Journal: Security and Communication Networks

Volume 9, Issue 13

1877 -- 1889Aggeliki Sgora, Dimitrios D. Vergados, Periklis Chatzimisios. A survey on security and privacy issues in Wireless Mesh Networks
1890 -- 1904Xudong Ni, Junzhou Luo, Boying Zhang, Jin Teng, Xiaole Bai, Bo Liu 0004, Dong Xuan. A mobile phone-based physical-social location proof system for mobile social network service
1905 -- 1915Weiwei Jia, Haojin Zhu, Suguo Du, Xiaolei Dong, Zhenfu Cao. Cloud-based privacy-preserving aggregation architecture in multi-domain wireless networks
1916 -- 1927Xiong Li, Jianwei Niu, Muhammad Khurram Khan, Junguo Liao, Xiaoke Zhao. Robust three-factor remote user authentication scheme with key agreement for multimedia systems
1928 -- 1943Charles Z. Liew, Raymond Shaw, Lanlan Li. Protect biometric data with compound chaotic encryption
1944 -- 1957Letian Sha, Liwen He, Jianming Fu, Jing Sun, Pengwei Li. SDN-based Sensitive Information (SI) protection: sensitivity-degree measurement in software and data lifetime supervisor in software defined network
1958 -- 1970Kostas Giotis, Georgios Androulidakis, Vasilis Maglaris. A scalable anomaly detection and mitigation architecture for legacy networks via an OpenFlow middlebox
1971 -- 1982Jiseong Noh, Seunghyeon Lee, Jaehyun Park, Seungwon Shin, Brent ByungHoon Kang. Vulnerabilities of network OS and mitigation with state-based permission system
1983 -- 2001Mohammad Wazid, Ashok Kumar Das, Saru Kumari, Xiong Li, Fan Wu. Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS
2002 -- 2014Anmin Fu, Jianye Song, Shuai Li, Gongxuan Zhang, Yuqing Zhang. A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks
2015 -- 2023Guodong Ye, Xiaoling Huang. A secure image encryption algorithm based on chaotic maps and SHA-3
2024 -- 2031Mohamed Elhoseny, Xiaohui Yuan, Hamdy K. El-Minir, Alaa Mohamed Riad. An energy efficient encryption method for secure dynamic WSN
2032 -- 2041Nazrul Hoque, Dhruba K. Bhattacharyya, Jugal K. Kalita. FFSc: a novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysis
2042 -- 2050Tarek Moulahi, Sami Touil, Salem Nasri, Hervé Guyennet. Reliable relay-based broadcasting through formal concept analysis for WSNs
2051 -- 2058Hwajeong Seo, Zhe Liu 0001, Yasuyuki Nogami, Jongseok Choi, Howon Kim. Binary field multiplication on ARMv8
2059 -- 2069Cheng-Chi Lee, Chun-Ta Li, Shih-Ting Chiu, Shun-der Chen. Time-bound key-aggregate encryption for cloud storage
2070 -- 2092Ashok Kumar Das, Anil Kumar Sutrala, Saru Kumari, Vanga Odelu, Mohammad Wazid, Xiong Li. An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks
2093 -- 2099Weijia Xue, Tingting Lin, Xin Shun, Fenglei Xue, Xuejia Lai. On the estimation of the second largest eigenvalue of Markov ciphers
2100 -- 2114Daibin Wang, Hai Jin, Deqing Zou, Peng Xu, Tianqing Zhu, Gang Chen. Taming transitive permission attack via bytecode rewriting on Android application
2115 -- 2121Yanxiao Liu. n) secret sharing scheme with cheating detection
2122 -- 2134M. Prem Laxman Das, Jothi Rangasamy, R. Kabaleeshwaran. Refined Shacham-Waters ring signature scheme in Seo-Cheon framework
2135 -- 2142Rongrong Xi, Xiao-chun Yun, Zhiyu Hao, Yongzheng Zhang 0002. Quantitative threat situation assessment based on alert verification
2143 -- 2156Hong Zhu, Zhuolin Mei, Meiyi Xie. Identity-based key management for cloud computing
2157 -- 2172Yukun He, Guangyan Zhang, Jie Wu, Qiang Li. Understanding a prospective approach to designing malicious social bots
2173 -- 2185Abdulghani Ali Ahmed, Ali Safa Sadiq, Mohamad Fadli Zolkipli. Traceback model for identifying sources of distributed attacks in real time
2186 -- 2199Senthil Madasamy Nallakannu, Thiagarajan Revathi. PSO-based optimal peer selection approach for highly secure and trusted P2P system
2200 -- 2216Bassam Jamil Mohd, Thaier Hayajneh, Zaid Abu Khalaf, Khalil Mustafa Ahmad Yousef. Modeling and optimization of the lightweight HIGHT block cipher design with FPGA implementation
2217 -- 2221Han Shen, Jianhua Chen, Jian Shen, Debiao He. Cryptanalysis of a certificateless aggregate signature scheme with efficient verification
2222 -- 2239Abhinav Bhandari, Amrit Lal Sangal, Krishan Kumar Saluja. Characterizing flash events and distributed denial-of-service attacks: an empirical investigation