Journal: Security and Communication Networks

Volume 9, Issue 16

3049 -- 3058Keke Gai, Meikang Qiu, Lixin Tao, Yongxin Zhu. Intrusion detection techniques for mobile cloud computing in heterogeneous 5G
3059 -- 3069Zheng Yan, Peng Zhang, Athanasios V. Vasilakos. A security and trust framework for virtualized networks and software-defined networking
3070 -- 3082Raimo Kantola, Jesus Llorente Santos, Nicklas Beijar. Policy-based communications for 5G mobile with customer edge switching
3083 -- 3094Xin Huang, Paul Craig, Hangyu Lin, Zheng Yan. SecIoT: a security framework for the Internet of Things
3095 -- 3104Kai Fan, Yuanyuan Gong, Chen Liang, Hui Li 0006, Yintang Yang. Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G
3105 -- 3115Satyanarayana Vollala, Krishnan Geetha, Natarajan Ramasubramanian. Efficient modular exponential algorithms compatible with hardware implementation of public-key cryptography
3116 -- 3126Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng. Towards optimal leakage exploitation rate in template attacks
3127 -- 3140Yichuan Wang, Jianfeng Ma, Liumei Zhang, Wenjiang Ji, Di Lu, Xinhong Hei. Dynamic game model of botnet DDoS attack and defense
3141 -- 3151Haohao Nie, Yanping Li, Weifeng Chen, Yong Ding. NCLAS: a novel and efficient certificateless aggregate signature scheme
3152 -- 3166Arjumand Fatima, Yumna Ghazi, Muhammad Awais Shibli, Abdul Ghafoor Abassi. Towards Attribute-Centric Access Control: an ABAC versus RBAC argument
3167 -- 3177Hong Zhu, Bin Wu, Meiyi Xie. Privacy-preserving ranked neighbor query over encrypted graph data in the cloud
3178 -- 3189Zhongliu Zhuo, Xiaosong Zhang, Ruixing Li, Ting Chen, Jingzhong Zhang. A multi-granularity heuristic-combining approach for censorship circumvention activity identification
3190 -- 3196Bogyu Jang, Jaeseung Lee, Manhee Lee. Automatic system for measuring security risk of Android application from third party app store
3197 -- 3218Roger Jardí-Cedó, Jordi Castellà-Roca, Alexandre Viejo. Privacy-preserving electronic road pricing system for low emission zones with dynamic pricing
3219 -- 3228A. S. M. Touhidul Hasan, Qingshan Jiang, Jun Luo, Chengming Li, Lifei Chen. An effective value swapping method for privacy preserving data publishing
3229 -- 3238SK Hafizul Islam, Ashok Kumar Das, Muhammad Khurram Khan. Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor
3239 -- 3250Yangguang Tian, Guomin Yang, Yi Mu. Privacy-preserving grouping proof with key exchange in the multiple-party setting
3251 -- 3270Monowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita. E-LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric
3271 -- 3281Rajesh P. Barnwal, Soumya K. Ghosh. KITE: an efficient scheme for trust estimation and detection of errant nodes in vehicular cyber-physical systems
3282 -- 3295Muzaffar Rao, Thomas Newe, Ian Grout, Avijit Mathur. An FPGA-based reconfigurable IPSec AH core with efficient implementation of SHA-3 for high speed IoT applications
3296 -- 3308Yonglin Hao. Cryptanalysis of the LSH hash functions
3309 -- 3313Jinyong Chang, Honglong Dai, MaoZhi Xu, Rui Xue. Security analysis of a TESLA-based homomorphic MAC scheme for authentication in P2P live streaming system
3314 -- 3323Satyajit Mondal, Sraban Kumar Mohanty, Sukumar Nandi. Energy efficient secure communication architecture for wireless sensor network
3324 -- 3339Algimantas Venckauskas, Vytautas Stuikys, Robertas Damasevicius, Nerijus Jusas. Modelling of Internet of Things units for estimating security-energy-performance relationships for quality of service and environment awareness
3340 -- 3352Howard M. Heys. Error burst analysis of a statistical self-synchronizing mode of block ciphers
3353 -- 3364Gurbakshish Singh Toor, Maode Ma. Security enhancement for dynamic key refreshment in neighborhood area network of smart grid
3365 -- 3377BalaSuyambu Jeyaram, R. Radha, Rama Raghavan. New cellular automata-based image cryptosystem and a novel non-parametric pixel randomness test
3378 -- 3387Muhammad Muneer Umar, Amjad Mehmood, Houbing Song. SeCRoP: secure cluster head centered multi-hop routing protocol for mobile ad hoc networks
3388 -- 3400Fatemeh Tahmasbi, Neda Moghim, Mojtaba Mahdavi. Adaptive ternary timing covert channel in IEEE 802.11
3401 -- 3411Chenghua Tang, Yang Xiang, Yu Wang, Junyan Qian, Baohua Qiang. Detection and classification of anomaly intrusion using hierarchy clustering and SVM
3412 -- 3427Mungyu Bae, Jiyeon Lee, Suk-Kyu Lee, Hwangnam Kim. Securing mobile access with interactive image code and image key encryption
3428 -- 3443Lili Xu, Fan Wu. A novel three-factor authentication and key agreement scheme providing anonymity in global mobility networks
3444 -- 3451Dongmei Li, Xiaolei Dong, Zhenfu Cao. Secure and privacy-preserving pattern matching in outsourced computing
3452 -- 3466Jing Chen, Lihong Zhang, Kun He, Min Chen, RuiYing Du, Lina Wang. Message-locked proof of ownership and retrievability with remote repairing in cloud
3467 -- 3482Samant Saurabh, Ashok Singh Sairam. Increasing the effectiveness of packet marking schemes using wrap-around counting Bloom filter
3483 -- 3495Abdelfattah Amamra, Jean-Marc Robert, Andrien Abraham, Chamseddine Talhi. Generative versus discriminative classifiers for android anomaly-based detection system using system calls filtering and abstraction process
3496 -- 3508Aiqing Zhang, Abel Bacchus, Xiaodong Lin. Consent-based access control for secure and privacy-preserving health information exchange
3509 -- 3526Mehran Alidoost Nia, Reza Ebrahimi Atani, Benjamin Fabian, Eduard Babulak. On detecting unidentified network traffic using pattern-based random walk
3527 -- 3542Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Ashok Kumar Das, Muhammad Khurram Khan, Marimuthu Karuppiah, Renuka Baliyan. A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks
3543 -- 3557Lina Wang, Weijie Liu, Neeraj Kumar, Debiao He, Cheng Tan, Debin Gao. A novel covert channel detection method in cloud based on XSRM and improved event association algorithm
3558 -- 3569Sedat Akleylek, Muharrem Tolga Sakalli, Emir Öztürk, Andac Sahin Mesut, Gökhan Tuncay. Generating binary diffusion layers with maximum/high branch numbers and low search complexity
3570 -- 3584Shukai Liu, Xuexiong Yan, QingXian Wang, Qi Xi. A systematic study of content security policy in web applications
3585 -- 3601Zhide Chen, Jiyun Wu, Aniello Castiglione, Wei Wu. Human continuous activity recognition based on energy-efficient schemes considering cloud security technology
3602 -- 3617Xuelian Long, David Tipper, Yi Qian. A key management architecture and protocols for secure smart grid communications
3618 -- 3626Ayong Ye, Jianfei Sao, Qi Jian. A robust location fingerprint based on differential signal strength and dynamic linear interpolation
3627 -- 3632Fenghe Wang, Zhenhua Liu. Short and provable secure lattice-based signature scheme in the standard model
3633 -- 3645Yao Zhang, Zhiming Zheng 0001, Pawel Szalachowski, Qi Wang. Collusion-resilient broadcast encryption based on dual-evolving one-way function trees
3646 -- 3657Shungan Zhou, RuiYing Du, Jing Chen, Debiao He, Hua Deng. ESDR: an efficient and secure data repairing paradigm in cloud storage
3658 -- 3669Liangliang Wang, Junzuo Lai, Hu Xiong, Kefei Chen, Yu Long. Fuzzy certificateless signature
3670 -- 3687Ashok Kumar Das, Saru Kumari, Vanga Odelu, Xiong Li, Fan Wu, Xinyi Huang. Provably secure user authentication and key agreement scheme for wireless sensor networks
3688 -- 3702Yinghui Zhang, Dong Zheng, Qi Li, Jin Li 0002, Hui Li 0006. Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing
3703 -- 3712Manoj Kumar, Smita Agrawal. Reversible data hiding based on prediction error expansion using adjacent pixels
3713 -- 3723Changsheng Wan, Juan Zhang. Identity-based key management for wireless sensor networks using lagrange interpolation
3724 -- 3751Mohammad Masdari, Marzie Jalali. A survey and taxonomy of DoS attacks in cloud computing
3752 -- 3761Guoqiang Zhou, Kuang Wang, Chen Zhao, Guofu Zhou. A dynamic trust evaluation mechanism based on affective intensity computing
3762 -- 0Dheerendra Mishra, Ashok Kumar Das, Sourav Mukhopadhyay. An anonymous and secure biometric-based enterprise digital rights management system for mobile environment
3763 -- 3764Xiuzhen Cheng, Miroslaw Kutylowski, Kuai Xu, Haojin Zhu. Cyber security, crime, and forensics of wireless networks and applications
3765 -- 3776Jinguo Li, Mi Wen, Kejie Lu, Chunhua Gu. PIMRS: achieving privacy and integrity-preserving multi-owner ranked-keyword search over encrypted cloud data
3777 -- 3789Lei Zhang, Lifei Wei, Dongmei Huang, Kai Zhang, Mianxiong Dong, Kaoru Ota. MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing
3790 -- 3807Muhammad Irfan, Haider Abbas, Yunchuan Sun, Anam Sajid, Maruf Pasha. A framework for cloud forensics evidence collection and analysis using security information and event management
3808 -- 3820Yinbin Miao, Jiajia Liu, Jianfeng Ma. Efficient keyword search over encrypted data in multi-cloud setting
3821 -- 3832Kuai Xu, Feng Wang 0005, Xiaohua Jia. Secure the Internet, one home at a time
3833 -- 3843Wei Li 0059, Maya Larson, Chunqiang Hu, Ruinian Li, Xiuzhen Cheng, Rongfang Bie. Secure multi-unit sealed first-price auction mechanisms
3844 -- 3853Lichen Zhang, Xiaoming Wang, Junling Lu, Peng Li, Zhipeng Cai. An efficient privacy preserving data aggregation approach for mobile sensing
3854 -- 3867Chengzhe Lai, Rongxing Lu, Dong Zheng. SPGS: a secure and privacy-preserving group setup framework for platoon-based vehicular cyber-physical systems
3868 -- 3879Qingshui Xue, Fengying Li, Huafeng Chen, Huajun Zhang, Zhenfu Cao. Multi-proxy multi-signature binding positioning protocol
3880 -- 3892Qilin Qi, Aaron Sharp, Dongming Peng, Yaoqing Yang, Hamid Sharif. Generic attack against robust steganography based on spring transform and geometrization
3893 -- 3910Datong Xu, Pinyi Ren, Qinghe Du, Li Sun. Active jamming for multi-user information security improvement with the access statuses of users
3911 -- 3921Chaoqun Yang, Heng Zhang, Fengzhong Qu, Zhiguo Shi. Secured measurement fusion scheme against deceptive ECM attack in radar network