Journal: Security and Communication Networks

Volume 9, Issue 14

2245 -- 2260Fatemeh Faraji Daneshgar, Maghsoud Abbaspour. Extracting fuzzy attack patterns using an online fuzzy adaptive alert correlation framework
2261 -- 2275Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler. Outsourcing secure two-party computation as a black box
2276 -- 2290Chun-Ta Li. A secure chaotic maps-based privacy-protection scheme for multi-server environments
2291 -- 2301Hongyuan Wang, Liehuang Zhu, Chang Xu, Yijia Lilong. A universal method for realizing non-repudiable provable data possession in cloud storage
2302 -- 2312Peixin Chen, Jinshu Su, BaoKang Zhao, Xiaofeng Wang, Ilsun You. An escrow-free online/offline HIBS scheme for privacy protection of people-centric sensing
2313 -- 2322Qilong Han, Bo Shao, Lijie Li, Zhiqiang Ma, Haitao Zhang, Xiaojiang Du. Publishing histograms with outliers under data differential privacy
2323 -- 2337Adrián Sánchez-Carmona, Sergi Robles, Carlos Borrego. Identity-based access control for pro-active message's DTN
2338 -- 2347Dinhtu Truong, Guang Cheng. Detecting domain-flux botnet based on DNS traffic features in managed network
2348 -- 2358Hee-Sun Won, Sang-Pil Kim, Sanghun Lee, Mi-Jung Choi, Yang-Sae Moon. Secure principal component analysis in multiple distributed nodes
2359 -- 2370Yuwen Qian, Ting Sun, Jun Li, Chang Fan, Hua-ju Song. Design and analysis of the covert channel implemented by behaviors of network users
2371 -- 2386Ming Li, Di Xiao, Hong Liu, Sen Bai. A recoverable chaos-based fragile watermarking with high PSNR preservation
2387 -- 2396Zhiwei Wang, Wenyang Liu. CP-ABE with outsourced decryption and directionally hidden policy
2397 -- 2411Yinghui Zhang, Jin Li 0002, Xiaofeng Chen 0001, Hui Li. Anonymous attribute-based proxy re-encryption for access control in cloud computing
2412 -- 2421Feng Wang, Chin-Chen Chang, Shih-Chang Chang. Robust off-line e-cash scheme with recoverability and anonymity revocation
2422 -- 2433Zhenhua Liu, Xiangsong Zhang, Yupu Hu, Tsuyoshi Takagi. Revocable and strongly unforgeable identity-based signature scheme in the standard model
2434 -- 2447Asif Iqbal Hajamydeen, Nur Izura Udzir. A refined filter for UHAD to improve anomaly detection
2448 -- 2475Anfeng Liu, Xiao Liu, Yuxin Liu. A comprehensive analysis for fair probability marking based traceback approach in WSNs
2476 -- 2483Chin-Chen Chang, Wei-yi Chen, Shih-Chang Chang. A highly efficient and secure electronic cash system based on secure sharing in cloud environment
2484 -- 2556Sunil Kumar, Kamlesh Dutta. Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges
2557 -- 2575Hassan Alizadeh, André Zúquete. Traffic classification for managing Applications' networking profiles