Journal: Security and Communication Networks

Volume 9, Issue 10

943 -- 957Ruo Jun Cai, Xue Jun Li, Peter Han Joo Chong. A novel self-checking ad hoc routing scheme against active black hole attacks
958 -- 965Ilija Basicevic, Stanislav Ocovaj, Miroslav Popovic. The value of flow size distribution in entropy-based detection of DoS attacks
966 -- 976Liaojun Pang, Deyu Miao, Chunfeng Lian. User-friendly random-grid-based visual secret sharing for general access structures
977 -- 995Eric McCary, Yang Xiao. Home area network accountability with varying consumption devices in smart grid
996 -- 1006Kunpeng Bai, Chuankun Wu. A secure white-box SM4 implementation
1007 -- 1015Hong Zhong, Jie Cui, Runhua Shi, Chao Xia. Many-to-one homomorphic encryption scheme
1016 -- 1024Jiguo Li, Yuyan Guo, Qihong Yu, Yang Lu, Yichen Zhang. Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage
1025 -- 1039Bhawana Rudra, Om Prakash Vyas. Investigation of security issues for service-oriented network architecture
1040 -- 1049Wenli Shang, Peng Zeng, Ming Wan, Lin Li, Panfeng An. Intrusion detection algorithm based on OCSVM in industrial control system
1050 -- 1071Tonko Kovacevic, Toni Perkovic, Mario Cagalj. Flashing displays: user-friendly solution for bootstrapping secure associations between multiple constrained wireless devices
1072 -- 1084Zohreh Saffarian Eidgahi, Vahid Rafe. Security analysis of network protocols through model checking: a case study on mobile IPv6
1085 -- 1102Vankamamidi Srinivasa Naresh, Nistala V. E. S. Murthy. Provably secure group key agreement protocol based on ECDH with integrated signature
1103 -- 1118Tala Tafazzoli, Babak Sadeghiyan. A stochastic model for the size of worm origin
1119 -- 1131Boris Damjanovic, Dejan Simic. Tweakable parallel OFB mode of operation with delayed thread synchronization
1132 -- 1145Qussai Yaseen, Qutaibah Althebyan, Brajendra Panda, Yaser Jararweh. Mitigating insider threat in cloud relational databases
1146 -- 1157Shuo Chen, Maode Ma, Zhenxing Luo. An authentication scheme with identity-based cryptography for M2M security in cyber-physical systems
1158 -- 1172Shaghayegh Bakhtiari Chehelcheshmeh, Mehdi Hosseinzadeh. Quantum-resistance authentication in centralized cognitive radio networks
1173 -- 1185Yibin Dai, Shaozhen Chen. Security analysis of Khudra: a lightweight block cipher for FPGAs
1186 -- 1197Tzonelih Hwang, Prosanta Gope. PFX: an essence of authencryption for block-cipher security
1198 -- 1215Madhusanka Liyanage, Pardeep Kumar, Mika Ylianttila, Andrei V. Gurtov. Novel secure VPN architectures for LTE backhaul networks
1216 -- 1225Yilmaz Kaya, Ă–mer Faruk Ertugrul. A novel approach for spam email detection based on shifted binary patterns
1226 -- 1246Charalampos Manifavas, George Hatzivasilis, Konstantinos Fysarakis, Yannis Papaefstathiou. A survey of lightweight stream ciphers for embedded systems
1247 -- 1265Yefeng Ruan, Sivapriya Kalyanasundaram, Xukai Zou. Survey of return-oriented programming defense mechanisms