Journal: Security and Communication Networks

Volume 9, Issue 11

1271 -- 1284Yacine Rebahi, Mateusz Khalil, Simon Hohberg, Pascal Lorenz. An Android based new German eID solution for policy making processes
1285 -- 1296Unal Cavusoglu, Akif Akgul, Sezgin Kaçar, Ihsan Pehlivan, Ahmet Zengin. A novel chaos-based encryption algorithm over TCP data packet for secure communication
1297 -- 1308Eunsoo Seo, Gulustan Dogan, Tarek F. Abdelzaher, Theodore Brown. Root cause diagnosis in error-propagating networks
1309 -- 1320Hui Zhu, Xiaoxia Liu, Rongxing Lu, Hui Li. EPCS: an efficient and privacy-preserving classification service query framework for SVM
1321 -- 1330Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang. Cryptanalysis and improvement of a chaotic maps-based anonymous authenticated key agreement protocol for multiserver architecture
1331 -- 1339Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang. Robust anonymous two-factor authenticated key exchange scheme for mobile client-server environment
1340 -- 1352MingChu Li, Xiaodong Xu, Cheng Guo, Xing Tan. AD-ASGKA - authenticated dynamic protocols for asymmetric group key agreement
1353 -- 1358Liangliang Wang, Kefei Chen, Yu Long, Huige Wang. Cryptanalysis of a certificateless aggregate signature scheme
1359 -- 1373Ziwen Sun, Yao Wang, Gang Qu, Zhiping Zhou. A 3-D hand gesture signature based biometric authentication system for smartphones
1374 -- 1383Kamal Adli Mehr, Javad Musevi Niya. Security bootstrapping of mobile ad hoc networks using identity-based cryptography
1384 -- 1397Zuowen Tan. A privacy-preserving multi-server authenticated key-agreement scheme based on Chebyshev chaotic maps
1398 -- 1404Nan Run Zhou, Xiao Rong Liang, Zhihong Zhou, Ahmed Farouk. Relay selection scheme for amplify-and-forward cooperative communication system with artificial noise
1405 -- 1416Hai-Cheng Chu, Han-Chieh Chao. Testifying the digital artifacts for line application program under Mac OS X from the aspects of witness experts
1417 -- 1434Shifeng Sun, Dawu Gu, Shengli Liu. Efficient chosen ciphertext secure identity-based encryption against key leakage attacks
1435 -- 1449Junfeng Yu, Qingfeng Huang, Chee Hoo Yian. DroidScreening: a practical framework for real-world Android malware analysis
1450 -- 1461Ahmad M. Manasrah, Basim Najim Al-Din. Mapping private keys into one public key using binary matrices and masonic cipher: Caesar cipher as a case study
1462 -- 1476Dongwoo Kang, Jaewook Jung, Jongho Mun, Donghoon Lee, Younsung Choi, Dongho Won. Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain
1477 -- 1495Shashank Gupta, B. B. Gupta. JS-SAN: defense mechanism for HTML5-based web applications against javascript code injection vulnerabilities
1496 -- 1508Minhui Xue, Yong Liu, Keith W. Ross, Haifeng Qian. Thwarting location privacy protection in location-based social discovery services
1509 -- 1519Jiangtao Zhai, Mingqian Wang, Guangjie Liu, Yuewei Dai. JitterBug covert timing channel with sparse embedding
1520 -- 1534Yao Wang, Wan-Dong Cai, Pengcheng Wei. A deep learning approach for detecting malicious JavaScript code
1535 -- 1546Ismail San, Nuray At, Ibrahim Yakut, Huseyin Polat. Efficient paillier cryptoprocessor for privacy-preserving data mining
1547 -- 1552Hui Zhang. Insecurity of a certificateless aggregate signature scheme
1553 -- 1576Sohail Khan, Mohammad Nauman, Abu Talib Othman, Shahrulniza Musa, Toqeer Ali Syed. TSSDroid: realization of an efficient and usable TSS API for the Android software stack
1577 -- 1588Hsiao-Ling Wu, Chin-Chen Chang, Chin-Yu Sun. A secure authentication scheme with provable correctness for pay-TV systems
1589 -- 1612Sumit Kumar Debnath, Ratna Dutta. Towards fair mutual private set intersection with linear complexity
1613 -- 1629Chengyu Hu, Rupeng Yang, Pengtao Liu, Zuoxia Yu, Yongbin Zhou, Qiuliang Xu. Public-key encryption with keyword search secure against continual memory attacks