Journal: Security and Communication Networks

Volume 4, Issue 6

601 -- 607Lu Xiao, Gregory G. Rose. Attacks on a lightweight cipher based on a multiple recursive generator
608 -- 621Georgios Androulidakis, Symeon Papavassiliou. Two-stage selective sampling for anomaly detection: analysis and evaluation
622 -- 632Xia Yin, Zhiliang Wang, Chuanming Jing, Jianping Wu. A formal approach to robustness testing of network protocol with time constraints
633 -- 650Divya Muthukumaran, Joshua Schiffman, Mohamed Hassan, Anuj Sawani, Vikhyath Rao, Trent Jaeger. Protecting the integrity of trusted applications in mobile phone systems
651 -- 665Ahmad Samer Wazan, Romain Laborde, François Barrère, Abdelmalek Benzekri. A formal model of trust for calculating the quality of X.509 certificate
666 -- 677Sudip Misra, P. Venkata Krishna, Kiran Isaac Abraham. A stochastic learning automata-based solution for intrusion detection in vehicular ::::ad hoc:::: networks
678 -- 684Xiaodong Lin. A provably secure threshold signature scheme based on DDH assumption
685 -- 696Wen Gu, Pramode K. Verma, Stamatios V. Kartalopoulos. A unified security framework for WiMAX over EPON access networks
697 -- 718Abdelrahman Desoky. Matlist: Mature linguistic steganography methodology
719 -- 726Patrick Traynor, Chaitrali Amrutkar, Vikhyath Rao, Trent Jaeger, Patrick McDaniel, Thomas F. La Porta. From mobile phones to responsible devices