Journal: Security and Communication Networks

Volume 4, Issue 9

979 -- 980Sudip Misra, Mieso K. Denko, Hussein Mouftah. Security challenges in emerging and next-generation wireless communication networks
981 -- 993Padmalochan Bera, Soumya Kanti Ghosh, Pallab Dasgupta. A WLAN security management framework based on formal spatio-temporal RBAC model
994 -- 1002Sandhya Khurana, Neelima Gupta. ad hoc networks against wormhole attacks
1003 -- 1012Amit Shirsat, Bharat Bhargava. Local geometric algorithm for hole boundary detection in sensor networks
1013 -- 1026Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, Jinfang Jiang, Lei Shu, Guangjie Han. An efficient approach of secure group association management in densely deployed heterogeneous distributed sensor network
1027 -- 1043R. Aparna, B. B. Amberker. An efficient scheme to handle bursty behavior in secure group communication using binomial key trees
1044 -- 1062Hai-Cheng Chu, Der-Jiunn Deng, Han-Chieh Chao. WLM 8.1 via check point methodology within corporate intranet in future communication security
1063 -- 1074Jung-Shian Li, Che-Jen Hsieh, Chih-Ying Chang, Naveen Chilamkurti. Improved IPsec performance utilizing transport-layer-aware compression architecture
1075 -- 1087Jahangir H. Sarker, Hussein T. Mouftah. A self-stabilized random access protocol against denial of service attack in wireless networks

Volume 4, Issue 8

793 -- 806Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini. TOGBAD - an approach to detect routing attacks in tactical environments
807 -- 814Wassim El-Hajj, Hazem M. Hajj, Zouheir Trabelsi, Fadi A. Aloul. Updating snort with a customized controller to thwart port scanning
815 -- 824Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang. A robust user authentication scheme with self-certificates for wireless sensor networks
825 -- 838D. A. Knox, C. Adams. Digital credentials with privacy-preserving delegation
839 -- 869Adel Ali Ahmed, Norsheila Fisal. Secure real-time routing protocol with load distribution in wireless sensor networks
860 -- 870Lei Wu, Jerome Harrington, Corey Kuwanoe, Cliff Changchun Zou. Harnessing the power of BitTorrent for distributed denial-of-service attacks
871 -- 887Alexander J. O Ree, Mohammad S. Obaidat. Security enhancements for UDDI
888 -- 901Thaier Hayajneh, Razvi Doomun, Prashant Krishnamurthy, David Tipper. Source - destination obfuscation in wireless ::::ad hoc::::networks
902 -- 909Jiankun Hu, Xuan Dau Hoang, Ibrahim Khalil. An embedded DSP hardware encryption module for secure e-commerce transactions
910 -- 918Ming-Yang Su, Sheng-Cheng Yeh. A study on the prevention of sniffing nodes in mobile ::::ad hoc:::: networks
919 -- 936Fazirulhisyam Hashim, Abbas Jamalipour. A generic sampling framework for improving anomaly detection in the next generation network
937 -- 946Haitham Rashwan, Ernst M. Gabidulin, Bahram Honary. Security of the GPT cryptosystem and its applications to cryptography
947 -- 965Asaf Shabtai, Dennis Potashnik, Yuval Fledel, Robert Moskovitch, Yuval Elovici. Monitoring, analysis, and filtering system for purifying network traffic of known and unknown malicious content
966 -- 978Yanling Chen, A. J. Han Vinck. Secrecy coding for the binary symmetric wiretap channel

Volume 4, Issue 7

727 -- 728Naveen K. Chilamkurti, Ben Soh, Tai-Hoon Kim. Special issue on security and privacy in wireless systems
729 -- 743Leonidas Kazatzopoulos, Constantinos Delakouridis, Giannis F. Marias. A privacy-aware overlay routing scheme in WSNs
744 -- 762Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi V. Mancini. Secure topology maintenance and events collection in WSNs
763 -- 770Avinash Srinivasan. SecLoc - secure localization in WSNs using CDS
771 -- 784Zhengming Li, Chunxiao Chigan. RAMV: ensuring resource-aware message verification in VANETs
785 -- 791Hesiri Weerasinghe, Raymond Tackett, Huirong Fu. Verifying position and velocity for vehicular ad-hoc networks

Volume 4, Issue 6

601 -- 607Lu Xiao, Gregory G. Rose. Attacks on a lightweight cipher based on a multiple recursive generator
608 -- 621Georgios Androulidakis, Symeon Papavassiliou. Two-stage selective sampling for anomaly detection: analysis and evaluation
622 -- 632Xia Yin, Zhiliang Wang, Chuanming Jing, Jianping Wu. A formal approach to robustness testing of network protocol with time constraints
633 -- 650Divya Muthukumaran, Joshua Schiffman, Mohamed Hassan, Anuj Sawani, Vikhyath Rao, Trent Jaeger. Protecting the integrity of trusted applications in mobile phone systems
651 -- 665Ahmad Samer Wazan, Romain Laborde, François Barrère, Abdelmalek Benzekri. A formal model of trust for calculating the quality of X.509 certificate
666 -- 677Sudip Misra, P. Venkata Krishna, Kiran Isaac Abraham. A stochastic learning automata-based solution for intrusion detection in vehicular ::::ad hoc:::: networks
678 -- 684Xiaodong Lin. A provably secure threshold signature scheme based on DDH assumption
685 -- 696Wen Gu, Pramode K. Verma, Stamatios V. Kartalopoulos. A unified security framework for WiMAX over EPON access networks
697 -- 718Abdelrahman Desoky. Matlist: Mature linguistic steganography methodology
719 -- 726Patrick Traynor, Chaitrali Amrutkar, Vikhyath Rao, Trent Jaeger, Patrick McDaniel, Thomas F. La Porta. From mobile phones to responsible devices

Volume 4, Issue 5

483 -- 486Jiankun Hu, Vijayakumar Bhagavatula, Mohammed Bennamoun, Kar-Ann Toh. Biometric security for mobile computing
487 -- 499Kai Xi, Tohari Ahmad, Fengling Han, Jiankun Hu. A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment
500 -- 514Byounggyu Choi, Youngsung Kim, Kar-Ann Toh. Fusion of visual and infrared face verification systems
515 -- 524Fahim Sufi, Fengling Han, Ibrahim Khalil, Jiankun Hu. A chaos-based encryption technique to protect ECG packets for time critical telecardiology applications
525 -- 539Foteini Agrafioti, Francis Minhthang Bui, Dimitrios Hatzinakos. Medical biometrics in mobile health monitoring
540 -- 547Hwee Keong Lam, Zujun Hou, Wei-Yun Yau, Tai Pang Chen, Jun Li, K. Y. Sim. A topological interpretation of fingerprint reference point
548 -- 562Julien Bringer, Hervé Chabanne, Bruno Kindarji. Identification with encrypted biometric data
563 -- 576Arathi Arakala, K. J. Horadam, Jason Jeffers, Serdar Boztas. Protection of minutiae-based templates using biocryptographic constructs in the set difference metric
577 -- 590S. M. Prasad, V. K. Govindan, P. S. Sathidevi. Palmprint authentication using fusion of wavelet and contourlet features
591 -- 599Zujun Hou, Wei-Yun Yau, Yue Wang. A review on fingerprint orientation estimation

Volume 4, Issue 4

347 -- 356Quoc-Cuong Le, Patrick Bellot. A novel approach to build QKD relaying models
357 -- 371Jieyan Fan, Dapeng Wu, Antonio Nucci, Ram Keralapura, Lixin Gao. Protocol oblivious classification of multimedia traffic
372 -- 383Fang Qi, Zhe Tang, Guojun Wang, Jie Wu. SSL-enabled trusted communication: Spoofing and protecting the non-cautious users
384 -- 394Sourour Meharouech, Adel Bouhoula, Tarek Abbes. Trusted intrusion detection architecture for high-speed networks based on traffic classification, load balancing and high availability mechanism
395 -- 409Shao-Hsiu Hung, Jui-Hung Yeh, Jyh-Cheng Chen. sRAMP: secure reconfigurable architecture and mobility platform
410 -- 417Subrat Kumar Dash, Krupa Sagar Reddy, Arun K. Pujari. Adaptive Naive Bayes method for masquerade detection
418 -- 427Sandeep K. Sood, Anil Kumar Sarje, Kuldip Singh. Dynamic identity-based single password anti-phishing protocol
428 -- 435Franjieh El Khoury, Marcel Egea, Nada Meskaoui, Nagi Wakim. An iris recognition model for secured access to data
436 -- 446Han-Ching Wu, Shou-Hsuan Stephen Huang. Packet-based algorithms for stepping-stone detection with chaff perturbation
447 -- 459S. H. Arisar, Andrew H. Kemp. A comprehensive investigation of secure location estimation techniques for WSN applications
460 -- 470Hongyan Yao. Role-based authentication protocol
471 -- 481R. Rajavelsamy, Jicheol Lee, Sungho Choi. Towards security architecture for Home (evolved) NodeB: challenges, requirements and solutions

Volume 4, Issue 3

239 -- 241Matteo Cesana, Azzedine Boukerche, Albert Y. Zomaya. Security for QoS assured wireless and mobile networks
242 -- 256Fabio Martignon, Stefano Paris, Antonio Capone. DSA-Mesh: a distributed security architecture for wireless mesh networks
257 -- 266Thomas Gamer, Lars Völker, Martina Zitterbart. Differentiated security in wireless mesh networks
267 -- 283Rodolphe Marques, Edgar Araújo, André Zúquete. Fast 802.11 handovers with 802.1X reauthentications
284 -- 298Soufiene Djahel, Farid Naït-Abdesselam, Damla Turgut. Characterizing the greedy behavior in wireless ::::ad hoc:::: networks
299 -- 315Gabriele Cecchetti, Anna Lina Ruscelli. Real-time support for HCCA function in IEEE 802.11e networks: a performance evaluation
316 -- 328Soon-Young Oh, Gustavo Marfia, Mario Gerla. MANET QoS support without reservations
329 -- 346Dario Rossi, Roberta Fracchia, Michela Meo. On the quality of broadcast services in vehicular ::::ad hoc:::: networks

Volume 4, Issue 2

109 -- 121Tran Thanh Dai, Johnson I. Agbinya. Combating key-swapping collusion attack on random pairwise key pre-distribution schemes for wireless sensor networks
122 -- 135Jun Shao, Zhenfu Cao, Peng Liu. SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption
136 -- 146Khaled Salah, Karim Sattar, Mohammed H. Sqalli, Ehab Al-Shaer. A potential low-rate DoS attack against network firewalls
147 -- 161Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis. Synthesis of attack actions using model checking for the verification of security protocols
162 -- 180Ashok Kumar Das. An efficient random key distribution scheme for large-scale distributed sensor networks
181 -- 194N. K. Sreelaja, G. A. Vijayalakshmi Pai. Swarm intelligence based key generation for stream cipher
207 -- 215Mohsen Toorani, Abolfazl Falahati. A secure cryptosystem based on affine transformation
216 -- 238Suleyman Kondakci, Cemali Dinçer. Internet epidemiology: healthy, susceptible, infected, quarantined, and recovered

Volume 4, Issue 12

1369 -- 1377Qian Chen, Jun Tian, Lei Yang, Dapeng Wu. A robust video hash scheme based on 2D-DCT temporal maximum occurrence
1378 -- 1386Lei Yang, Qian Chen, Jun Tian, Dapeng Wu. Content based image hashing using companding and gray code
1387 -- 1404Mahmoud Mostafa, Anas Abou El Kalam, Mohamed Maachaoui, Noureddine Idboufker. Specification, implementation and performance evaluation of the QoS-friendly encapsulating security payload (Q-ESP) protocol
1405 -- 1419Hisham Dahshan, James Irvine. ad hoc networks
1420 -- 1439Mohamed Younis, Osama Farrag, Sookyoung Lee, William D'Amico. Optimized packet formation in multi-level security wireless data acquisition networks
1440 -- 1447Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen. An efficient and provably secure public key encryption scheme based on coding theory
1448 -- 1460Einar Petana, Sanjeev Kumar. TCP SYN-based DDoS attack on EKG signals monitored via a wireless sensor network
1461 -- 1468Hui Zhao, MingChu Li, Xinxin Fan. A formal separation method of protocols to eliminate parallel attacks in virtual organization
1469 -- 1482Marshall Riley, Kemal Akkaya, Kenny Fong. Group-based hybrid authentication scheme for cooperative collision warnings in VANETs
1483 -- 1494Xuejiao Liu, Chengfang Fang, Debao Xiao. Intrusion diagnosis and prediction with expert system

Volume 4, Issue 11

1231 -- 1242Petros Belsis, Dimitris Vassis, Christos Skourlas. ad hoc assistive medical environments
1243 -- 1256Gauri Vakde, Radhika Bibikar, Zhengyi Le, Matthew Wright. EnPassant: anonymous routing for disruption-tolerant networks with applications in assistive environments
1257 -- 1273Oscar García Morchon, Thomas Falck, Klaus Wehrle. Sensor network security for pervasive e-health
1275 -- 1293Christopher Armbrust, Syed Atif Mehdi, Max Reichardt, Jan Koch, Karsten Berns. Using an autonomous robot to maintain privacy in assistive environments
1295 -- 1307Thanassis Giannetsos, Tassos Dimitriou, Neeli R. Prasad. People-centric sensing in assistive healthcare: Privacy challenges and directions
1309 -- 1329Yee Wei Law, Giorgi Moniava, Zheng Gong, Pieter H. Hartel, Marimuthu Palaniswami. KALwEN: a new practical and interoperable key management scheme for body sensor networks
1331 -- 1337Huawang Qin, Yuewei Dai, Zhiquan Wang. Identity-based multi-receiver threshold signcryption scheme
1339 -- 1349Neminath Hubballi, Santosh Biswas, Sukumar Nandi. Network specific false alarm reduction in intrusion detection system
1351 -- 1368Fahim Sufi, Ibrahim Khalil, Ibrahim Habib. Cardioids-based faster authentication and diagnosis of remote cardiovascular patients

Volume 4, Issue 10

1089 -- 1103Scott Fowler, Sherali Zeadally, Naveen Chilamkurti. Impact of denial of service solutions on network quality of service
1104 -- 1113Zhen Li, Qi Liao, Andrew Blaich, Aaron Striegel. Fighting botnets with economic uncertainty
1114 -- 1129Joon S. Park, Gaeil An, Ivy Y. Liu. Active access control (AAC) with fine-granularity and scalability
1130 -- 1136Hai Huang 0005, Zhenfu Cao. Authenticated key exchange protocol with enhanced freshness properties
1137 -- 1152Marshall Riley, Kemal Akkaya, Kenny Fong. ad hoc networks
1153 -- 1161Hai Huang 0005, Zhenfu Cao. IDOAKE: strongly secure ID-based one-pass authenticated key exchange protocol
1162 -- 1172Thomas E. Carroll, Daniel Grosu. A game theoretic investigation of deception in network security
1173 -- 1184Hedieh Sajedi, Mansour Jamzad. HYSA: HYbrid steganographic approach using multiple steganography methods
1185 -- 1198Giovanni Di Crescenzo, Tao Zhang, Stanley Pietrowicz. Anonymity notions and techniques for public-key infrastructures in vehicular networks
1199 -- 1211Ali Kanso. Cryptosystems based on continued fractions
1212 -- 1225Vladimir B. Balakirsky, A. J. Han Vinck. Performance of the verification for binary memoryless channels

Volume 4, Issue 1

1 -- 2Guojun Wang, Laurence Tianruo Yang, Kouichi Sakurai. Guest editorial: Trusted computing and communications
3 -- 10Huiyun Li, Keke Wu, Fengqi Yu. Enhanced correlation power analysis attack against trusted systems
11 -- 22Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao. Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks
23 -- 32Neyire Deniz Sarier. A new biometric identity based encryption scheme secure against DoS attacks
33 -- 43Benfano Soewito, Lucas Vespa, Ning Weng, Haibo Wang. Hybrid pattern matching for trusted intrusion detection
45 -- 60Antonio Muñoz, Antonio Maña. TPM-based protection for mobile agents
61 -- 69Yizhi Ren, MingChu Li, Kouichi Sakurai. FineTrust: a fine-grained trust model for peer-to-peer networks
71 -- 78Pei-Te Chen, Chi-Sung Laih. A challenge-based trust establishment protocol for peer-to-peer networks
79 -- 94Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl. Enhancing identity trust in cryptographic key management systems for dynamic environments
95 -- 108A. Srinivasan, F. Li, J. Wu. Secure reputation monitoring system - a novel connected dominating set-based framework for WSNs