4827 | -- | 4838 | Muhammad Ajmal Azad, Ricardo Morla, Junaid Arshad, Khaled Salah. Clustering VoIP caller for SPIT identification |
4839 | -- | 4851 | Youngse Kim, Ung Heo, Keecheon Kim. Improved hash and transmission method for larger packets in the RADIUS protocol |
4852 | -- | 4862 | Yuyan Guo, Jiguo Li, Yichen Zhang, Jian Shen. Hierarchical attribute-based encryption with continuous auxiliary inputs leakage |
4863 | -- | 4881 | Basant Subba, Santosh Biswas, Sushanta Karmakar. False alarm reduction in signature-based IDS: game theory approach |
4882 | -- | 4896 | Shuang Qiu, Rui Zhang 0002, Yuchen Cao, Wei Yang, Yongbin Zhou, Tian Ding. A statistical model for DPA when algorithmic noise is dependent on target |
4897 | -- | 4913 | Lixian Liu, Junzuo Lai, Robert H. Deng, Yingjiu Li. Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment |
4914 | -- | 4923 | Haibin Zheng, Jing Qin, Jiankun Hu, Qianhong Wu. Threshold attribute-based signcryption and its application to authenticated key agreement |
4924 | -- | 4948 | Mustapha Benssalah, Mustapha Djeddou, Karim Drouiche. Dual cooperative RFID-telecare medicine information system authentication protocol for healthcare environments |
4949 | -- | 4956 | Aymen Ghilen, Mostafa Azizi, Ridha Bouallègue. Upgrade of a quantum scheme for authentication and key distribution along with a formal verification based on model checking technique |
4957 | -- | 4972 | Sara Nazari, Mohammad Shahram Moin, Hamidreza Rashidy Kanan. A face template protection approach using chaos and GRP permutation |
4973 | -- | 4982 | Ziba Eslami, Nasrollah Pakniat, Mehrdad Nojoumian. Ideal social secret sharing using Birkhoff interpolation method |
4983 | -- | 4991 | Ali Mahmoodi, Javad Mohajeri, Mahmoud Salmasizadeh. A certificate-based proxy signature with message recovery without bilinear pairing |
4992 | -- | 5002 | Utku GĂ¼len, Selçuk Baktir. Elliptic-curve cryptography for wireless sensor network nodes without hardware multiplier support |
5003 | -- | 5015 | Ye Yang, Jinguang Han, Willy Susilo, Tsz Hon Yuen, Jiguo Li. ABKS-CSC: attribute-based keyword search with constant-size ciphertexts |
5016 | -- | 5027 | Shehzad Ashraf Chaudhry, Imran Khan, Azeem Irshad, Muhammad Usman Ashraf, Muhammad Khurram Khan, Hafiz Farooq Ahmad. A provably secure anonymous authentication scheme for Session Initiation Protocol |
5028 | -- | 5035 | Xingyuan Wang, Siwei Wang, Zhanjie Wang, Mengcan Zhang. A new key agreement protocol based on Chebyshev chaotic maps |
5036 | -- | 5050 | Osama Hosam, Nadhir Ben Halima. Adaptive block-based pixel value differencing steganography |
5051 | -- | 5063 | SĂ¼leyman Kardas, Mehmet Sabir Kiraz, Muhammed Ali Bingöl, Fatih Birinci. Norwegian internet voting protocol revisited: ballot box and receipt generator are allowed to collude |
5064 | -- | 5084 | Peng Jiang, Yi Mu, Fuchun Guo, Xiaofen Wang, Jianchang Lai. Centralized keyword search on encrypted data for cloud applications |
5085 | -- | 5097 | Pandi Vijayakumar, Ramu Naresh, S. K. Hafizul Islam, Lazarus Jegatha Deborah. An effective key distribution for secure internet pay-TV using access key hierarchies |
5098 | -- | 5115 | Maryam Mouzarani, Babak Sadeghiyan, Mohammad Zolfaghari. A smart fuzzing method for detecting heap-based vulnerabilities in executable codes |
5116 | -- | 5132 | Wenlin Han, Yang Xiao 0001. Design a fast Non-Technical Loss fraud detector for smart grid |
5133 | -- | 5142 | Pei Zhang, Yi-Liang Liu, Jianming Zhang, Liang-min Wang. Power allocation design and optimization for secure transmission in cognitive relay networks |
5143 | -- | 5154 | Firoz Ahmed, Young-Bae Ko. Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks |
5155 | -- | 5165 | Xiaoqiang Sun, Jianping Yu, Ting Wang, Zhiwei Sun, Peng Zhang. Efficient identity-based leveled fully homomorphic encryption from RLWE |
5166 | -- | 5177 | Hailong Zhang, Yongbin Zhou, Dengguo Feng. Theoretical and practical aspects of multiple samples correlation power analysis |
5178 | -- | 5186 | Fengxiao Huang, Zhangjie Fu, Xingming Sun, Ching-Nung Yang. Privacy-preserving outsourced gene data search in encryption domain |
5187 | -- | 5202 | Chin-Ling Chen, Kai-Wen Cheng. Design of a VANET privacy and non-repudiation accident reporting system |
5203 | -- | 5218 | Musab Ghadi, Lamri Laouamer, Laurent Nana, Anca Pascu. A novel zero-watermarking approach of medical images based on Jacobian matrix model |
5219 | -- | 5237 | Maryam Asadzadeh Kaljahi, Mohsen Jahanshahi. A survey on security vulnerabilities in channel assignment algorithms of multi-interface wireless mesh networks |
5238 | -- | 5251 | Gaurav Bansod, Abhijit Patil, Swapnil Sutar, Narayan Pisharoty. ANU: an ultra lightweight cipher design for security in IoT |
5252 | -- | 5261 | Yanhua Zhang, Yupu Hu, Jia Xie, Mingming Jiang. Efficient ring signature schemes over NTRU Lattices |
5262 | -- | 5277 | Feng Ye, Yi Qian, Rose Qingyang Hu. Identity-based schemes for a secured big data and cloud ICT framework in smart grid system |
5278 | -- | 5294 | Mustapha Benssalah, Mustapha Djeddou, Karim Drouiche. Towards a complete chaotic map-based mobile RFID authentication protocol with efficient anticollision tag indexing |
5295 | -- | 5310 | Khalifa Toumi, Hela Sfar, JoaquĂn GarcĂa-Alfaro. Reputation trust mechanism under the organizational-based access control model |
5311 | -- | 5332 | Shaun Mc Brearty, William Farrelly, Kevin Curran. The performance cost of preserving data/query privacy using searchable symmetric encryption |
5333 | -- | 5345 | Nor Shahriza Abdul Karim, Arwa Albuolayan, Tanzila Saba, Amjad Rehman. The practice of secure software development in SDLC: an investigation through existing model and a case study |
5346 | -- | 5362 | Salwa Othmen, Malek Rekik, Faouzi Zarai, Aymen Belghith, Lotfi Kamoun. Shortest and secure routing protocol for multi-hop cellular networks (SSRP-MCN) |
5363 | -- | 5375 | Aritro Sengupta, Utpal Kumar Ray. Message mapping and reverse mapping in elliptic curve cryptosystem |
5376 | -- | 5391 | Minh Ha Le, Intae Kim, Seong Oun Hwang. Efficient certificate-based encryption schemes without pairing |
5392 | -- | 5400 | Jinyong Chang, Honglong Dai, MaoZhi Xu, Rui Xue. Separations in circular security for arbitrary length key cycles, revisited |
5401 | -- | 5411 | Hwajeong Seo, Zhe Liu 0001, Johann GroĂŸschädl, Howon Kim. Efficient arithmetic on ARM-NEON and its application for high-speed RSA implementation |
5412 | -- | 5431 | Sravani Challa, Ashok Kumar Das, Saru Kumari, Vanga Odelu, Fan Wu, Xiong Li. Provably secure three-factor authentication and key agreement scheme for session initiation protocol |
5432 | -- | 5443 | Junyang Bai, Weiping Wang, Mingming Lu, Haodong Wang, Jianxin Wang. TD-WS: a threat detection tool of WebSocket and Web Storage in HTML5 websites |
5444 | -- | 5459 | Xiaotong Wu, Meng Liu, Wan-Chun Dou, Shui Yu. DDoS attacks on data plane of software-defined network: are they possible? |
5460 | -- | 5471 | Yimin Wang, Hong Zhong, Yan Xu, Jie Cui, Funchun Guo. Efficient extensible conditional privacy-preserving authentication scheme supporting batch verification for VANETs |
5472 | -- | 5489 | Hayfaa Abdulzahra Atee, Robiah Ahmad, Norliza Mohd Noor, Abdul Monem S. Rahma, Muhammad Samer Sallam. A novel extreme learning machine-based cryptography system |
5490 | -- | 5501 | Dong Xie, Haipeng Peng, Lixiang Li, Yixian Yang. Short lattice signatures with constant-size public keys |
5502 | -- | 5517 | Chi Lin, Tie Qiu, Mohammad S. Obaidat, Chang-Wu Yu, Lin Yao, Guowei Wu. MREA: a minimum resource expenditure node capture attack in wireless sensor networks |
5518 | -- | 5532 | Han Yan, Xiang Cheng, Dezheng Wang, Sen Su, Qiying Zhang. Authentication of spatio-textual similarity join queries in untrusted cloud environments |
5533 | -- | 5546 | Azam Davahli, Seyed Morteza Babamir. Indefinite block ciphering based on variable and great length key |
5547 | -- | 5562 | Jayashree Pougajendy, Arun Raj Kumar Parthiban. CDAI: a novel collaborative detection approach for impersonation attacks in vehicular ad-hoc networks |
5563 | -- | 5580 | Maged Hamada Ibrahim, Saru Kumari, Ashok Kumar Das, Vanga Odelu. Jamming resistant non-interactive anonymous and unlinkable authentication scheme for mobile satellite networks |
5581 | -- | 5590 | Samad Rostampour, Nasour Bagheri, Mehdi Hosseinzadeh, Ahmad Khademzadeh. An authenticated encryption based grouping proof protocol for RFID systems |
5591 | -- | 5599 | Sahel Alouneh, Sa'ed Abed, George Ghinea. Security of VoIP traffic over low or limited bandwidth networks |
5600 | -- | 5614 | Huige Wang, Kefei Chen, Baodong Qin, Liangliang Wang. Certificateless encryption secure against selective opening attack |
5615 | -- | 5624 | Jia Xie, Yupu Hu, Juntao Gao. Multi-use unidirectional lattice-based proxy re-signatures in standard model |
5625 | -- | 5638 | Jing Chen, Bowen Zhang, Min Chen, Quan Yuan, RuiYing Du. γ-Strawman privacy-preserving scheme in weighted social networks |
5639 | -- | 5650 | Chanwoo Bae, Seungwon Shin. A collaborative approach on host and network level android malware detection |
5651 | -- | 5658 | Jiao Du, Chao Li, Shaojing Fu, Shanqi Pang. GF(p) |
5659 | -- | 5672 | Jiaoli Shi, Chuanhe Huang, Jing Wang, Kai He, Xieyang Shen. An access control scheme with dynamic user management and cloud-aided decryption |
5673 | -- | 5686 | Mohammad Ahmed Alomari, Khairulmizam Samsudin, Abdul Rahman Ramli, Shaiful J. Hashim. Efficient Android-based storage encryption using multi-core CPUs |
5687 | -- | 5697 | Imran Erguler. A key recovery attack on an error-correcting code-based lightweight security protocol |
5698 | -- | 5709 | Hai-Cheng Chu, Gai-Ge Wang, Der-Jiunn Deng. The social networking investigation of metadata of forensic artifacts of a typical WeChat session under Windows |
5710 | -- | 5723 | Dihua Sun, Hongzhuan Zhao, Senlin Cheng. A novel membership cloud model-based trust evaluation model for vehicular ad hoc network of T-CPS |
5724 | -- | 5732 | Xiaoming Hu, Huajie Xu, Yan Liu, Jian Wang, WenAn Tan, Xiaojun Zhang. An efficient designated verifier signature scheme with pairing-free and low cost |
5733 | -- | 5745 | N. K. Sreelaja, N. K. Sreeja. An image edge based approach for image password encryption |
5746 | -- | 5755 | Kai Zhang, Jie Guan, Bin Hu. Some properties of impossible differential and zero correlation linear cryptanalysis on TEA family-type ciphers |
5756 | -- | 5763 | Xin Liao, Guoyong Chen, Jiaojiao Yin. Content-adaptive steganalysis for color images |
5764 | -- | 5788 | Mohammad H. Alshayeji, Suood Abdulaziz Al-Roomi, Sa'ed Abed. A high-capacity and secure least significant bit embedding approach based on word and letter frequencies |
5789 | -- | 5802 | Kai Zhang, Wen Chen, Xiangxue Li, Jie Chen, Haifeng Qian. New application of partitioning methodology: identity-based dual receiver encryption |
5803 | -- | 5833 | Kamal Benzekki, Abdeslam El Fergougui, Abdelbaki Elbelrhiti Elalaoui. Software-defined networking (SDN): a survey |
5834 | -- | 5848 | Xuewen Dong, Chao Yang, Lijie Sheng, Chao Wang, Jianfeng Ma. A new method to deduce counterexamples in secure routing protocols based on strand space model |
5849 | -- | 5857 | Shaohua Tang, Weijian Li, Jianhao Wu, Zheng Gong, Ming Tang. Power analysis attacks against FPGA implementation of KLEIN |
5858 | -- | 5867 | Ting Cui, Guo-qiang Liu, Wei-Tao Song. Real-time decomposition of three kinds of structural S-boxes |
5868 | -- | 5881 | Shuaishuai Tan, Yanming Liu, Xiaoping Li, Qingkuan Dong. A similarity-based indirect trust model with anti-spoofing capability |
5882 | -- | 5891 | Murat Dener, Ă–mer Faruk Bay. TeenySec: a new data link layer security protocol for WSNs |
5892 | -- | 5907 | Nikolaos Baroutis, Mohamed F. Younis. A novel traffic analysis attack model and base-station anonymity metrics for wireless sensor networks |
5908 | -- | 5917 | Mohsan Rasheed, Young-Sik Kim, Dae-Woon Lim. An error-free data-hiding scheme for encrypted images |
5918 | -- | 5933 | Pengbin Feng, Cong Sun, Jianfeng Ma. Measuring the risk value of sensitive dataflow path in Android applications |
5934 | -- | 5942 | Suresh Kumar Krishnamoorthy, Sasikala Thankappan. A novel method to authenticate in website using CAPTCHA-based validation |
5943 | -- | 5964 | Aafaf Ouaddah, Anas Abou El Kalam, Abdellah Ait Ouahman. FairAccess: a new Blockchain-based access control framework for the Internet of Things |
5965 | -- | 5976 | Jiawei Dou, Linming Gong, Shundong Li, Li Ma. Efficient private subset computation |
5977 | -- | 5995 | J. Abdella, M. Ă–zuysal, E. Tomur. CA-ARBAC: privacy preserving using context-aware role-based access control on Android permission system |
5996 | -- | 6003 | Zuhua Shao, Yipeng Gao. Practical verifiably encrypted signatures based on discrete logarithms |
6004 | -- | 6016 | Abdullah M. Hamdan, Ala Hamarsheh. AH4S: an algorithm of text in text steganography using the structure of omega network |
6017 | -- | 6033 | Bensalah Mustapha, Mustapha Djeddou, Karim Drouiche. An ultralightweight RFID authentication protocol based on Feistel cipher structure |
6034 | -- | 6041 | Ruxandra F. Olimid. SETUP in secret sharing schemes using random values |
6042 | -- | 6065 | Ali Ahmadian Ramaki, Abbas Rasoolzadegan. Causal knowledge analysis for detecting and modeling multi-step attacks |
6066 | -- | 6079 | Bala Krishnan Ramakrishnan, Prasanth Kumar Thandra, A. V. Satya Murty Srinivasula. Text steganography: a novel character-level embedding algorithm using font attribute |
6080 | -- | 6093 | Ying Liu, Andrey Garnaev, Wade Trappe. Connectivity jamming game for physical layer attack in peer to peer networks |
6094 | -- | 6110 | Zdenek Martinasek, Félix Iglesias, Lukas Malina, Josef Martinasek. Crucial pitfall of DPA Contest V4.2 implementation |
6111 | -- | 6136 | Hamed Orojloo, Mohammad Abdollahi Azgomi. Predicting the behavior of attackers and the consequences of attacks against cyber-physical systems |
6137 | -- | 6147 | Seedahmed S. Mahmoud. A generalised wavelet packet-based anonymisation approach for ECG security application |
6148 | -- | 6172 | Dhekra Essaidani, Hassene Seddik, Ezzedine Ben Braiek. Invariant digital image watermarking based on Defragmented Delaunay Triangulation for optimal watermark synchronization |
6173 | -- | 6188 | Basel Alomair. Authenticated encryption: how reordering can impact performance |
6189 | -- | 6201 | Raghu Vamsi P., Krishna Kant. Trust aware cooperative routing method for WANETs |
6202 | -- | 6214 | Geontae Noh, Ik Rae Jeong. Strong designated verifier signature scheme from lattices in the standard model |
6215 | -- | 6226 | Serif Bahtiyar. Anatomy of targeted attacks with smart malware |
6227 | -- | 6238 | Qiao Peng, Youliang Tian. Publicly verifiable secret sharing scheme and its application with almost optimal information rate |
6239 | -- | 6247 | Sahib Khan, Muhammad Ismail, Tawab Khan, Nasir Ahmad. Enhanced stego block chaining (ESBC) for low bandwidth channels |
6248 | -- | 6265 | Ibrahim M. Mahmoud, Sherif Hazem Nour El-Din, Rania Elgohary, Hossam Faheem, Mostafa G. M. Mostafa. A robust cryptographic-based system for secure data sharing in cloud environments |
6266 | -- | 6284 | Gaurav Varshney, Manoj Misra, Pradeep K. Atrey. A survey and classification of web phishing detection schemes |
6285 | -- | 6314 | Stavros Simou, Christos Kalloniatis, Stefanos Gritzalis, Haralambos Mouratidis. A survey on cloud forensics challenges and solutions |
6315 | -- | 6334 | Sonika Singh, Sahadeo Padhye. Generalisations of NTRU cryptosystem |
6335 | -- | 6350 | Fu-Hau Hsu, Yu-Liang Hsu, Yanling Hwang, Li-Han Chen, Chuan-Sheng Wang, Chang-Kuo Tso, Szu-Chi Liu, Po-Ching Lin, Chi-Hsien Hsu. VRS: a values-based reputation system for web services |
6351 | -- | 6364 | Furui Zhan, Nianmin Yao. A collusion-resistant dynamic key management scheme for WSNs |
6365 | -- | 6378 | Mohammed Hazim Alkawaz, Ghazali Sulong, Tanzila Saba, Abdulaziz S. Almazyad, Amjad Rehman. Concise analysis of current text automation and watermarking approaches |
6379 | -- | 6385 | P. Dharshini, J. Arokia Renjith, P. Mohan Kumar. Screening the covert key using honey encryption to rule out the brute force attack of AES - a survey |
6386 | -- | 6411 | Neelam Dayal, Prasenjit Maity, Shashank Srivastava, Rahamatullah Khondoker. Research Trends in Security and DDoS in SDN |