Journal: Security and Communication Networks

Volume 9, Issue 7

587 -- 598Junjie Lv, Chen Zhao. Security analysis of online digital goods business based on stochastic game net model
599 -- 612Lukas Malina, Jan Hajny, Vaclav Zeman. Light-weight group signatures with time-bound membership
613 -- 621Wei Luo, Wenping Ma, Qiang Gao. A dynamic trust management system for wireless sensor networks
622 -- 633Dong Lai Fu, Xinguang Peng, Yuli Yang. Unbalanced tree-formed verification data for trusted platforms
634 -- 651Brindha Murugan, Ammasai Gounden Nanjappa Gounder, Sriram Manohar. A hybrid image encryption algorithm using chaos and Conway's game-of-life cellular automata
652 -- 666Tzer-Long Chen, Yu-Ting Liao, Yi-Fan Chang, Jen-Hung Hwang. Security approach to controlling access to personal health records in healthcare service
667 -- 679Tzonelih Hwang, Prosanta Gope. Robust stream-cipher mode of authenticated encryption for secure communication in wireless sensor network
680 -- 696Fuzhi Zhang, Honghong Chen. An ensemble method for detecting shilling attacks based on ordered item sequences
697 -- 0Yilei Wang, Zhe Liu, Qiuliang Xu. Corrigendum to "New Rational Parties Relying on Reputation"