Journal: Security and Communication Networks

Volume 5, Issue 9

945 -- 956Seok-Hun Kim, Soo-Kyun Kim, Jong Hyuk Park. A VoIP system for mobility voice security support using the VPN
957 -- 968Zhangjie Fu, Xingming Sun, Yuling Liu, Bo Li. Text split-based steganography in OOXML format documents for covert communication
969 -- 973Lian Jie Wang, Jonathan Jen-Rong Chen. An improved discrete logarithm-based multisignature scheme
974 -- 986Taeshik Shon, Jong Hyuk Park, Doo-Soon Park. Improved RF4CE key agreement approach involving two-phase key distribution for smart-convergence home device
987 -- 1005Giannis F. Marias, João Barros, Markus Fiedler, Andreas Fischer, Harald Hauff, Ralph Herkenhöner, Antonio Grillo, Alessandro Lentini, Luísa Lima, Charlott Lorentzen, Wojciech Mazurczyk, Hermann de Meer, Paulo F. Oliveira, George C. Polyzos, Enric Pujol, Krzysztof Szczypiorski, João P. Vilela, Tiago T. V. Vinhoza. Security and privacy issues for the network of the future
1006 -- 1027Alexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis. SIPA: generic and secure accounting for SIP
1028 -- 1036Shichuan Ma, Michael Hempel, Yaoqing (Lamar) Yang, Hamid Sharif. Securing wireless communications in transmit-beamforming systems by precoding jamming noise signals
1037 -- 1048Sanaa Sharafeddine, Amal El Arid. An empirical energy model for secure Web browsing over mobile devices
1049 -- 1061Hamza Rahmani, Nabil Sahli, Farouk Kamoun. Distributed denial-of-service attack detection scheme-based joint-entropy
1062 -- 1082Masoom Alam, Tamleek Ali, Sanaullah Khan, Shahbaz Khan 0003, Muhammad Ali, Mohammad Nauman, Amir Hayat, Muhammad Khurram Khan, Khaled Alghathbar. Analysis of existing remote attestation techniques

Volume 5, Issue 8

831 -- 833Ilsun You, Gabriele Lenzini, Marek R. Ogiela, Elisa Bertino. Defending against insider threats and internal data leakage
834 -- 845Kyungroul Lee, Kangbin Yim, Eugene H. Spafford. Reverse-safe authentication protocol for secure USB memories
847 -- 862Ludwig Fuchs, Günther Pernul. Minimizing insider misuse through secure Identity Management
863 -- 872Malek Ben Salem, Salvatore J. Stolfo. A comparison of one-class bag-of-words user behavior modeling techniques for masquerade detection
873 -- 886William Claycomb, Dongwan Shin, Gail-Joon Ahn. Enhancing directory virtualization to detect insider activity
887 -- 897Mucheol Kim, Jiwan Seo, Sanghyun Noh, Sangyong Han. Identity management-based social trust model for mediating information sharing and privacy enhancement
899 -- 915Shun-Te Liu, Yi-Ming Chen. MalPEFinder: fast and retrospective assessment of data breaches in malware attacks
917 -- 927Do-Hoon Kim, Taek Lee, Jaewoo Kang, Hyunchoel Jeong, Hoh Peter In. Adaptive pattern mining model for early detection of botnet-propagation scale
929 -- 943Arpan Roy, Dong Seong Kim, Kishor S. Trivedi. Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees

Volume 5, Issue 7

709 -- 724Martine Bellaïche, Jean-Charles Grégoire. SYN flooding attack detection by TCP handshake anomalies
725 -- 737Chin-Ling Chen, Cheng-Chi Lee, Yuh-Min Tseng, Teng-Tai Chou. A private online system for executing wills based on a secret sharing mechanism
738 -- 751Alfredo Matos, Rui Ferreira, Susana Sargento, Rui L. Aguiar. Virtual network stacks: from theory to practice
752 -- 763Atanu Basu, Indranil Sengupta, Jamuna Kanta Sing. Secured hierarchical secret sharing using ECC based signcryption
764 -- 775Yuan Zhou, Haifeng Qian. Practical round-optimal blind signatures without random oracles or non-interactive zero-knowledge proofs
776 -- 788Mihui Kim, Min Young Chung, Hyunseung Choo. VeriEST: verification via primary user emulation signal-based test for secure distributed spectrum sensing in cognitive radio networks
789 -- 808Xueying Zhang, Howard M. Heys, Cheng Li. Energy efficiency of encryption schemes applied to wireless sensor networks
809 -- 822Ping Pan, Lihua Wang, Licheng Wang, Lixiang Li, Yixian Yang. CSP-DHIES: a new public-key encryption scheme from matrix conjugation
823 -- 830Daojing He, Sammy Chan, Chun Chen, Jiajun Bu. Secure and efficient dynamic program update in wireless sensor networks

Volume 5, Issue 6

557 -- 571Chin-Ling Chen, Mei-Li Chong. RFID system for public train transportation
572 -- 582Wei Yan, Nirwan Ansari. Anti-virus in-the-cloud service: are we ready for the security evolution?
583 -- 593Zhi Chen, Dapeng Wu, Pingyi Fan, Khaled Ben Letaief. Leakage-probability-constrained secrecy capacity of a fading channel
594 -- 613Dimitris Glynos, Patroklos G. Argyroudis, Christos Douligeris. Collaborative service evaluation with the TwoHop trust framework
614 -- 624Fengrong Zhang, Yupu Hu, Min Xie 0003, Yongzhuang Wei. Constructions of 1-resilient Boolean functions on odd number of variables with a high nonlinearity
625 -- 635Amirhossein Taherinia, Mansour Jamzad. A two-step watermarking attack using long-range correlation image restoration
636 -- 647Lei Yang, Jun Tian, Dapeng Wu. Content-based image authentication by feature point clustering and matching
648 -- 657Keke Wu, Huiyun Li, Dingju Zhu. Fast and scalable parallel processing of scalar multiplication in elliptic curve cryptosystems
658 -- 673Machigar Ongtang, Stephen E. McLaughlin, William Enck, Patrick McDaniel. Semantically rich application-centric security in Android
674 -- 680Chao Lv, Maode Ma, Hui Li, Jianfeng Ma, Ben Niu. Security enhancement of the communication-efficient AUTHMAC_DH protocols
681 -- 688Sattar J. Aboud, Abid T. Al Ajeeli. Efficient multiple-collision trapdoor hash family
689 -- 708Weiyi Zhang, Farah Kandah, Xiaojiang Du, Chonggang Wang. p-cycle construction within link capacity constraint

Volume 5, Issue 5

439 -- 449Jun Shao, Peng Liu 0005, Guiyi Wei, Yun Ling. Anonymous proxy re-encryption
450 -- 461Huiyun Li, Hai Yuan. Dependability evaluation of integrated circuits at design time against laser fault injection
462 -- 478Chun-I Fan, Ruei-Hau Hsu, Wei-Kuei Chen. Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme
479 -- 484Yanyan Jia, Yupu Hu, Fenghe Wang, Hongxian Wang. Correlation power analysis of Trivium
485 -- 495Nguyen Thi Thanh Huyen, Minho Jo, Tien Dung Nguyen, Eui-nam Huh. A beneficial analysis of deployment knowledge for key distribution in wireless sensor networks
496 -- 507Wen Tao Zhu, Jianying Zhou, Robert H. Deng, Feng Bao. Detecting node replication attacks in mobile sensor networks: theory and approaches
508 -- 516Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar, Tai-Hoon Kim, Hassan M. Elkamchouchi. Mobile one-time passwords: two-factor authentication using mobile phones
517 -- 522Chien-Lung Hsu, Han-Yu Lin. Pairing-based strong designated verifier proxy signature scheme with low cost
523 -- 534Seongan Lim, Eunjeong Lee, Cheol-Min Park. A short redactable signature scheme using pairing
535 -- 544Daniel D. Hein, Serhiy Morozov, Hossein Saiedian. A survey of client-side Web threats and counter-threat measures
545 -- 555Muthulakshmi Angamuthu, Anitha Ramalingam. T) policy

Volume 5, Issue 4

343 -- 352Chao Lv, Maode Ma, Hui Li, Jianfeng Ma, Ben Niu. A security enhanced authentication and key distribution protocol for wireless networks
353 -- 363Lei Yang, Qian Chen, Jun Tian, Dapeng Wu. Robust track-and-trace video watermarking
364 -- 373Geethapriya Thamilarasu, Ramalingam Sridhar. A cross-layer game for energy-efficient jamming detection in ad hoc networks
374 -- 383Gang Li, Hongmei Sun. Discovering AODV-based multipath routes in wireless ad hoc networks
384 -- 403Jie Yang 0003, Yingying Chen. Toward attack-resistant localization under infrastructure attacks
404 -- 421Yanping Zhang, Yang Xiao, Min Chen, Jingyuan Zhang, Hongmei Deng. A survey of security visualization for computer network logs
422 -- 437Yanping Zhang, Yang Xiao, Kaveh Ghaboosi, Jingyuan Zhang, Hongmei Deng. A survey of cyber crimes

Volume 5, Issue 3

249 -- 251Jong Hyuk Park, Shiuh-Jeng Wang, Damien Sauveron. Security technologies and applications for convergence environments
253 -- 261Junbeom Hur, Chanil Park, Seongoun Hwang. Fine-grained user access control in ciphertext-policy attribute-based encryption
263 -- 272Kok Seng Wong, Myung Ho Kim. Privacy-preserving frequent itemsets mining via secure collaborative framework
273 -- 278Jianjie Zhao, Dawu Gu, Lei Zhang. Security analysis and enhancement for three-party password-based authenticated key exchange protocol
279 -- 286Raylin Tso. Convertible ring signatures with gradual revelation of non-signers
287 -- 291Imran Erguler, Cihan Unsal, Emin Anarim, Gökay Saldamli. Security analysis of an ultra-lightweight RFID authentication protocol - SLMAP
293 -- 300Young-Gab Kim, Sung Deok Cha. Threat scenario-based security risk analysis using use case modeling in information systems
301 -- 310Mi-Young Kim, Randy Goebel. Adaptive-capacity and robust natural language watermarking for agglutinative languages
311 -- 318Wei Wang 0033, Guosun Zeng, Junqi Zhang, Daizhong Tang. Dynamic trust evaluation and scheduling framework for cloud computing
319 -- 330Ming-Huang Guo, Horng-Twu Liaw, Jyun-Fu Chen, Der-Jiunn Deng. Secure authentication mechanism for RFID tag in WLAN convergence 3G networks
331 -- 341Chun-Hui Huang, Jue-Sam Chou, Yalin Chen, Siang Yu Wun. Improved multi-server authentication protocol

Volume 5, Issue 2

125 -- 144Hani Alzaid, Ernest Foo, Juan Manuel González Nieto, Ejaz Ahmed. Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks
145 -- 163Ehsan Malekian, Ali Zakerolhosseini. A non-associative lattice-based public key cryptosystem
164 -- 177Ming-Hour Yang, Hung Yuan Hu. Protocol for ownership transfer across authorities: with the ability to assign transfer target
178 -- 185Gulshan Kumar, Krishan Kumar. An information theoretic approach for feature selection
186 -- 196Issa Khalil, Mamoun A. Awad, Salah Bouktif, F. Awwad. MSN: mutual secure neighbor verification in multi-hop wireless networks
197 -- 210Qi Liao, Zhen Li, Aaron Striegel. Could firewall rules be public - a game theoretical perspective
211 -- 225Yakun Hu, Dapeng Wu, Antonio Nucci. Pitch-based gender identification with two-stage classification
226 -- 235Cong Jin, Xiao-Yan Wang. Analysis and control stratagems of flash disk virus dynamic propagation model
236 -- 248Shuhua Wu, Yuefei Zhu, Qiong Pu. Robust smart-cards-based user authentication scheme with user anonymity

Volume 5, Issue 12

1277 -- 1295Brandon Shirley, Lokesh Babu, Chad D. Mano. Bot detection evasion: a case study on local-host alert correlation bot detection methods
1296 -- 1311Mehdi Mohammadi, Bijan Raahemi, Ahmad Akbari, Babak Nasersharif. New class-dependent feature transformation for intrusion detection systems
1312 -- 1324Syh-Yuan Tan, Zhe Jin, Andrew Beng Jin Teoh, Bok-Min Goi, Swee-Huay Heng. On the realization of fuzzy identity-based identification scheme using fingerprint biometrics
1325 -- 1336Chung-Hua Chu, Yen Chieh Ouyang, Chang-Bu Jang. Secure data transmission with cloud computing in heterogeneous wireless networks
1337 -- 1350Mansour Alsaleh, Paul C. van Oorschot. Revisiting network scanning detection using sequential hypothesis testing
1351 -- 1362Qiang Tang. Public key encryption supporting plaintext equality test and user-specified authorization
1363 -- 1374Qiuhua Wang, Huifang Chen, Lei Xie, Kuang Wang. Access-polynomial-based self-healing group key distribution scheme for resource-constrained wireless networks
1375 -- 1378Cheng-Chi Lee, Tsung-Hung Lin, Chwei-Shyong Tsai. Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications
1379 -- 1393Haifeng Qian, Junqing Gong, Yuan Zhou. Anonymous password-based key exchange with low resources consumption and better user-friendliness
1394 -- 1403Wojciech Mazurczyk. Lost audio packets steganography: the first practical evaluation
1404 -- 1411Zongyang Zhang, Zhenfu Cao, Haifeng Qian. Chosen-ciphertext attack secure public key encryption with auxiliary inputs
1412 -- 1422Wei-Chuen Yau, Swee-Huay Heng, Syh-Yuan Tan, Bok-Min Goi, Raphael C.-W. Phan. Efficient encryption with keyword search in mobile networks
1423 -- 1429Debiao He, Jianhua Chen, Yitao Chen. A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
1430 -- 1440Mingwu Zhang, Bo Yang 0003, Tsuyoshi Takagi. Reconciling and improving of multi-receiver signcryption protocols with threshold decryption
1441 -- 1451Hu Xiong, Zhong Chen, Fagen Li. Efficient privacy-preserving authentication protocol for vehicular communications with trustworthy
1452 -- 1461Sang Guun Yoo, Keunyoung Park, Juho Kim. Confidential information protection system for mobile devices
1462 -- 1470Tarik Taleb, Yassine Hadjadj Aoul. 2: a framework for integrating quality of security with quality of service
1471 -- 1486Suleyman Kondakci. Intelligent network security assessment with modeling and analysis of attack patterns

Volume 5, Issue 11

1221 -- 1222Wenyu Qu, Yang Xiang, Yong Zhang. Special issue on security in ubiquitous computing
1223 -- 1234Neda Edalat, Wendong Xiao, Mehul Motani, Nirmalya Roy, Sajal K. Das. Auction-based task allocation with trust management for shared sensor networks
1235 -- 1247Md. Tanzim Khorshed, A. B. M. Shawkat Ali, Saleh A. Wasimi. Classifying different denial-of-service attacks in cloud computing using rule-based learning
1248 -- 1259Xinyi Huang, Cheng-Kang Chu, Hung-Min Sun, Jianying Zhou, Robert H. Deng. Enhanced authentication for commercial video services
1260 -- 1266Muhammad Khurram Khan, Debiao He. A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography
1267 -- 1276Wei-Tong Hu, MingChu Li, Cheng Guo, Yizhi Ren. Reversible secret image sharing with steganography and dynamic embedding

Volume 5, Issue 10

1083 -- 1085Taeshik Shon, Costas Lambrinoudakis, Xiaobo Zhou. Special issue on next generation communication and network security
1086 -- 1093Namheun Son, Keun-Gi Lee, Sangjun Jeon, Sangjin Lee, Changhoon Lee. The effective method of database server forensics on the enterprise environment
1094 -- 1101Young-Hoon Moon, Eunjin Kim, Suh Mahn Hur, Huy Kang Kim. Detection of botnets before activation: an enhanced honeypot system for intentional infection and behavioral observation of malware
1102 -- 1111Lingli Deng, Qing Yu, Jin Peng. Adaptive scheduling strategies for cloud-based resource infrastructures
1112 -- 1120Shangguang Wang, Hua Zou, Qibo Sun, Fangchun Yang. Bayesian Approach with Maximum Entropy Principle for trusted quality of Web service metric in e-commerce applications
1121 -- 1130Y. H. Zhang, X. F. Chen, H. Li, J. Cao. Identity-based construction for secure and efficient handoff authentication schemes in wireless networks
1131 -- 1140Shangguang Wang, Qibo Sun, Hua Zou, Fangchun Yang. Detecting SYN flooding attacks based on traffic prediction
1141 -- 1146Jongsung Kim. Study on the security of the extended version for the ISO/IEC international standardized block cipher SEED
1147 -- 1158Cándido Caballero-Gil, Pino Caballero-Gil, Jezabel Molina-Gil. Self-organizing life cycle management of mobile ad hoc networks
1159 -- 1168Fanbao Liu, Tao Xie, Yumeng Feng, Dengguo Feng. On the security of PPPoE network
1169 -- 1180Feng Zhao, Min Li, Weizhong Qiang, Hai Jin, Deqing Zou, Qin Zhang. Proactive recovery approach for intrusion tolerance with dynamic configuration of physical and virtual replicas
1181 -- 1192Young-Gab Kim, Min-Soo Lee, Sanghyun Cho, Sung Deok Cha. A quantitative approach to estimate a website security risk using whitelist
1193 -- 1198Hai-Cheng Chu, Szu-Wei Yang, Jong Hyuk Park. A partially reconstructed previous Gmail session by live digital evidences investigation through volatile data acquisition
1199 -- 1208Dong Seong Kim, Sang Min Lee, Tae-Hwan Kim, Jong Sou Park. Quantitative intrusion intensity assessment for intrusion detection systems
1209 -- 1220M. Taufiq Nuruzzaman, Changmoo Lee, Mohd. Fikri Azli bin Abdullah, Deokjai Choi. Simple SMS spam filtering on independent mobile phone

Volume 5, Issue 1

1 -- 2Xiaodong Lin, Jianwei Liu, Stefanos Gritzalis. Security and privacy in emerging information technologies
3 -- 14Dimitrios Damopoulos, Sofia-Anna Menesidou, Georgios Kambourakis, Maria Papadaki, Nathan L. Clarke, Stefanos Gritzalis. Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers
15 -- 27Dingbang Xu, Yu Wang 0003, Xinghua Shi, Xiaohang Yin. User identification and anonymization in 802.11 wireless LANs
29 -- 49Yang Xiao, Ke Meng, Daisuke Takahashi. Accountability using flow-net: design, implementation, and performance evaluation
51 -- 58Zhongtian Jia, Shudong Li, Haipeng Peng, Yixian Yang, Shize Guo. Modelling security message propagation in delay tolerant networks
59 -- 67Jianwei Liu, RuiYing Du, Jing Chen, Kun He. A key distribution scheme using network coding for mobile ad hoc network
69 -- 78Xiaoping Xue, Jia Ding. LPA: a new location-based privacy-preserving authentication protocol in VANET
79 -- 86Yipin Sun, Zhenqian Feng, Qiaolin Hu, Jinshu Su. An efficient distributed key management scheme for group-signature based anonymous authentication in VANET
87 -- 106Gina Kounga, C. J. Mitchell, Thomas Walter. ad hoc networks
107 -- 112Daojing He, Chun Chen, Maode Ma, Jiajun Bu. Cryptanalysis of some conference schemes for mobile communications
113 -- 124Wassim El-Hajj. The most recent SSL security attacks: origins, implementation, evaluation, and suggested countermeasures