werle, Christoph Sorge. Can internet users protect themselves? Challenges and techniques of automated protection of HTTP communication
468 -- 484Zubair A. Baig. Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks
485 -- 493Leonardo B. Oliveira, Diego F. Aranha, Conrado Porto Lopes Gouvêa, Michael Scott, Danilo F. Cåmara, Julio López, Ricardo Dahab. TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
494 -- 501Zhenhua Liu, Yupu Hu, Xiangsong Zhang, Hua Ma. Provably secure multi-proxy signature scheme with revocation in the standard model
502 -- 514Wei Lu, Goaletsa Rammidi, Ali A. Ghorbani. Clustering botnet communication traffic based on n-gram feature selection
515 -- 523Roberto Di Pietro, Alexandre Viejo. Location privacy and resilience in wireless sensor networks querying