Journal: Security and Communication Networks

Volume 9, Issue 1

5 -- 18Yongming Xie, Yan Zhang. A secure, service priority-based incentive scheme for delay tolerant networks
19 -- 26Mohsen Toorani. Cryptanalysis of a robust key agreement based on public key authentication
27 -- 33Mohammad Hossein Faghihi Sereshgi, Mohammad Dakhilalian, Mohsen Shakiba. Biclique cryptanalysis of MIBS-80 and PRESENT-80 block ciphers
34 -- 42Changhui Hu, Lidong Han, Siu-Ming Yiu. Efficient and secure multi-functional searchable symmetric encryption schemes
43 -- 53Yushu Zhang, Di Xiao, Kwok-Wo Wong, Jiantao Zhou, Sen Bai, Moting Su. Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization
54 -- 59Jianhong Zhang, Xubing Zhao, Jian Mao. et al.'s certificateless aggregate signature scheme
60 -- 71Xuping Zhang, Feng Ye, Sucheng Fan, Jinghong Guo, Guoliang Xu, Yi Qian. An adaptive security protocol for a wireless sensor-based monitoring network in smart grid transmission lines