3049 | -- | 3058 | Keke Gai, Meikang Qiu, Lixin Tao, Yongxin Zhu. Intrusion detection techniques for mobile cloud computing in heterogeneous 5G |
3059 | -- | 3069 | Zheng Yan, Peng Zhang, Athanasios V. Vasilakos. A security and trust framework for virtualized networks and software-defined networking |
3070 | -- | 3082 | Raimo Kantola, Jesus Llorente Santos, Nicklas Beijar. Policy-based communications for 5G mobile with customer edge switching |
3083 | -- | 3094 | Xin Huang, Paul Craig, Hangyu Lin, Zheng Yan. SecIoT: a security framework for the Internet of Things |
3095 | -- | 3104 | Kai Fan, Yuanyuan Gong, Chen Liang, Hui Li 0006, Yintang Yang. Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G |
3105 | -- | 3115 | Satyanarayana Vollala, Krishnan Geetha, Natarajan Ramasubramanian. Efficient modular exponential algorithms compatible with hardware implementation of public-key cryptography |
3116 | -- | 3126 | Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng. Towards optimal leakage exploitation rate in template attacks |
3127 | -- | 3140 | Yichuan Wang, Jianfeng Ma, Liumei Zhang, Wenjiang Ji, Di Lu, Xinhong Hei. Dynamic game model of botnet DDoS attack and defense |
3141 | -- | 3151 | Haohao Nie, Yanping Li, Weifeng Chen, Yong Ding. NCLAS: a novel and efficient certificateless aggregate signature scheme |
3152 | -- | 3166 | Arjumand Fatima, Yumna Ghazi, Muhammad Awais Shibli, Abdul Ghafoor Abassi. Towards Attribute-Centric Access Control: an ABAC versus RBAC argument |
3167 | -- | 3177 | Hong Zhu, Bin Wu, Meiyi Xie. Privacy-preserving ranked neighbor query over encrypted graph data in the cloud |
3178 | -- | 3189 | Zhongliu Zhuo, Xiaosong Zhang, Ruixing Li, Ting Chen, Jingzhong Zhang. A multi-granularity heuristic-combining approach for censorship circumvention activity identification |
3190 | -- | 3196 | Bogyu Jang, Jaeseung Lee, Manhee Lee. Automatic system for measuring security risk of Android application from third party app store |
3197 | -- | 3218 | Roger Jardí-Cedó, Jordi Castellà-Roca, Alexandre Viejo. Privacy-preserving electronic road pricing system for low emission zones with dynamic pricing |
3219 | -- | 3228 | A. S. M. Touhidul Hasan, Qingshan Jiang, Jun Luo, Chengming Li, Lifei Chen. An effective value swapping method for privacy preserving data publishing |
3229 | -- | 3238 | SK Hafizul Islam, Ashok Kumar Das, Muhammad Khurram Khan. Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor |
3239 | -- | 3250 | Yangguang Tian, Guomin Yang, Yi Mu. Privacy-preserving grouping proof with key exchange in the multiple-party setting |
3251 | -- | 3270 | Monowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita. E-LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric |
3271 | -- | 3281 | Rajesh P. Barnwal, Soumya K. Ghosh. KITE: an efficient scheme for trust estimation and detection of errant nodes in vehicular cyber-physical systems |
3282 | -- | 3295 | Muzaffar Rao, Thomas Newe, Ian Grout, Avijit Mathur. An FPGA-based reconfigurable IPSec AH core with efficient implementation of SHA-3 for high speed IoT applications |
3296 | -- | 3308 | Yonglin Hao. Cryptanalysis of the LSH hash functions |
3309 | -- | 3313 | Jinyong Chang, Honglong Dai, MaoZhi Xu, Rui Xue. Security analysis of a TESLA-based homomorphic MAC scheme for authentication in P2P live streaming system |
3314 | -- | 3323 | Satyajit Mondal, Sraban Kumar Mohanty, Sukumar Nandi. Energy efficient secure communication architecture for wireless sensor network |
3324 | -- | 3339 | Algimantas Venckauskas, Vytautas Stuikys, Robertas Damasevicius, Nerijus Jusas. Modelling of Internet of Things units for estimating security-energy-performance relationships for quality of service and environment awareness |
3340 | -- | 3352 | Howard M. Heys. Error burst analysis of a statistical self-synchronizing mode of block ciphers |
3353 | -- | 3364 | Gurbakshish Singh Toor, Maode Ma. Security enhancement for dynamic key refreshment in neighborhood area network of smart grid |
3365 | -- | 3377 | BalaSuyambu Jeyaram, R. Radha, Rama Raghavan. New cellular automata-based image cryptosystem and a novel non-parametric pixel randomness test |
3378 | -- | 3387 | Muhammad Muneer Umar, Amjad Mehmood, Houbing Song. SeCRoP: secure cluster head centered multi-hop routing protocol for mobile ad hoc networks |
3388 | -- | 3400 | Fatemeh Tahmasbi, Neda Moghim, Mojtaba Mahdavi. Adaptive ternary timing covert channel in IEEE 802.11 |
3401 | -- | 3411 | Chenghua Tang, Yang Xiang, Yu Wang, Junyan Qian, Baohua Qiang. Detection and classification of anomaly intrusion using hierarchy clustering and SVM |
3412 | -- | 3427 | Mungyu Bae, Jiyeon Lee, Suk-Kyu Lee, Hwangnam Kim. Securing mobile access with interactive image code and image key encryption |
3428 | -- | 3443 | Lili Xu, Fan Wu. A novel three-factor authentication and key agreement scheme providing anonymity in global mobility networks |
3444 | -- | 3451 | Dongmei Li, Xiaolei Dong, Zhenfu Cao. Secure and privacy-preserving pattern matching in outsourced computing |
3452 | -- | 3466 | Jing Chen, Lihong Zhang, Kun He, Min Chen, RuiYing Du, Lina Wang. Message-locked proof of ownership and retrievability with remote repairing in cloud |
3467 | -- | 3482 | Samant Saurabh, Ashok Singh Sairam. Increasing the effectiveness of packet marking schemes using wrap-around counting Bloom filter |
3483 | -- | 3495 | Abdelfattah Amamra, Jean-Marc Robert, Andrien Abraham, Chamseddine Talhi. Generative versus discriminative classifiers for android anomaly-based detection system using system calls filtering and abstraction process |
3496 | -- | 3508 | Aiqing Zhang, Abel Bacchus, Xiaodong Lin. Consent-based access control for secure and privacy-preserving health information exchange |
3509 | -- | 3526 | Mehran Alidoost Nia, Reza Ebrahimi Atani, Benjamin Fabian, Eduard Babulak. On detecting unidentified network traffic using pattern-based random walk |
3527 | -- | 3542 | Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Ashok Kumar Das, Muhammad Khurram Khan, Marimuthu Karuppiah, Renuka Baliyan. A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks |
3543 | -- | 3557 | Lina Wang, Weijie Liu, Neeraj Kumar, Debiao He, Cheng Tan, Debin Gao. A novel covert channel detection method in cloud based on XSRM and improved event association algorithm |
3558 | -- | 3569 | Sedat Akleylek, Muharrem Tolga Sakalli, Emir Öztürk, Andac Sahin Mesut, Gökhan Tuncay. Generating binary diffusion layers with maximum/high branch numbers and low search complexity |
3570 | -- | 3584 | Shukai Liu, Xuexiong Yan, QingXian Wang, Qi Xi. A systematic study of content security policy in web applications |
3585 | -- | 3601 | Zhide Chen, Jiyun Wu, Aniello Castiglione, Wei Wu. Human continuous activity recognition based on energy-efficient schemes considering cloud security technology |
3602 | -- | 3617 | Xuelian Long, David Tipper, Yi Qian. A key management architecture and protocols for secure smart grid communications |
3618 | -- | 3626 | Ayong Ye, Jianfei Sao, Qi Jian. A robust location fingerprint based on differential signal strength and dynamic linear interpolation |
3627 | -- | 3632 | Fenghe Wang, Zhenhua Liu. Short and provable secure lattice-based signature scheme in the standard model |
3633 | -- | 3645 | Yao Zhang, Zhiming Zheng 0001, Pawel Szalachowski, Qi Wang. Collusion-resilient broadcast encryption based on dual-evolving one-way function trees |
3646 | -- | 3657 | Shungan Zhou, RuiYing Du, Jing Chen, Debiao He, Hua Deng. ESDR: an efficient and secure data repairing paradigm in cloud storage |
3658 | -- | 3669 | Liangliang Wang, Junzuo Lai, Hu Xiong, Kefei Chen, Yu Long. Fuzzy certificateless signature |
3670 | -- | 3687 | Ashok Kumar Das, Saru Kumari, Vanga Odelu, Xiong Li, Fan Wu, Xinyi Huang. Provably secure user authentication and key agreement scheme for wireless sensor networks |
3688 | -- | 3702 | Yinghui Zhang, Dong Zheng, Qi Li, Jin Li 0002, Hui Li 0006. Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing |
3703 | -- | 3712 | Manoj Kumar, Smita Agrawal. Reversible data hiding based on prediction error expansion using adjacent pixels |
3713 | -- | 3723 | Changsheng Wan, Juan Zhang. Identity-based key management for wireless sensor networks using lagrange interpolation |
3724 | -- | 3751 | Mohammad Masdari, Marzie Jalali. A survey and taxonomy of DoS attacks in cloud computing |
3752 | -- | 3761 | Guoqiang Zhou, Kuang Wang, Chen Zhao, Guofu Zhou. A dynamic trust evaluation mechanism based on affective intensity computing |
3762 | -- | 0 | Dheerendra Mishra, Ashok Kumar Das, Sourav Mukhopadhyay. An anonymous and secure biometric-based enterprise digital rights management system for mobile environment |
3763 | -- | 3764 | Xiuzhen Cheng, Miroslaw Kutylowski, Kuai Xu, Haojin Zhu. Cyber security, crime, and forensics of wireless networks and applications |
3765 | -- | 3776 | Jinguo Li, Mi Wen, Kejie Lu, Chunhua Gu. PIMRS: achieving privacy and integrity-preserving multi-owner ranked-keyword search over encrypted cloud data |
3777 | -- | 3789 | Lei Zhang, Lifei Wei, Dongmei Huang, Kai Zhang, Mianxiong Dong, Kaoru Ota. MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing |
3790 | -- | 3807 | Muhammad Irfan, Haider Abbas, Yunchuan Sun, Anam Sajid, Maruf Pasha. A framework for cloud forensics evidence collection and analysis using security information and event management |
3808 | -- | 3820 | Yinbin Miao, Jiajia Liu, Jianfeng Ma. Efficient keyword search over encrypted data in multi-cloud setting |
3821 | -- | 3832 | Kuai Xu, Feng Wang 0005, Xiaohua Jia. Secure the Internet, one home at a time |
3833 | -- | 3843 | Wei Li 0059, Maya Larson, Chunqiang Hu, Ruinian Li, Xiuzhen Cheng, Rongfang Bie. Secure multi-unit sealed first-price auction mechanisms |
3844 | -- | 3853 | Lichen Zhang, Xiaoming Wang, Junling Lu, Peng Li, Zhipeng Cai. An efficient privacy preserving data aggregation approach for mobile sensing |
3854 | -- | 3867 | Chengzhe Lai, Rongxing Lu, Dong Zheng. SPGS: a secure and privacy-preserving group setup framework for platoon-based vehicular cyber-physical systems |
3868 | -- | 3879 | Qingshui Xue, Fengying Li, Huafeng Chen, Huajun Zhang, Zhenfu Cao. Multi-proxy multi-signature binding positioning protocol |
3880 | -- | 3892 | Qilin Qi, Aaron Sharp, Dongming Peng, Yaoqing Yang, Hamid Sharif. Generic attack against robust steganography based on spring transform and geometrization |
3893 | -- | 3910 | Datong Xu, Pinyi Ren, Qinghe Du, Li Sun. Active jamming for multi-user information security improvement with the access statuses of users |
3911 | -- | 3921 | Chaoqun Yang, Heng Zhang, Fengzhong Qu, Zhiguo Shi. Secured measurement fusion scheme against deceptive ECM attack in radar network |