1877 | -- | 1889 | Aggeliki Sgora, Dimitrios D. Vergados, Periklis Chatzimisios. A survey on security and privacy issues in Wireless Mesh Networks |
1890 | -- | 1904 | Xudong Ni, Junzhou Luo, Boying Zhang, Jin Teng, Xiaole Bai, Bo Liu 0004, Dong Xuan. A mobile phone-based physical-social location proof system for mobile social network service |
1905 | -- | 1915 | Weiwei Jia, Haojin Zhu, Suguo Du, Xiaolei Dong, Zhenfu Cao. Cloud-based privacy-preserving aggregation architecture in multi-domain wireless networks |
1916 | -- | 1927 | Xiong Li, Jianwei Niu, Muhammad Khurram Khan, Junguo Liao, Xiaoke Zhao. Robust three-factor remote user authentication scheme with key agreement for multimedia systems |
1928 | -- | 1943 | Charles Z. Liew, Raymond Shaw, Lanlan Li. Protect biometric data with compound chaotic encryption |
1944 | -- | 1957 | Letian Sha, Liwen He, Jianming Fu, Jing Sun, Pengwei Li. SDN-based Sensitive Information (SI) protection: sensitivity-degree measurement in software and data lifetime supervisor in software defined network |
1958 | -- | 1970 | Kostas Giotis, Georgios Androulidakis, Vasilis Maglaris. A scalable anomaly detection and mitigation architecture for legacy networks via an OpenFlow middlebox |
1971 | -- | 1982 | Jiseong Noh, Seunghyeon Lee, Jaehyun Park, Seungwon Shin, Brent ByungHoon Kang. Vulnerabilities of network OS and mitigation with state-based permission system |
1983 | -- | 2001 | Mohammad Wazid, Ashok Kumar Das, Saru Kumari, Xiong Li, Fan Wu. Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS |
2002 | -- | 2014 | Anmin Fu, Jianye Song, Shuai Li, Gongxuan Zhang, Yuqing Zhang. A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks |
2015 | -- | 2023 | Guodong Ye, Xiaoling Huang. A secure image encryption algorithm based on chaotic maps and SHA-3 |
2024 | -- | 2031 | Mohamed Elhoseny, Xiaohui Yuan, Hamdy K. El-Minir, Alaa Mohamed Riad. An energy efficient encryption method for secure dynamic WSN |
2032 | -- | 2041 | Nazrul Hoque, Dhruba K. Bhattacharyya, Jugal K. Kalita. FFSc: a novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysis |
2042 | -- | 2050 | Tarek Moulahi, Sami Touil, Salem Nasri, Hervé Guyennet. Reliable relay-based broadcasting through formal concept analysis for WSNs |
2051 | -- | 2058 | Hwajeong Seo, Zhe Liu 0001, Yasuyuki Nogami, Jongseok Choi, Howon Kim. Binary field multiplication on ARMv8 |
2059 | -- | 2069 | Cheng-Chi Lee, Chun-Ta Li, Shih-Ting Chiu, Shun-der Chen. Time-bound key-aggregate encryption for cloud storage |
2070 | -- | 2092 | Ashok Kumar Das, Anil Kumar Sutrala, Saru Kumari, Vanga Odelu, Mohammad Wazid, Xiong Li. An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks |
2093 | -- | 2099 | Weijia Xue, Tingting Lin, Xin Shun, Fenglei Xue, Xuejia Lai. On the estimation of the second largest eigenvalue of Markov ciphers |
2100 | -- | 2114 | Daibin Wang, Hai Jin, Deqing Zou, Peng Xu, Tianqing Zhu, Gang Chen. Taming transitive permission attack via bytecode rewriting on Android application |
2115 | -- | 2121 | Yanxiao Liu. n) secret sharing scheme with cheating detection |
2122 | -- | 2134 | M. Prem Laxman Das, Jothi Rangasamy, R. Kabaleeshwaran. Refined Shacham-Waters ring signature scheme in Seo-Cheon framework |
2135 | -- | 2142 | Rongrong Xi, Xiao-chun Yun, Zhiyu Hao, Yongzheng Zhang 0002. Quantitative threat situation assessment based on alert verification |
2143 | -- | 2156 | Hong Zhu, Zhuolin Mei, Meiyi Xie. Identity-based key management for cloud computing |
2157 | -- | 2172 | Yukun He, Guangyan Zhang, Jie Wu, Qiang Li. Understanding a prospective approach to designing malicious social bots |
2173 | -- | 2185 | Abdulghani Ali Ahmed, Ali Safa Sadiq, Mohamad Fadli Zolkipli. Traceback model for identifying sources of distributed attacks in real time |
2186 | -- | 2199 | Senthil Madasamy Nallakannu, Thiagarajan Revathi. PSO-based optimal peer selection approach for highly secure and trusted P2P system |
2200 | -- | 2216 | Bassam Jamil Mohd, Thaier Hayajneh, Zaid Abu Khalaf, Khalil Mustafa Ahmad Yousef. Modeling and optimization of the lightweight HIGHT block cipher design with FPGA implementation |
2217 | -- | 2221 | Han Shen, Jianhua Chen, Jian Shen, Debiao He. Cryptanalysis of a certificateless aggregate signature scheme with efficient verification |
2222 | -- | 2239 | Abhinav Bhandari, Amrit Lal Sangal, Krishan Kumar Saluja. Characterizing flash events and distributed denial-of-service attacks: an empirical investigation |