Journal: Security and Communication Networks

Volume 9, Issue 9

807 -- 0Shaoen Wu, Honggang Wang, Dalei Wu, Periklis Chatzimisios, Zhigang Chen. Security and networking for cyber-physical systems
808 -- 822Todd Baumeister, Yingfei Dong. Towards secure identity management for the smart grid
823 -- 832Mi Wen, Kuan Zhang, Jingsheng Lei, Xiaohui Liang, Ruilong Deng, Xuemin (Sherman) Shen. CIT: A credit-based incentive tariff scheme with fraud-traceability for smart grid
833 -- 849Qingyu Yang, Liguo Chang, Wei Yu 0002. On false data injection attacks against Kalman filtering in power system dynamic state estimation
850 -- 861Pengbo Si, Jia Liu, Yanhua Sun, Yanhua Zhang. Quality of service-aware and security-aware dynamic spectrum management in cyber-physical surveillance systems for transportation
862 -- 873Wei An, Song Ci, Haiyan Luo, Yanni Han, Tao Lin, Ding Tang, Ying Qi. Vulnerability-constrained multiple minimum cost paths for multi-source wireless sensor networks
874 -- 885Mohammed Raza Kanjee, Hong Liu. Authentication and key relay in medical cyber-physical systems
886 -- 898Qing Yang, Alvin S. Lim, Xiaojun Ruan, Xiao Qin, Dongjin Kim. Location-preserved contention-based routing in vehicular ad hoc networks
899 -- 909Wen-yong Wang, Li-Sheng Huang, Chang-chun Li, Xin Wang. TCP-polite rate control based on cooperative measurement
910 -- 937Suryakant Bhandare, Taha Ben Brahim, Saad Biaz, Prathima Agrawal. Performance evaluation of collision avoidance schemes in ad hoc networks

Volume 9, Issue 8

703 -- 704Wojciech Mazurczyk, Krzysztof Szczypiorski, Artur Janicki, Hui Tian. Trends in modern information hiding: techniques, applications, and detection
705 -- 720Emanuele Maiorana, Patrizio Campisi. Multi-bit watermarking of high dynamic range images based on perceptual models
721 -- 728Zhao-Xia Yin, Bin Luo. MDE-based image steganography with large embedding capacity
729 -- 736Fengyong Li, Xinpeng Zhang, Hang Cheng, Jiang Yu. Digital image steganalysis based on local textural features and double dimensionality reduction
737 -- 746Qilin Qi, Aaron Sharp, Dongming Peng, Hamid Sharif. Real-time audio steganography attack based on automatic objective quality feedback
747 -- 754Shanyu Tang, Qing Chen, Wei Zhang, Yongfeng Huang. Universal steganography model for low bit-rate speech codec
755 -- 770Rennie Archibald, Dipak Ghosal. Design and performance evaluation of a covert timing channel
771 -- 780Pawel Laka, Lukasz Maksymiuk. Steganographic transmission in optical networks with the use of direct spread spectrum technique
781 -- 790Wojciech Mazurczyk, Steffen Wendzel, Ignacio Azagra Villares, Krzysztof Szczypiorski. On importance of steganographic cost for network steganography
791 -- 802Weiwei Liu, Guangjie Liu, Yuewei Dai. Matrix embedding in multicast steganography: analysis in privacy, security and immediacy

Volume 9, Issue 7

587 -- 598Junjie Lv, Chen Zhao. Security analysis of online digital goods business based on stochastic game net model
599 -- 612Lukas Malina, Jan Hajny, Vaclav Zeman. Light-weight group signatures with time-bound membership
613 -- 621Wei Luo, Wenping Ma, Qiang Gao. A dynamic trust management system for wireless sensor networks
622 -- 633Dong Lai Fu, Xinguang Peng, Yuli Yang. Unbalanced tree-formed verification data for trusted platforms
634 -- 651Brindha Murugan, Ammasai Gounden Nanjappa Gounder, Sriram Manohar. A hybrid image encryption algorithm using chaos and Conway's game-of-life cellular automata
652 -- 666Tzer-Long Chen, Yu-Ting Liao, Yi-Fan Chang, Jen-Hung Hwang. Security approach to controlling access to personal health records in healthcare service
667 -- 679Tzonelih Hwang, Prosanta Gope. Robust stream-cipher mode of authenticated encryption for secure communication in wireless sensor network
680 -- 696Fuzhi Zhang, Honghong Chen. An ensemble method for detecting shilling attacks based on ordered item sequences
697 -- 0Yilei Wang, Zhe Liu, Qiuliang Xu. Corrigendum to "New Rational Parties Relying on Reputation"

Volume 9, Issue 6

455 -- 456Jong Hyuk Park, Stefanos Gritzalis, Bo-Chao Cheng, Ning Zhang. Challenges and opportunities in next-generation cyberspace security
457 -- 467Yuxue Piao, Jin Hyuk Jung, Jeong Hyun Yi. Server-based code obfuscation scheme for APK tamper detection
468 -- 480Wei-Chen Wu, Horng-Twu Liaw. An authentication, authorization, and accounting mechanism for 3G/WLAN networks
481 -- 491Haider Abbas, Moeen Qaemi Mahmoodzadeh, Farrukh Aslam Khan, Maruf Pasha. Identifying an OpenID anti-phishing scheme for cyberspace
492 -- 499Aziz Nasridinov, Young-Sik Jeong, Jeongyong Byun, Young-Ho Park 0002. A histogram-based method for efficient detection of rewriting attacks in simple object access protocol messages
500 -- 512Namje Park, Hyo-Chan Bang. Mobile middleware platform for secure vessel traffic system in IoT service environment
513 -- 527Hisain Elshaafi, Dmitri Botvich. Optimisation-based collaborative determination of component trustworthiness in service compositions
528 -- 534Jong Hyuk Park, Dohyung Kim, Ji Soo Park, Sangjin Lee. An enhanced security framework for reliable Android operating system
535 -- 541Sang-Ho Seo, Byung-Ok Jung, Byung-Su Koh, James Jeong. A study on SW-Blackbox to ensure the reliability of content distribution using file system event monitoring of online service providers
542 -- 554Georgios Kambourakis, Dimitrios Damopoulos, Dimitrios Papamartzivanos, Emmanouil Pavlidakis. Introducing touchstroke: keystroke-based authentication system for smartphones
555 -- 560Jong-Ho Kim, Jun-Jae Park, Sang-Ho Ahn, Deok-Gyu Lee, Daesung Moon, Sang-Kyoon Kim. Small target detection using morphology and modified Gaussian distance function
561 -- 570Geon Woo Kim, Jong-Wook Han, Deok-Gyu Lee, Sang-Wook Kim. Single authentication through in convergence space using collaborative smart cameras
571 -- 582Nikolaos Marangos, Panagiotis Rizomiliotis, Lilian Mitrou. Time synchronization: pivotal element in cloud forensics

Volume 9, Issue 5

371 -- 379Ji Wu, Wei Wang 0046, Qilian Liang, Xiaorong Wu, Baoju Zhang. Compressive sensing-based data encryption system with application to sense-through-wall UWB noise radar
380 -- 388Chun-I Fan, Yu-Kuang Liang, Chien-Nan Wu. Privacy enhancement for fair PayWord-based micropayment
389 -- 419Peter Teufl, Michaela Ferk, Andreas Fitzek, Daniel M. Hein, Stefan Kraxberger, Clemens Orthacker. Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play)
420 -- 428Isaac Woungang, Sanjay Kumar Dhurandher, Mohammad S. Obaidat, Rajender Dheeraj Peddi. A DSR-based routing protocol for mitigating blackhole attacks on mobile ad hoc networks
429 -- 439Nils Ulltveit-Moe, Vladimir A. Oleshchuk. Enforcing mobile security with location-aware role-based access control
440 -- 450G. M. Køien. A privacy enhanced device access protocol for an IoT context

Volume 9, Issue 4

279 -- 289Noureddine Chaib, Nasreddine Lagraa, Mohamed Bachir Yagoubi, Abderrahmane Lakas. SDRP: a secure distributed revocation protocol for vehicular environments
290 -- 315Zhifeng Xiao, Nandhakumar Kathiresshan, Yang Xiao. A survey of accountability in computer networks and distributed systems
316 -- 326Fernando Sanchez, Zhenhai Duan, Yingfei Dong. Blocking spam by separating end-user machines from legitimate mail server machines
327 -- 335Tiago A. Almeida, Akebo Yamakami. Compression-based spam filter
336 -- 356Olivier Thonnard, Pierre-Antoine Vervier, Marc Dacier. Spammers operations: a multifaceted strategic analysis
357 -- 365Jinwei Wang, Leiming Yan, Jin Han, Yuxiang Wang. Secure hybrid multibit multiplicative watermarking for media distribution over mobile Internet

Volume 9, Issue 3

189 -- 200Ki Tak Kim, Jong Hwan Park, Dong-Hoon Lee. Selectively chosen ciphertext security in threshold public-key encryption
201 -- 207Kumar Sridharamurthy, Abhilash Pernaje Govinda, Jyothi D. Gopal, Golla Varaprasad. Violation detection method for vehicular ad hoc networking
208 -- 219Pedro J. Fernandez Ruiz, Fernando Bernal-Hidalgo, Cristian A. Nieto Guerra, Antonio F. GĂ³mez-Skarmeta. Mobility and security in a real VANET deployed in a heterogeneous networks
220 -- 228Leron Lightfoot, Yun Li, Jian Ren. STaR: design and quantitative measurement of source-location privacy for wireless sensor networks
229 -- 240Jian Ren, Yun Li, Tingting Jiang, Tongtong Li. Anonymous communication in overlay networks
241 -- 247Ming-Huang Guo, Horng-Twu Liaw, Meng-Yu Chiu, Der-Jiunn Deng. ad hoc networks
248 -- 261Jungha Paik, Kwantae Cho, Boo-Geum Jung, Dong-Hoon Lee. Client cloud Web service: reducing traffic consumption
262 -- 273Paria Jokar, Nasim Arianpoo, Victor C. M. Leung. A survey on security issues in smart grids

Volume 9, Issue 2

77 -- 86Edith C. H. Ngai. On providing sink anonymity for wireless sensor networks
87 -- 93Geoffrey Ottoy, Tom Hamelinckx, Bart Preneel, Lieven De Strycker, Jean-Pierre Goemaere. On the choice of the appropriate AES data encryption method for ZigBee nodes
94 -- 105Emmanouil Magkos, Panayiotis Kotzanikolaou. SCN-SI-021 achieving privacy and access control in pervasive computing environments
106 -- 117Jan Vossaert, Jorn Lapon, Bart De Decker, Vincent Naessens. Symmetric key infrastructure for authenticated key establishment between resource constrained nodes and powerful devices
118 -- 129Krzysztof Szczypiorski, Wojciech Mazurczyk. Steganography in IEEE 802.11 OFDM symbols
130 -- 138Martin Werner. Privacy-protected communication for location-based services
139 -- 148Chin-Feng Lee, Chi-Yao Weng, Aneesh Sharma. Steganographic access control in data hiding using run-length encoding and modulo-operations
149 -- 165Christophe Huygens, Nelson Matthys, Wouter Joosen. Optimizing resource and data security in shared sensor networks
166 -- 170Zhiwei Wang. et al
171 -- 183Binod Vaidya, Dimitrios Makrakis, Hussein Mouftah. Two-factor mutual authentication with key agreement in wireless sensor networks

Volume 9, Issue 18

4827 -- 4838Muhammad Ajmal Azad, Ricardo Morla, Junaid Arshad, Khaled Salah. Clustering VoIP caller for SPIT identification
4839 -- 4851Youngse Kim, Ung Heo, Keecheon Kim. Improved hash and transmission method for larger packets in the RADIUS protocol
4852 -- 4862Yuyan Guo, Jiguo Li, Yichen Zhang, Jian Shen. Hierarchical attribute-based encryption with continuous auxiliary inputs leakage
4863 -- 4881Basant Subba, Santosh Biswas, Sushanta Karmakar. False alarm reduction in signature-based IDS: game theory approach
4882 -- 4896Shuang Qiu, Rui Zhang 0002, Yuchen Cao, Wei Yang, Yongbin Zhou, Tian Ding. A statistical model for DPA when algorithmic noise is dependent on target
4897 -- 4913Lixian Liu, Junzuo Lai, Robert H. Deng, Yingjiu Li. Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment
4914 -- 4923Haibin Zheng, Jing Qin, Jiankun Hu, Qianhong Wu. Threshold attribute-based signcryption and its application to authenticated key agreement
4924 -- 4948Mustapha Benssalah, Mustapha Djeddou, Karim Drouiche. Dual cooperative RFID-telecare medicine information system authentication protocol for healthcare environments
4949 -- 4956Aymen Ghilen, Mostafa Azizi, Ridha Bouallègue. Upgrade of a quantum scheme for authentication and key distribution along with a formal verification based on model checking technique
4957 -- 4972Sara Nazari, Mohammad Shahram Moin, Hamidreza Rashidy Kanan. A face template protection approach using chaos and GRP permutation
4973 -- 4982Ziba Eslami, Nasrollah Pakniat, Mehrdad Nojoumian. Ideal social secret sharing using Birkhoff interpolation method
4983 -- 4991Ali Mahmoodi, Javad Mohajeri, Mahmoud Salmasizadeh. A certificate-based proxy signature with message recovery without bilinear pairing
4992 -- 5002Utku GĂ¼len, Selçuk Baktir. Elliptic-curve cryptography for wireless sensor network nodes without hardware multiplier support
5003 -- 5015Ye Yang, Jinguang Han, Willy Susilo, Tsz Hon Yuen, Jiguo Li. ABKS-CSC: attribute-based keyword search with constant-size ciphertexts
5016 -- 5027Shehzad Ashraf Chaudhry, Imran Khan, Azeem Irshad, Muhammad Usman Ashraf, Muhammad Khurram Khan, Hafiz Farooq Ahmad. A provably secure anonymous authentication scheme for Session Initiation Protocol
5028 -- 5035Xingyuan Wang, Siwei Wang, Zhanjie Wang, Mengcan Zhang. A new key agreement protocol based on Chebyshev chaotic maps
5036 -- 5050Osama Hosam, Nadhir Ben Halima. Adaptive block-based pixel value differencing steganography
5051 -- 5063SĂ¼leyman Kardas, Mehmet Sabir Kiraz, Muhammed Ali Bingöl, Fatih Birinci. Norwegian internet voting protocol revisited: ballot box and receipt generator are allowed to collude
5064 -- 5084Peng Jiang, Yi Mu, Fuchun Guo, Xiaofen Wang, Jianchang Lai. Centralized keyword search on encrypted data for cloud applications
5085 -- 5097Pandi Vijayakumar, Ramu Naresh, S. K. Hafizul Islam, Lazarus Jegatha Deborah. An effective key distribution for secure internet pay-TV using access key hierarchies
5098 -- 5115Maryam Mouzarani, Babak Sadeghiyan, Mohammad Zolfaghari. A smart fuzzing method for detecting heap-based vulnerabilities in executable codes
5116 -- 5132Wenlin Han, Yang Xiao 0001. Design a fast Non-Technical Loss fraud detector for smart grid
5133 -- 5142Pei Zhang, Yi-Liang Liu, Jianming Zhang, Liang-min Wang. Power allocation design and optimization for secure transmission in cognitive relay networks
5143 -- 5154Firoz Ahmed, Young-Bae Ko. Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks
5155 -- 5165Xiaoqiang Sun, Jianping Yu, Ting Wang, Zhiwei Sun, Peng Zhang. Efficient identity-based leveled fully homomorphic encryption from RLWE
5166 -- 5177Hailong Zhang, Yongbin Zhou, Dengguo Feng. Theoretical and practical aspects of multiple samples correlation power analysis
5178 -- 5186Fengxiao Huang, Zhangjie Fu, Xingming Sun, Ching-Nung Yang. Privacy-preserving outsourced gene data search in encryption domain
5187 -- 5202Chin-Ling Chen, Kai-Wen Cheng. Design of a VANET privacy and non-repudiation accident reporting system
5203 -- 5218Musab Ghadi, Lamri Laouamer, Laurent Nana, Anca Pascu. A novel zero-watermarking approach of medical images based on Jacobian matrix model
5219 -- 5237Maryam Asadzadeh Kaljahi, Mohsen Jahanshahi. A survey on security vulnerabilities in channel assignment algorithms of multi-interface wireless mesh networks
5238 -- 5251Gaurav Bansod, Abhijit Patil, Swapnil Sutar, Narayan Pisharoty. ANU: an ultra lightweight cipher design for security in IoT
5252 -- 5261Yanhua Zhang, Yupu Hu, Jia Xie, Mingming Jiang. Efficient ring signature schemes over NTRU Lattices
5262 -- 5277Feng Ye, Yi Qian, Rose Qingyang Hu. Identity-based schemes for a secured big data and cloud ICT framework in smart grid system
5278 -- 5294Mustapha Benssalah, Mustapha Djeddou, Karim Drouiche. Towards a complete chaotic map-based mobile RFID authentication protocol with efficient anticollision tag indexing
5295 -- 5310Khalifa Toumi, Hela Sfar, JoaquĂ­n GarcĂ­a-Alfaro. Reputation trust mechanism under the organizational-based access control model
5311 -- 5332Shaun Mc Brearty, William Farrelly, Kevin Curran. The performance cost of preserving data/query privacy using searchable symmetric encryption
5333 -- 5345Nor Shahriza Abdul Karim, Arwa Albuolayan, Tanzila Saba, Amjad Rehman. The practice of secure software development in SDLC: an investigation through existing model and a case study
5346 -- 5362Salwa Othmen, Malek Rekik, Faouzi Zarai, Aymen Belghith, Lotfi Kamoun. Shortest and secure routing protocol for multi-hop cellular networks (SSRP-MCN)
5363 -- 5375Aritro Sengupta, Utpal Kumar Ray. Message mapping and reverse mapping in elliptic curve cryptosystem
5376 -- 5391Minh Ha Le, Intae Kim, Seong Oun Hwang. Efficient certificate-based encryption schemes without pairing
5392 -- 5400Jinyong Chang, Honglong Dai, MaoZhi Xu, Rui Xue. Separations in circular security for arbitrary length key cycles, revisited
5401 -- 5411Hwajeong Seo, Zhe Liu 0001, Johann GroĂŸschädl, Howon Kim. Efficient arithmetic on ARM-NEON and its application for high-speed RSA implementation
5412 -- 5431Sravani Challa, Ashok Kumar Das, Saru Kumari, Vanga Odelu, Fan Wu, Xiong Li. Provably secure three-factor authentication and key agreement scheme for session initiation protocol
5432 -- 5443Junyang Bai, Weiping Wang, Mingming Lu, Haodong Wang, Jianxin Wang. TD-WS: a threat detection tool of WebSocket and Web Storage in HTML5 websites
5444 -- 5459Xiaotong Wu, Meng Liu, Wan-Chun Dou, Shui Yu. DDoS attacks on data plane of software-defined network: are they possible?
5460 -- 5471Yimin Wang, Hong Zhong, Yan Xu, Jie Cui, Funchun Guo. Efficient extensible conditional privacy-preserving authentication scheme supporting batch verification for VANETs
5472 -- 5489Hayfaa Abdulzahra Atee, Robiah Ahmad, Norliza Mohd Noor, Abdul Monem S. Rahma, Muhammad Samer Sallam. A novel extreme learning machine-based cryptography system
5490 -- 5501Dong Xie, Haipeng Peng, Lixiang Li, Yixian Yang. Short lattice signatures with constant-size public keys
5502 -- 5517Chi Lin, Tie Qiu, Mohammad S. Obaidat, Chang-Wu Yu, Lin Yao, Guowei Wu. MREA: a minimum resource expenditure node capture attack in wireless sensor networks
5518 -- 5532Han Yan, Xiang Cheng, Dezheng Wang, Sen Su, Qiying Zhang. Authentication of spatio-textual similarity join queries in untrusted cloud environments
5533 -- 5546Azam Davahli, Seyed Morteza Babamir. Indefinite block ciphering based on variable and great length key
5547 -- 5562Jayashree Pougajendy, Arun Raj Kumar Parthiban. CDAI: a novel collaborative detection approach for impersonation attacks in vehicular ad-hoc networks
5563 -- 5580Maged Hamada Ibrahim, Saru Kumari, Ashok Kumar Das, Vanga Odelu. Jamming resistant non-interactive anonymous and unlinkable authentication scheme for mobile satellite networks
5581 -- 5590Samad Rostampour, Nasour Bagheri, Mehdi Hosseinzadeh, Ahmad Khademzadeh. An authenticated encryption based grouping proof protocol for RFID systems
5591 -- 5599Sahel Alouneh, Sa'ed Abed, George Ghinea. Security of VoIP traffic over low or limited bandwidth networks
5600 -- 5614Huige Wang, Kefei Chen, Baodong Qin, Liangliang Wang. Certificateless encryption secure against selective opening attack
5615 -- 5624Jia Xie, Yupu Hu, Juntao Gao. Multi-use unidirectional lattice-based proxy re-signatures in standard model
5625 -- 5638Jing Chen, Bowen Zhang, Min Chen, Quan Yuan, RuiYing Du. γ-Strawman privacy-preserving scheme in weighted social networks
5639 -- 5650Chanwoo Bae, Seungwon Shin. A collaborative approach on host and network level android malware detection
5651 -- 5658Jiao Du, Chao Li, Shaojing Fu, Shanqi Pang. GF(p)
5659 -- 5672Jiaoli Shi, Chuanhe Huang, Jing Wang, Kai He, Xieyang Shen. An access control scheme with dynamic user management and cloud-aided decryption
5673 -- 5686Mohammad Ahmed Alomari, Khairulmizam Samsudin, Abdul Rahman Ramli, Shaiful J. Hashim. Efficient Android-based storage encryption using multi-core CPUs
5687 -- 5697Imran Erguler. A key recovery attack on an error-correcting code-based lightweight security protocol
5698 -- 5709Hai-Cheng Chu, Gai-Ge Wang, Der-Jiunn Deng. The social networking investigation of metadata of forensic artifacts of a typical WeChat session under Windows
5710 -- 5723Dihua Sun, Hongzhuan Zhao, Senlin Cheng. A novel membership cloud model-based trust evaluation model for vehicular ad hoc network of T-CPS
5724 -- 5732Xiaoming Hu, Huajie Xu, Yan Liu, Jian Wang, WenAn Tan, Xiaojun Zhang. An efficient designated verifier signature scheme with pairing-free and low cost
5733 -- 5745N. K. Sreelaja, N. K. Sreeja. An image edge based approach for image password encryption
5746 -- 5755Kai Zhang, Jie Guan, Bin Hu. Some properties of impossible differential and zero correlation linear cryptanalysis on TEA family-type ciphers
5756 -- 5763Xin Liao, Guoyong Chen, Jiaojiao Yin. Content-adaptive steganalysis for color images
5764 -- 5788Mohammad H. Alshayeji, Suood Abdulaziz Al-Roomi, Sa'ed Abed. A high-capacity and secure least significant bit embedding approach based on word and letter frequencies
5789 -- 5802Kai Zhang, Wen Chen, Xiangxue Li, Jie Chen, Haifeng Qian. New application of partitioning methodology: identity-based dual receiver encryption
5803 -- 5833Kamal Benzekki, Abdeslam El Fergougui, Abdelbaki Elbelrhiti Elalaoui. Software-defined networking (SDN): a survey
5834 -- 5848Xuewen Dong, Chao Yang, Lijie Sheng, Chao Wang, Jianfeng Ma. A new method to deduce counterexamples in secure routing protocols based on strand space model
5849 -- 5857Shaohua Tang, Weijian Li, Jianhao Wu, Zheng Gong, Ming Tang. Power analysis attacks against FPGA implementation of KLEIN
5858 -- 5867Ting Cui, Guo-qiang Liu, Wei-Tao Song. Real-time decomposition of three kinds of structural S-boxes
5868 -- 5881Shuaishuai Tan, Yanming Liu, Xiaoping Li, Qingkuan Dong. A similarity-based indirect trust model with anti-spoofing capability
5882 -- 5891Murat Dener, Ă–mer Faruk Bay. TeenySec: a new data link layer security protocol for WSNs
5892 -- 5907Nikolaos Baroutis, Mohamed F. Younis. A novel traffic analysis attack model and base-station anonymity metrics for wireless sensor networks
5908 -- 5917Mohsan Rasheed, Young-Sik Kim, Dae-Woon Lim. An error-free data-hiding scheme for encrypted images
5918 -- 5933Pengbin Feng, Cong Sun, Jianfeng Ma. Measuring the risk value of sensitive dataflow path in Android applications
5934 -- 5942Suresh Kumar Krishnamoorthy, Sasikala Thankappan. A novel method to authenticate in website using CAPTCHA-based validation
5943 -- 5964Aafaf Ouaddah, Anas Abou El Kalam, Abdellah Ait Ouahman. FairAccess: a new Blockchain-based access control framework for the Internet of Things
5965 -- 5976Jiawei Dou, Linming Gong, Shundong Li, Li Ma. Efficient private subset computation
5977 -- 5995J. Abdella, M. Ă–zuysal, E. Tomur. CA-ARBAC: privacy preserving using context-aware role-based access control on Android permission system
5996 -- 6003Zuhua Shao, Yipeng Gao. Practical verifiably encrypted signatures based on discrete logarithms
6004 -- 6016Abdullah M. Hamdan, Ala Hamarsheh. AH4S: an algorithm of text in text steganography using the structure of omega network
6017 -- 6033Bensalah Mustapha, Mustapha Djeddou, Karim Drouiche. An ultralightweight RFID authentication protocol based on Feistel cipher structure
6034 -- 6041Ruxandra F. Olimid. SETUP in secret sharing schemes using random values
6042 -- 6065Ali Ahmadian Ramaki, Abbas Rasoolzadegan. Causal knowledge analysis for detecting and modeling multi-step attacks
6066 -- 6079Bala Krishnan Ramakrishnan, Prasanth Kumar Thandra, A. V. Satya Murty Srinivasula. Text steganography: a novel character-level embedding algorithm using font attribute
6080 -- 6093Ying Liu, Andrey Garnaev, Wade Trappe. Connectivity jamming game for physical layer attack in peer to peer networks
6094 -- 6110Zdenek Martinasek, Félix Iglesias, Lukas Malina, Josef Martinasek. Crucial pitfall of DPA Contest V4.2 implementation
6111 -- 6136Hamed Orojloo, Mohammad Abdollahi Azgomi. Predicting the behavior of attackers and the consequences of attacks against cyber-physical systems
6137 -- 6147Seedahmed S. Mahmoud. A generalised wavelet packet-based anonymisation approach for ECG security application
6148 -- 6172Dhekra Essaidani, Hassene Seddik, Ezzedine Ben Braiek. Invariant digital image watermarking based on Defragmented Delaunay Triangulation for optimal watermark synchronization
6173 -- 6188Basel Alomair. Authenticated encryption: how reordering can impact performance
6189 -- 6201Raghu Vamsi P., Krishna Kant. Trust aware cooperative routing method for WANETs
6202 -- 6214Geontae Noh, Ik Rae Jeong. Strong designated verifier signature scheme from lattices in the standard model
6215 -- 6226Serif Bahtiyar. Anatomy of targeted attacks with smart malware
6227 -- 6238Qiao Peng, Youliang Tian. Publicly verifiable secret sharing scheme and its application with almost optimal information rate
6239 -- 6247Sahib Khan, Muhammad Ismail, Tawab Khan, Nasir Ahmad. Enhanced stego block chaining (ESBC) for low bandwidth channels
6248 -- 6265Ibrahim M. Mahmoud, Sherif Hazem Nour El-Din, Rania Elgohary, Hossam Faheem, Mostafa G. M. Mostafa. A robust cryptographic-based system for secure data sharing in cloud environments
6266 -- 6284Gaurav Varshney, Manoj Misra, Pradeep K. Atrey. A survey and classification of web phishing detection schemes
6285 -- 6314Stavros Simou, Christos Kalloniatis, Stefanos Gritzalis, Haralambos Mouratidis. A survey on cloud forensics challenges and solutions
6315 -- 6334Sonika Singh, Sahadeo Padhye. Generalisations of NTRU cryptosystem
6335 -- 6350Fu-Hau Hsu, Yu-Liang Hsu, Yanling Hwang, Li-Han Chen, Chuan-Sheng Wang, Chang-Kuo Tso, Szu-Chi Liu, Po-Ching Lin, Chi-Hsien Hsu. VRS: a values-based reputation system for web services
6351 -- 6364Furui Zhan, Nianmin Yao. A collusion-resistant dynamic key management scheme for WSNs
6365 -- 6378Mohammed Hazim Alkawaz, Ghazali Sulong, Tanzila Saba, Abdulaziz S. Almazyad, Amjad Rehman. Concise analysis of current text automation and watermarking approaches
6379 -- 6385P. Dharshini, J. Arokia Renjith, P. Mohan Kumar. Screening the covert key using honey encryption to rule out the brute force attack of AES - a survey
6386 -- 6411Neelam Dayal, Prasenjit Maity, Shashank Srivastava, Rahamatullah Khondoker. Research Trends in Security and DDoS in SDN

Volume 9, Issue 17

3927 -- 3943Hacène Fouchal, Philippe Hunel, Cédric Ramassamy. Towards efficient deployment of wireless sensor networks
3944 -- 3951Yuanyuan Zhang, Neeraj Kumar, Jianhua Chen, Joel J. P. C. Rodrigues. A secure energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography
3952 -- 3965Pandi Vijayakumar, Ramu Naresh, Lazarus Jegatha Deborah, SK Hafizul Islam. An efficient group key agreement protocol for secure P2P communication
3966 -- 3986Shashank Gupta, Brij Bhooshan Gupta. XSS-immune: a Google chrome extension-based XSS defensive framework for contemporary platforms of web applications
3987 -- 4001Jui-Di Wu, Yuh-Min Tseng, Sen-Shan Huang. Leakage-resilient ID-based signature scheme in the generic bilinear group model
4002 -- 4012Qi Liu, Weidong Cai, Jian Shen, Zhangjie Fu, Xiaodong Liu, Nigel Linge. A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment
4013 -- 4026Jyh-Jian Sheu, Yin-Kai Chen, Ko-Tsung Chu, Jih-Hsin Tang, Wei-Pang Yang. An intelligent three-phase spam filtering method based on decision tree data mining
4027 -- 4047Azzedine Boukerche, Noura Aljeri, Kaouther Abrougui, Yan Wang. Towards a secure hybrid adaptive gateway discovery mechanism for intelligent transportation systems
4048 -- 4059Vanga Odelu, Ashok Kumar Das. Design of a new CP-ABE with constant-size secret keys for lightweight devices using elliptic curve cryptography
4060 -- 4074Arijit Karati, G. P. Biswas. Efficient and provably secure random oracle-free adaptive identity-based encryption with short-signature scheme
4075 -- 4088Zhi-Hui Wang, Ya-Feng Di, Jianjun Li, Chin-Chen Chang, Hui Liu. Progressive secret image sharing scheme using meaningful shadows
4089 -- 4102Saurabh Agarwal, Satish Chand, Nikolay Skarbnik. SPAM revisited for median filtering detection using higher-order difference
4103 -- 4119Mohammad Wazid, Ashok Kumar Das, Saru Kumari, Xiong Li, Fan Wu. Provably secure biometric-based user authentication and key agreement scheme in cloud computing
4120 -- 4137Nishat Koti, B. R. Purushothama. Group-oriented encryption for dynamic groups with constant rekeying cost
4138 -- 4150Qihua Wang, Chang-Wu Yu, Fagen Li, Huaqun Wang, Lijie Cao. A group key-policy attribute-based encryption with partial outsourcing decryption in wireless sensor networks
4151 -- 4165Chao Zou, Chunxiao Chigan. Dynamic spectrum access-based cryptosystem for cognitive radio networks
4166 -- 4181Tanmoy Maitra, Mohammad S. Obaidat, SK Hafizul Islam, Debasis Giri, Ruhul Amin. Security analysis and design of an efficient ECC-based two-factor password authentication scheme
4182 -- 4191Mohanad Dawoud, D. Turgay Altilar. HEADA: a low cost RFID authentication technique using homomorphic encryption for key generation
4192 -- 4209Marimuthu Karuppiah, Saru Kumari, Ashok Kumar Das, Xiong Li, Fan Wu, Sayantani Basu. A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks
4210 -- 4226Kevin Nathanael Santoso, Suk Hwan Lee, Won-Joo Hwang, Ki-Ryong Kwon. Sector-based DNA information hiding method
4227 -- 4241Jinrong Bai, Junfeng Wang. Improving malware detection using multi-view ensemble learning
4242 -- 4254Kazim Yildiz, Ali Buldu, Hasan Saritas. Elliptic curve coding technique application for digital signature
4255 -- 4271Saru Kumari, Marimuthu Karuppiah, Xiong Li, Fan Wu, Ashok Kumar Das, Vanga Odelu. An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks
4272 -- 4284Green Kim, Youngse Kim, Ung Heo, Keecheon Kim. A lightweight authentication mechanism in MIP networks
4285 -- 4294Wenying Zhang, Wenyu Zhang. Algebraic techniques on searching linear diffusion layers in block cipher
4295 -- 4300Atila Bostan. Implicit learning with certificate warning messages on SSL web pages: what are they teaching?
4301 -- 4318Himani Agrawal, Monisha Sharma. Calculation of complexity of NTRU and optimized NTRU using GA, ACO, and PSO algorithm
4319 -- 4329Vinothkumar Muthurajan, Balaji Narayanasamy. DKSM-DHT: privacy-preserving dynamic key sharing model in distributed cloud computing environment
4330 -- 4340Alex Oyler, Hossein Saiedian. Security in automotive telematics: a survey of threats and risk mitigation strategies to counter the existing and emerging attack vectors
4341 -- 4357Thankaraja Raja Sree, Somasundaram Mary Saira Bhanu. HADM: detection of HTTP GET flooding attacks by using Analytical hierarchical process and Dempster-Shafer theory with MapReduce
4358 -- 4368Abdalhossein Rezai, Parviz Keshavarzi, Zahra Moravej. Advance hybrid key management architecture for SCADA network security
4369 -- 4377Kamal Benzekki, Abdeslam El Fergougui, Abdelbaki El Alaoui El Belrhiti. Devolving IEEE 802.1X authentication capability to data plane in software-defined networking (SDN) architecture
4378 -- 4390Chin-Ling Chen, Yu-Fan Lin, Aniello Castiglione, Francesco Palmieri. A secure payment system for multimedia on demand on mobile VANET clouds
4391 -- 4402K. K. Soundra Pandian, Kailash Chandra Ray. Dynamic Hash key-based stream cipher for secure transmission of real time ECG signal
4403 -- 4415Manish Kumar Thukral, Karma Sonam Sherpa, Kumkum Garg. Design of a robust receiver for chaotic switching maps of DC-DC power electronics transmitter converters for secure communication
4416 -- 4427Oguzhan Ersoy, Thomas Brochmann Pedersen, Kamer Kaya, Ali Aydin Selçuk, Emin Anarim. A CRT-based verifiable secret sharing scheme secure against unbounded adversaries
4428 -- 4442Chaker Abdelaziz Kerrache, Carlos T. Calafate, Nasreddine Lagraa, Juan-Carlos Cano, Pietro Manzoni. RITA: RIsk-aware Trust-based Architecture for collaborative multi-hop vehicular communications
4443 -- 4450Auqib Hamid Lone, Aqeel Khalique. k prime numbers with secure key generation
4451 -- 4467Nishant Doshi, Devesh C. Jinwala. A novel approach for privacy homomorphism using attribute-based encryption
4468 -- 4481Rup Kumar Deka, Dhruba K. Bhattacharyya. Self-similarity based DDoS attack detection using Hurst parameter
4482 -- 4494Xiruo Liu, Wade Trappe. Overlay tunneling as a policy tool for defending mobile ad hoc networks
4495 -- 4504Samaneh Mashhadi. Share secrets stage by stage with homogeneous linear feedback shift register in the standard model
4505 -- 4519Yanwei Zhou, Bo Yang 0003, Wenzheng Zhang, Yi Mu. CCA2 secure public-key encryption scheme tolerating continual leakage attacks
4520 -- 4535Lishi Fu, Chenhui Jin, Xinran Li. Multidimensional zero-correlation linear cryptanalysis of lightweight block cipher Piccolo-128
4536 -- 4547Xiaofen Wang, Yi Mu, Rongmao Chen. An efficient privacy-preserving aggregation and billing protocol for smart grid
4548 -- 4556Zhaohong Li, Zhenzhen Zhang, Sheng Guo, Jinwei Wang. Video inter-frame forgery identification based on the consistency of quotient of MSSIM
4557 -- 4573Ming Ying, Shu-Qin Li. CSP adoption: current status and future prospects
4574 -- 4584Yahong Li, Caifen Wang, Yulei Zhang, Shufen Niu. Privacy-preserving multi-receiver signcryption scheme for heterogeneous systems
4585 -- 4595Wafa Neji, Kaouther Blibech Sinaoui, Narjes Ben Rajeb. Distributed key generation protocol with a new complaint management strategy
4596 -- 4614Mohammad Wazid, Ashok Kumar Das, Saru Kumari, Muhammad Khurram Khan. Design of sinkhole node detection mechanism for hierarchical wireless sensor networks
4615 -- 4638Tanmoy Maitra, SK Hafizul Islam, Ruhul Amin, Debasis Giri, Muhammad Khurram Khan, Neeraj Kumar. An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design
4639 -- 4649Kok Seng Wong, Myung Ho Kim. An enhanced user authentication solution for mobile payment systems using wearables
4650 -- 4666Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Debasis Giri, Muhammad Khurram Khan, Neeraj Kumar. A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments
4667 -- 4679Mark Evans, Leandros A. Maglaras, Ying He, Helge Janicke. Human behaviour as an aspect of cybersecurity assurance
4680 -- 4690Yilmaz Kaya, Ă–mer Faruk Ertugrul. A novel feature extraction approach in SMS spam filtering for mobile communication: one-dimensional ternary patterns
4691 -- 4702Rangkun Li, Shuzheng Xu, Bo Rong, Huazhong Yang. Host cancelation-based spread spectrum watermarking for audio anti-piracy over Internet
4703 -- 4725Kamal Ali Alezabi, Fazirulhisyam Hashim, Shaiful Jahari Hashim, Borhanuddin Mohd Ali, Abbas Jamalipour. Authentication process enhancements in WiMAX networks
4726 -- 4750Salman Iqbal, Miss Laiha Mat Kiah, Nor Badrul Anuar, Babak Daghighi, Ainuddin Wahid Abdul Wahab, Suleman khan. Service delivery models of cloud computing: security issues and open challenges
4751 -- 4776Ali Ahmadian Ramaki, Reza Ebrahimi Atani. A survey of IT early warning systems: architectures, challenges, and solutions
4777 -- 4803Mohammad Masdari, Safiyeh Ahmadzadeh. Comprehensive analysis of the authentication methods in wireless body area networks
4804 -- 4821Lei Zeng, Yang Xiao 0001, Hui Chen, Bo Sun, Wenlin Han. Computer operating system logging and security issues: a survey
4822 -- 0Wenli Shang, Peng Zeng, Ming Wan, Lin Li, Panfeng An. Corrigendum to "Intrusion detection algorithm based on OCSVM in industrial control system"

Volume 9, Issue 16

3049 -- 3058Keke Gai, Meikang Qiu, Lixin Tao, Yongxin Zhu. Intrusion detection techniques for mobile cloud computing in heterogeneous 5G
3059 -- 3069Zheng Yan, Peng Zhang, Athanasios V. Vasilakos. A security and trust framework for virtualized networks and software-defined networking
3070 -- 3082Raimo Kantola, Jesus Llorente Santos, Nicklas Beijar. Policy-based communications for 5G mobile with customer edge switching
3083 -- 3094Xin Huang, Paul Craig, Hangyu Lin, Zheng Yan. SecIoT: a security framework for the Internet of Things
3095 -- 3104Kai Fan, Yuanyuan Gong, Chen Liang, Hui Li 0006, Yintang Yang. Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G
3105 -- 3115Satyanarayana Vollala, Krishnan Geetha, Natarajan Ramasubramanian. Efficient modular exponential algorithms compatible with hardware implementation of public-key cryptography
3116 -- 3126Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng. Towards optimal leakage exploitation rate in template attacks
3127 -- 3140Yichuan Wang, Jianfeng Ma, Liumei Zhang, Wenjiang Ji, Di Lu, Xinhong Hei. Dynamic game model of botnet DDoS attack and defense
3141 -- 3151Haohao Nie, Yanping Li, Weifeng Chen, Yong Ding. NCLAS: a novel and efficient certificateless aggregate signature scheme
3152 -- 3166Arjumand Fatima, Yumna Ghazi, Muhammad Awais Shibli, Abdul Ghafoor Abassi. Towards Attribute-Centric Access Control: an ABAC versus RBAC argument
3167 -- 3177Hong Zhu, Bin Wu, Meiyi Xie. Privacy-preserving ranked neighbor query over encrypted graph data in the cloud
3178 -- 3189Zhongliu Zhuo, Xiaosong Zhang, Ruixing Li, Ting Chen, Jingzhong Zhang. A multi-granularity heuristic-combining approach for censorship circumvention activity identification
3190 -- 3196Bogyu Jang, Jaeseung Lee, Manhee Lee. Automatic system for measuring security risk of Android application from third party app store
3197 -- 3218Roger JardĂ­-CedĂ³, Jordi CastellĂ -Roca, Alexandre Viejo. Privacy-preserving electronic road pricing system for low emission zones with dynamic pricing
3219 -- 3228A. S. M. Touhidul Hasan, Qingshan Jiang, Jun Luo, Chengming Li, Lifei Chen. An effective value swapping method for privacy preserving data publishing
3229 -- 3238SK Hafizul Islam, Ashok Kumar Das, Muhammad Khurram Khan. Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor
3239 -- 3250Yangguang Tian, Guomin Yang, Yi Mu. Privacy-preserving grouping proof with key exchange in the multiple-party setting
3251 -- 3270Monowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita. E-LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric
3271 -- 3281Rajesh P. Barnwal, Soumya K. Ghosh. KITE: an efficient scheme for trust estimation and detection of errant nodes in vehicular cyber-physical systems
3282 -- 3295Muzaffar Rao, Thomas Newe, Ian Grout, Avijit Mathur. An FPGA-based reconfigurable IPSec AH core with efficient implementation of SHA-3 for high speed IoT applications
3296 -- 3308Yonglin Hao. Cryptanalysis of the LSH hash functions
3309 -- 3313Jinyong Chang, Honglong Dai, MaoZhi Xu, Rui Xue. Security analysis of a TESLA-based homomorphic MAC scheme for authentication in P2P live streaming system
3314 -- 3323Satyajit Mondal, Sraban Kumar Mohanty, Sukumar Nandi. Energy efficient secure communication architecture for wireless sensor network
3324 -- 3339Algimantas Venckauskas, Vytautas Stuikys, Robertas Damasevicius, Nerijus Jusas. Modelling of Internet of Things units for estimating security-energy-performance relationships for quality of service and environment awareness
3340 -- 3352Howard M. Heys. Error burst analysis of a statistical self-synchronizing mode of block ciphers
3353 -- 3364Gurbakshish Singh Toor, Maode Ma. Security enhancement for dynamic key refreshment in neighborhood area network of smart grid
3365 -- 3377BalaSuyambu Jeyaram, R. Radha, Rama Raghavan. New cellular automata-based image cryptosystem and a novel non-parametric pixel randomness test
3378 -- 3387Muhammad Muneer Umar, Amjad Mehmood, Houbing Song. SeCRoP: secure cluster head centered multi-hop routing protocol for mobile ad hoc networks
3388 -- 3400Fatemeh Tahmasbi, Neda Moghim, Mojtaba Mahdavi. Adaptive ternary timing covert channel in IEEE 802.11
3401 -- 3411Chenghua Tang, Yang Xiang, Yu Wang, Junyan Qian, Baohua Qiang. Detection and classification of anomaly intrusion using hierarchy clustering and SVM
3412 -- 3427Mungyu Bae, Jiyeon Lee, Suk-Kyu Lee, Hwangnam Kim. Securing mobile access with interactive image code and image key encryption
3428 -- 3443Lili Xu, Fan Wu. A novel three-factor authentication and key agreement scheme providing anonymity in global mobility networks
3444 -- 3451Dongmei Li, Xiaolei Dong, Zhenfu Cao. Secure and privacy-preserving pattern matching in outsourced computing
3452 -- 3466Jing Chen, Lihong Zhang, Kun He, Min Chen, RuiYing Du, Lina Wang. Message-locked proof of ownership and retrievability with remote repairing in cloud
3467 -- 3482Samant Saurabh, Ashok Singh Sairam. Increasing the effectiveness of packet marking schemes using wrap-around counting Bloom filter
3483 -- 3495Abdelfattah Amamra, Jean-Marc Robert, Andrien Abraham, Chamseddine Talhi. Generative versus discriminative classifiers for android anomaly-based detection system using system calls filtering and abstraction process
3496 -- 3508Aiqing Zhang, Abel Bacchus, Xiaodong Lin. Consent-based access control for secure and privacy-preserving health information exchange
3509 -- 3526Mehran Alidoost Nia, Reza Ebrahimi Atani, Benjamin Fabian, Eduard Babulak. On detecting unidentified network traffic using pattern-based random walk
3527 -- 3542Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Ashok Kumar Das, Muhammad Khurram Khan, Marimuthu Karuppiah, Renuka Baliyan. A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks
3543 -- 3557Lina Wang, Weijie Liu, Neeraj Kumar, Debiao He, Cheng Tan, Debin Gao. A novel covert channel detection method in cloud based on XSRM and improved event association algorithm
3558 -- 3569Sedat Akleylek, Muharrem Tolga Sakalli, Emir Ă–ztĂ¼rk, Andac Sahin Mesut, Gökhan Tuncay. Generating binary diffusion layers with maximum/high branch numbers and low search complexity
3570 -- 3584Shukai Liu, Xuexiong Yan, QingXian Wang, Qi Xi. A systematic study of content security policy in web applications
3585 -- 3601Zhide Chen, Jiyun Wu, Aniello Castiglione, Wei Wu. Human continuous activity recognition based on energy-efficient schemes considering cloud security technology
3602 -- 3617Xuelian Long, David Tipper, Yi Qian. A key management architecture and protocols for secure smart grid communications
3618 -- 3626Ayong Ye, Jianfei Sao, Qi Jian. A robust location fingerprint based on differential signal strength and dynamic linear interpolation
3627 -- 3632Fenghe Wang, Zhenhua Liu. Short and provable secure lattice-based signature scheme in the standard model
3633 -- 3645Yao Zhang, Zhiming Zheng 0001, Pawel Szalachowski, Qi Wang. Collusion-resilient broadcast encryption based on dual-evolving one-way function trees
3646 -- 3657Shungan Zhou, RuiYing Du, Jing Chen, Debiao He, Hua Deng. ESDR: an efficient and secure data repairing paradigm in cloud storage
3658 -- 3669Liangliang Wang, Junzuo Lai, Hu Xiong, Kefei Chen, Yu Long. Fuzzy certificateless signature
3670 -- 3687Ashok Kumar Das, Saru Kumari, Vanga Odelu, Xiong Li, Fan Wu, Xinyi Huang. Provably secure user authentication and key agreement scheme for wireless sensor networks
3688 -- 3702Yinghui Zhang, Dong Zheng, Qi Li, Jin Li 0002, Hui Li 0006. Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing
3703 -- 3712Manoj Kumar, Smita Agrawal. Reversible data hiding based on prediction error expansion using adjacent pixels
3713 -- 3723Changsheng Wan, Juan Zhang. Identity-based key management for wireless sensor networks using lagrange interpolation
3724 -- 3751Mohammad Masdari, Marzie Jalali. A survey and taxonomy of DoS attacks in cloud computing
3752 -- 3761Guoqiang Zhou, Kuang Wang, Chen Zhao, Guofu Zhou. A dynamic trust evaluation mechanism based on affective intensity computing
3762 -- 0Dheerendra Mishra, Ashok Kumar Das, Sourav Mukhopadhyay. An anonymous and secure biometric-based enterprise digital rights management system for mobile environment
3763 -- 3764Xiuzhen Cheng, Miroslaw Kutylowski, Kuai Xu, Haojin Zhu. Cyber security, crime, and forensics of wireless networks and applications
3765 -- 3776Jinguo Li, Mi Wen, Kejie Lu, Chunhua Gu. PIMRS: achieving privacy and integrity-preserving multi-owner ranked-keyword search over encrypted cloud data
3777 -- 3789Lei Zhang, Lifei Wei, Dongmei Huang, Kai Zhang, Mianxiong Dong, Kaoru Ota. MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing
3790 -- 3807Muhammad Irfan, Haider Abbas, Yunchuan Sun, Anam Sajid, Maruf Pasha. A framework for cloud forensics evidence collection and analysis using security information and event management
3808 -- 3820Yinbin Miao, Jiajia Liu, Jianfeng Ma. Efficient keyword search over encrypted data in multi-cloud setting
3821 -- 3832Kuai Xu, Feng Wang 0005, Xiaohua Jia. Secure the Internet, one home at a time
3833 -- 3843Wei Li 0059, Maya Larson, Chunqiang Hu, Ruinian Li, Xiuzhen Cheng, Rongfang Bie. Secure multi-unit sealed first-price auction mechanisms
3844 -- 3853Lichen Zhang, Xiaoming Wang, Junling Lu, Peng Li, Zhipeng Cai. An efficient privacy preserving data aggregation approach for mobile sensing
3854 -- 3867Chengzhe Lai, Rongxing Lu, Dong Zheng. SPGS: a secure and privacy-preserving group setup framework for platoon-based vehicular cyber-physical systems
3868 -- 3879Qingshui Xue, Fengying Li, Huafeng Chen, Huajun Zhang, Zhenfu Cao. Multi-proxy multi-signature binding positioning protocol
3880 -- 3892Qilin Qi, Aaron Sharp, Dongming Peng, Yaoqing Yang, Hamid Sharif. Generic attack against robust steganography based on spring transform and geometrization
3893 -- 3910Datong Xu, Pinyi Ren, Qinghe Du, Li Sun. Active jamming for multi-user information security improvement with the access statuses of users
3911 -- 3921Chaoqun Yang, Heng Zhang, Fengzhong Qu, Zhiguo Shi. Secured measurement fusion scheme against deceptive ECM attack in radar network

Volume 9, Issue 15

2581 -- 2591Ching-Hsien Hsu, Shangguang Wang, Daqiang Zhang, Hai-Cheng Chu, Ning Lu. Efficient identity authentication and encryption technique for high throughput RFID system
2592 -- 2611Vandana Guleria, Ratna Dutta. Efficient oblivious transfer with adaptive queries in UC framework
2612 -- 2626Avleen Kaur Malhi, Shalini Batra. ad-hocnetworks
2627 -- 2640Guo-lin Shao, Xingshu Chen, Xue-yuan Yin, Xiaoming Ye. A fuzzy detection approach toward different speed port scan attacks based on Dempster-Shafer evidence theory
2641 -- 2642Guangjie Han, Lei Shu, Sammy Chan, Jiankun Hu. Security and privacy in Internet of things: methods, architectures, and solutions
2643 -- 2655Xiong Li, Jianwei Niu, Saru Kumari, Junguo Liao, Wei Liang, Muhammad Khurram Khan. A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity
2656 -- 2673Ibrahim Ethem Bagci, Shahid Raza, Utz Roedig, Thiemo Voigt. Fusion: coalesced confidential storage and communication framework for the IoT
2674 -- 2685Ting Yi Chang, Cheng-Jung Tsai, Wang-Jui Tsai, Chun-Cheng Peng, Han-Sing Wu. A changeable personal identification number-based keystroke dynamics authentication system on smart phones
2686 -- 2695Xiaochen Fan, Panlong Yang, Qingyu Li, Dawei Liu, Chaocan Xiang, Yonggang Zhao. SAFE-CROWD: secure task allocation for collaborative mobile social network
2696 -- 2714Béla Genge, Calin Enachescu. ShoVAT: Shodan-based vulnerability assessment tool for Internet-facing services
2715 -- 2729Muhammad Altaf Khan, Shafiullah Khan, Bilal Shams, Jaime Lloret. Distributed flood attack detection mechanism using artificial neural network in wireless mesh networks
2730 -- 2743Bo Li 0005, Jianxin Li, Lu Liu, Chao Zhou. Toward a flexible and fine-grained access control framework for infrastructure as a service clouds
2744 -- 2751Yanwen Wang, Xiaoling Wu, Hainan Chen. An intrusion detection method for wireless sensor network based on mathematical morphology
2752 -- 2753Deqing Zou, Yang Xiang, Geyong Min. Privacy preserving in cloud computing environment
2754 -- 2765Weiran Liu, Jianwei Liu, Qianhong Wu, Willy Susilo, Hua Deng, Bo Qin. SAKE: scalable authenticated key exchange for mobile e-health networks
2766 -- 2778Weizhong Qiang, Changqing Jiang, Longbo Ran, Deqing Zou, Hai Jin. CDMCR: multi-level fault-tolerant system for distributed applications in cloud
2779 -- 2788Shuai Fu, Jianfeng Ma, Hongtao Li, Qi Jiang 0001. A robust and privacy-preserving aggregation scheme for secure smart grid communications in digital communities
2789 -- 2801Jun Song, ChunJiao He, Fan Yang, Huanguo Zhang. A privacy-preserving distance-based incentive scheme in opportunistic VANETs
2802 -- 2815Fajiang Yu, Huanguo Zhang, Bo Zhao, Juan Wang, Liqiang Zhang, Fei Yan, Zhenlin Chen. A formal analysis of Trusted Platform Module 2.0 hash-based message authentication code authorization under digital rights management scenario
2816 -- 2826Guang Yang, Jiqiang Liu, Lei Han. An ID-based node key management scheme based on PTPM in MANETs
2827 -- 2842Jinfu Chen, Jiamei Chen, Rubing Huang, Yuchi Guo, Yongzhao Zhan. An approach of security testing for third-party component based on state mutation
2843 -- 2860Gansen Zhao, Zhongjie Ba, Xinming Wang, Feng Zhang, Changqin Huang, Yong Tang. Constructing authentication web in cloud computing
2861 -- 2863Wojciech Mazurczyk, Krzysztof Szczypiorski, Zoran Duric, Dengpan Ye. Cyber Crime
2864 -- 2875Nicholas Ayres, Leandros A. Maglaras. Cyberterrorism targeting the general public through social media
2876 -- 2885Sebastian Neuner, Martin Schmiedecker, Edgar R. Weippl. Effectiveness of file-based deduplication in digital forensics
2886 -- 2900Jawwad A. Shamsi, Sherali Zeadally, Fareha Sheikh, Angelyn Flowers. Attribution in cyberspace: techniques and legal implications
2901 -- 2910Rafal Kozik, Michal Choras, Witold Holubowicz. Evolutionary-based packets classification for anomaly detection in web layer
2911 -- 2922Lukasz Saganowski, Tomasz Andrysiak, Rafal Kozik, Michal Choras. DWT-based anomaly detection method for cyber security of wireless sensor networks
2923 -- 2933Artur Janicki. Pitch-based steganography for Speex voice codec
2934 -- 2944Hui Tian, Yanpeng Wu, Chin-Chen Chang, Yongfeng Huang, Jin Liu, Tian Wang, Yonghong Chen, Yiqiao Cai. Steganalysis of analysis-by-synthesis speech exploiting pulse-position distribution characteristics
2945 -- 2956Hasan Abdulrahman, Marc Chaumont, Philippe Montesinos, Baptiste Magnier. Color images steganalysis using rgb channel geometric transformation measures
2957 -- 2971Yi Zhang, Xiangyang Luo, Chunfang Yang, Dengpan Ye, Fenlin Liu. A framework of adaptive steganography resisting JPEG compression and detection
2972 -- 2985Matthias Naumann, Steffen Wendzel, Wojciech Mazurczyk, Jörg Keller 0001. Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions
2986 -- 2997Jaspreet Kaur, Steffen Wendzel, Omar Eissa, Jernej Tonejc, Michael Meier 0001. Covert channel-internal control protocols: attacks and defense
2998 -- 3010Wojciech Fraczek, Krzysztof Szczypiorski. Perfect undetectability of network steganography
3011 -- 3029Félix Iglesias, Robert Annessi, Tanja Zseby. DAT detectors: uncovering TCP/IP covert channels by descriptive analytics
3030 -- 3044Artur Janicki, Federico Alegre, Nicholas W. D. Evans. An assessment of automatic speaker verification vulnerabilities to replay spoofing attacks

Volume 9, Issue 14

2245 -- 2260Fatemeh Faraji Daneshgar, Maghsoud Abbaspour. Extracting fuzzy attack patterns using an online fuzzy adaptive alert correlation framework
2261 -- 2275Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler. Outsourcing secure two-party computation as a black box
2276 -- 2290Chun-Ta Li. A secure chaotic maps-based privacy-protection scheme for multi-server environments
2291 -- 2301Hongyuan Wang, Liehuang Zhu, Chang Xu, Yijia Lilong. A universal method for realizing non-repudiable provable data possession in cloud storage
2302 -- 2312Peixin Chen, Jinshu Su, BaoKang Zhao, Xiaofeng Wang, Ilsun You. An escrow-free online/offline HIBS scheme for privacy protection of people-centric sensing
2313 -- 2322Qilong Han, Bo Shao, Lijie Li, Zhiqiang Ma, Haitao Zhang, Xiaojiang Du. Publishing histograms with outliers under data differential privacy
2323 -- 2337AdriĂ¡n SĂ¡nchez-Carmona, Sergi Robles, Carlos Borrego. Identity-based access control for pro-active message's DTN
2338 -- 2347Dinhtu Truong, Guang Cheng. Detecting domain-flux botnet based on DNS traffic features in managed network
2348 -- 2358Hee-Sun Won, Sang-Pil Kim, Sanghun Lee, Mi-Jung Choi, Yang-Sae Moon. Secure principal component analysis in multiple distributed nodes
2359 -- 2370Yuwen Qian, Ting Sun, Jun Li, Chang Fan, Hua-ju Song. Design and analysis of the covert channel implemented by behaviors of network users
2371 -- 2386Ming Li, Di Xiao, Hong Liu, Sen Bai. A recoverable chaos-based fragile watermarking with high PSNR preservation
2387 -- 2396Zhiwei Wang, Wenyang Liu. CP-ABE with outsourced decryption and directionally hidden policy
2397 -- 2411Yinghui Zhang, Jin Li 0002, Xiaofeng Chen 0001, Hui Li. Anonymous attribute-based proxy re-encryption for access control in cloud computing
2412 -- 2421Feng Wang, Chin-Chen Chang, Shih-Chang Chang. Robust off-line e-cash scheme with recoverability and anonymity revocation
2422 -- 2433Zhenhua Liu, Xiangsong Zhang, Yupu Hu, Tsuyoshi Takagi. Revocable and strongly unforgeable identity-based signature scheme in the standard model
2434 -- 2447Asif Iqbal Hajamydeen, Nur Izura Udzir. A refined filter for UHAD to improve anomaly detection
2448 -- 2475Anfeng Liu, Xiao Liu, Yuxin Liu. A comprehensive analysis for fair probability marking based traceback approach in WSNs
2476 -- 2483Chin-Chen Chang, Wei-yi Chen, Shih-Chang Chang. A highly efficient and secure electronic cash system based on secure sharing in cloud environment
2484 -- 2556Sunil Kumar, Kamlesh Dutta. Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges
2557 -- 2575Hassan Alizadeh, AndrĂ© ZĂºquete. Traffic classification for managing Applications' networking profiles

Volume 9, Issue 13

1877 -- 1889Aggeliki Sgora, Dimitrios D. Vergados, Periklis Chatzimisios. A survey on security and privacy issues in Wireless Mesh Networks
1890 -- 1904Xudong Ni, Junzhou Luo, Boying Zhang, Jin Teng, Xiaole Bai, Bo Liu 0004, Dong Xuan. A mobile phone-based physical-social location proof system for mobile social network service
1905 -- 1915Weiwei Jia, Haojin Zhu, Suguo Du, Xiaolei Dong, Zhenfu Cao. Cloud-based privacy-preserving aggregation architecture in multi-domain wireless networks
1916 -- 1927Xiong Li, Jianwei Niu, Muhammad Khurram Khan, Junguo Liao, Xiaoke Zhao. Robust three-factor remote user authentication scheme with key agreement for multimedia systems
1928 -- 1943Charles Z. Liew, Raymond Shaw, Lanlan Li. Protect biometric data with compound chaotic encryption
1944 -- 1957Letian Sha, Liwen He, Jianming Fu, Jing Sun, Pengwei Li. SDN-based Sensitive Information (SI) protection: sensitivity-degree measurement in software and data lifetime supervisor in software defined network
1958 -- 1970Kostas Giotis, Georgios Androulidakis, Vasilis Maglaris. A scalable anomaly detection and mitigation architecture for legacy networks via an OpenFlow middlebox
1971 -- 1982Jiseong Noh, Seunghyeon Lee, Jaehyun Park, Seungwon Shin, Brent ByungHoon Kang. Vulnerabilities of network OS and mitigation with state-based permission system
1983 -- 2001Mohammad Wazid, Ashok Kumar Das, Saru Kumari, Xiong Li, Fan Wu. Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS
2002 -- 2014Anmin Fu, Jianye Song, Shuai Li, Gongxuan Zhang, Yuqing Zhang. A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks
2015 -- 2023Guodong Ye, Xiaoling Huang. A secure image encryption algorithm based on chaotic maps and SHA-3
2024 -- 2031Mohamed Elhoseny, Xiaohui Yuan, Hamdy K. El-Minir, Alaa Mohamed Riad. An energy efficient encryption method for secure dynamic WSN
2032 -- 2041Nazrul Hoque, Dhruba K. Bhattacharyya, Jugal K. Kalita. FFSc: a novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysis
2042 -- 2050Tarek Moulahi, Sami Touil, Salem Nasri, Hervé Guyennet. Reliable relay-based broadcasting through formal concept analysis for WSNs
2051 -- 2058Hwajeong Seo, Zhe Liu 0001, Yasuyuki Nogami, Jongseok Choi, Howon Kim. Binary field multiplication on ARMv8
2059 -- 2069Cheng-Chi Lee, Chun-Ta Li, Shih-Ting Chiu, Shun-der Chen. Time-bound key-aggregate encryption for cloud storage
2070 -- 2092Ashok Kumar Das, Anil Kumar Sutrala, Saru Kumari, Vanga Odelu, Mohammad Wazid, Xiong Li. An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks
2093 -- 2099Weijia Xue, Tingting Lin, Xin Shun, Fenglei Xue, Xuejia Lai. On the estimation of the second largest eigenvalue of Markov ciphers
2100 -- 2114Daibin Wang, Hai Jin, Deqing Zou, Peng Xu, Tianqing Zhu, Gang Chen. Taming transitive permission attack via bytecode rewriting on Android application
2115 -- 2121Yanxiao Liu. n) secret sharing scheme with cheating detection
2122 -- 2134M. Prem Laxman Das, Jothi Rangasamy, R. Kabaleeshwaran. Refined Shacham-Waters ring signature scheme in Seo-Cheon framework
2135 -- 2142Rongrong Xi, Xiao-chun Yun, Zhiyu Hao, Yongzheng Zhang 0002. Quantitative threat situation assessment based on alert verification
2143 -- 2156Hong Zhu, Zhuolin Mei, Meiyi Xie. Identity-based key management for cloud computing
2157 -- 2172Yukun He, Guangyan Zhang, Jie Wu, Qiang Li. Understanding a prospective approach to designing malicious social bots
2173 -- 2185Abdulghani Ali Ahmed, Ali Safa Sadiq, Mohamad Fadli Zolkipli. Traceback model for identifying sources of distributed attacks in real time
2186 -- 2199Senthil Madasamy Nallakannu, Thiagarajan Revathi. PSO-based optimal peer selection approach for highly secure and trusted P2P system
2200 -- 2216Bassam Jamil Mohd, Thaier Hayajneh, Zaid Abu Khalaf, Khalil Mustafa Ahmad Yousef. Modeling and optimization of the lightweight HIGHT block cipher design with FPGA implementation
2217 -- 2221Han Shen, Jianhua Chen, Jian Shen, Debiao He. Cryptanalysis of a certificateless aggregate signature scheme with efficient verification
2222 -- 2239Abhinav Bhandari, Amrit Lal Sangal, Krishan Kumar Saluja. Characterizing flash events and distributed denial-of-service attacks: an empirical investigation

Volume 9, Issue 12

1635 -- 1637Shaoquan Jiang, Tsuyoshi Takagi, Guilin Wang. Special issue on provable security
1638 -- 1649Mingwu Zhang, Bo Yang 0003. Continual key leakage tolerant encryption from extensible set delegation
1650 -- 1662Sree Vivek Sivanandam, S. Sharmila Deva Selvi, Akshayaram Srinivasan, Chandrasekaran Pandu Rangan. Stronger public key encryption system withstanding RAM scraper like attacks
1663 -- 1675Yutaka Kawai, Goichiro Hanaoka, Kazuo Ohta, Noboru Kunihiro. A limitation on security evaluation of cryptographic primitives with fixed keys
1676 -- 1697Yoshikazu Hanatani, Goichiro Hanaoka, Takahiro Matsuda 0002, Takashi Yamakawa. Efficient key encapsulation mechanisms with tight security reductions to standard assumptions in the two security models
1698 -- 1716Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao. Generalized (identity-based) hash proof system and its applications
1717 -- 1725Takanori Suga, Takashi Nishide, Kouichi Sakurai. Character-based symmetric searchable encryption and its implementation and experiment on mobile devices
1726 -- 1736Yoshinao Uchide, Noboru Kunihiro. Searchable symmetric encryption capable of searching for an arbitrary string
1737 -- 1747Mingwu Zhang, Yi Mu, Jian Shen, Xinyi Huang. Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity
1748 -- 1758Suqing Lin, Rui Zhang 0002, Mingsheng Wang. Verifiable attribute-based proxy re-encryption for secure public cloud data sharing
1759 -- 1768Mohsen Alimomeni, Reihaneh Safavi-Naini. Two-level security for message sequences
1769 -- 1785David Nuñez, Isaac Agudo, Javier Lopez. On the application of generic CCA-secure transformations to proxy re-encryption
1786 -- 1795Satsuya Ohata, Kanta Matsuura. Proxy re-encryption via indistinguishability obfuscation
1796 -- 1809Dennis Y. W. Liu, Duncan S. Wong. One-move convertible nominative signature in the standard model
1810 -- 1819Shengke Zeng, Qinyi Li, Zhiguang Qin, Qing Lu. Non-interactive deniable ring signature without random oracles
1820 -- 1828Haibo Tian, Fangguo Zhang, Baodian Wei. A lattice-based partially blind signature
1829 -- 1842Yuyu Wang, Keisuke Tanaka. Generic transformations for existentially unforgeable signature schemes in the bounded leakage model
1843 -- 1863Yanfei Guo, Zhenfeng Zhang. Authenticated key exchange with entities from different settings and varied groups
1864 -- 1871Teng Wu, Guang Gong. Two new message authentication codes based on APN functions and stream ciphers

Volume 9, Issue 11

1271 -- 1284Yacine Rebahi, Mateusz Khalil, Simon Hohberg, Pascal Lorenz. An Android based new German eID solution for policy making processes
1285 -- 1296Unal Cavusoglu, Akif Akgul, Sezgin Kaçar, Ihsan Pehlivan, Ahmet Zengin. A novel chaos-based encryption algorithm over TCP data packet for secure communication
1297 -- 1308Eunsoo Seo, Gulustan Dogan, Tarek F. Abdelzaher, Theodore Brown. Root cause diagnosis in error-propagating networks
1309 -- 1320Hui Zhu, Xiaoxia Liu, Rongxing Lu, Hui Li. EPCS: an efficient and privacy-preserving classification service query framework for SVM
1321 -- 1330Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang. Cryptanalysis and improvement of a chaotic maps-based anonymous authenticated key agreement protocol for multiserver architecture
1331 -- 1339Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang. Robust anonymous two-factor authenticated key exchange scheme for mobile client-server environment
1340 -- 1352MingChu Li, Xiaodong Xu, Cheng Guo, Xing Tan. AD-ASGKA - authenticated dynamic protocols for asymmetric group key agreement
1353 -- 1358Liangliang Wang, Kefei Chen, Yu Long, Huige Wang. Cryptanalysis of a certificateless aggregate signature scheme
1359 -- 1373Ziwen Sun, Yao Wang, Gang Qu, Zhiping Zhou. A 3-D hand gesture signature based biometric authentication system for smartphones
1374 -- 1383Kamal Adli Mehr, Javad Musevi Niya. Security bootstrapping of mobile ad hoc networks using identity-based cryptography
1384 -- 1397Zuowen Tan. A privacy-preserving multi-server authenticated key-agreement scheme based on Chebyshev chaotic maps
1398 -- 1404Nan Run Zhou, Xiao Rong Liang, Zhihong Zhou, Ahmed Farouk. Relay selection scheme for amplify-and-forward cooperative communication system with artificial noise
1405 -- 1416Hai-Cheng Chu, Han-Chieh Chao. Testifying the digital artifacts for line application program under Mac OS X from the aspects of witness experts
1417 -- 1434Shifeng Sun, Dawu Gu, Shengli Liu. Efficient chosen ciphertext secure identity-based encryption against key leakage attacks
1435 -- 1449Junfeng Yu, Qingfeng Huang, Chee Hoo Yian. DroidScreening: a practical framework for real-world Android malware analysis
1450 -- 1461Ahmad M. Manasrah, Basim Najim Al-Din. Mapping private keys into one public key using binary matrices and masonic cipher: Caesar cipher as a case study
1462 -- 1476Dongwoo Kang, Jaewook Jung, Jongho Mun, Donghoon Lee, Younsung Choi, Dongho Won. Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain
1477 -- 1495Shashank Gupta, B. B. Gupta. JS-SAN: defense mechanism for HTML5-based web applications against javascript code injection vulnerabilities
1496 -- 1508Minhui Xue, Yong Liu, Keith W. Ross, Haifeng Qian. Thwarting location privacy protection in location-based social discovery services
1509 -- 1519Jiangtao Zhai, Mingqian Wang, Guangjie Liu, Yuewei Dai. JitterBug covert timing channel with sparse embedding
1520 -- 1534Yao Wang, Wan-Dong Cai, Pengcheng Wei. A deep learning approach for detecting malicious JavaScript code
1535 -- 1546Ismail San, Nuray At, Ibrahim Yakut, Huseyin Polat. Efficient paillier cryptoprocessor for privacy-preserving data mining
1547 -- 1552Hui Zhang. Insecurity of a certificateless aggregate signature scheme
1553 -- 1576Sohail Khan, Mohammad Nauman, Abu Talib Othman, Shahrulniza Musa, Toqeer Ali Syed. TSSDroid: realization of an efficient and usable TSS API for the Android software stack
1577 -- 1588Hsiao-Ling Wu, Chin-Chen Chang, Chin-Yu Sun. A secure authentication scheme with provable correctness for pay-TV systems
1589 -- 1612Sumit Kumar Debnath, Ratna Dutta. Towards fair mutual private set intersection with linear complexity
1613 -- 1629Chengyu Hu, Rupeng Yang, Pengtao Liu, Zuoxia Yu, Yongbin Zhou, Qiuliang Xu. Public-key encryption with keyword search secure against continual memory attacks

Volume 9, Issue 10

943 -- 957Ruo Jun Cai, Xue Jun Li, Peter Han Joo Chong. A novel self-checking ad hoc routing scheme against active black hole attacks
958 -- 965Ilija Basicevic, Stanislav Ocovaj, Miroslav Popovic. The value of flow size distribution in entropy-based detection of DoS attacks
966 -- 976Liaojun Pang, Deyu Miao, Chunfeng Lian. User-friendly random-grid-based visual secret sharing for general access structures
977 -- 995Eric McCary, Yang Xiao. Home area network accountability with varying consumption devices in smart grid
996 -- 1006Kunpeng Bai, Chuankun Wu. A secure white-box SM4 implementation
1007 -- 1015Hong Zhong, Jie Cui, Runhua Shi, Chao Xia. Many-to-one homomorphic encryption scheme
1016 -- 1024Jiguo Li, Yuyan Guo, Qihong Yu, Yang Lu, Yichen Zhang. Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage
1025 -- 1039Bhawana Rudra, Om Prakash Vyas. Investigation of security issues for service-oriented network architecture
1040 -- 1049Wenli Shang, Peng Zeng, Ming Wan, Lin Li, Panfeng An. Intrusion detection algorithm based on OCSVM in industrial control system
1050 -- 1071Tonko Kovacevic, Toni Perkovic, Mario Cagalj. Flashing displays: user-friendly solution for bootstrapping secure associations between multiple constrained wireless devices
1072 -- 1084Zohreh Saffarian Eidgahi, Vahid Rafe. Security analysis of network protocols through model checking: a case study on mobile IPv6
1085 -- 1102Vankamamidi Srinivasa Naresh, Nistala V. E. S. Murthy. Provably secure group key agreement protocol based on ECDH with integrated signature
1103 -- 1118Tala Tafazzoli, Babak Sadeghiyan. A stochastic model for the size of worm origin
1119 -- 1131Boris Damjanovic, Dejan Simic. Tweakable parallel OFB mode of operation with delayed thread synchronization
1132 -- 1145Qussai Yaseen, Qutaibah Althebyan, Brajendra Panda, Yaser Jararweh. Mitigating insider threat in cloud relational databases
1146 -- 1157Shuo Chen, Maode Ma, Zhenxing Luo. An authentication scheme with identity-based cryptography for M2M security in cyber-physical systems
1158 -- 1172Shaghayegh Bakhtiari Chehelcheshmeh, Mehdi Hosseinzadeh. Quantum-resistance authentication in centralized cognitive radio networks
1173 -- 1185Yibin Dai, Shaozhen Chen. Security analysis of Khudra: a lightweight block cipher for FPGAs
1186 -- 1197Tzonelih Hwang, Prosanta Gope. PFX: an essence of authencryption for block-cipher security
1198 -- 1215Madhusanka Liyanage, Pardeep Kumar, Mika Ylianttila, Andrei V. Gurtov. Novel secure VPN architectures for LTE backhaul networks
1216 -- 1225Yilmaz Kaya, Ă–mer Faruk Ertugrul. A novel approach for spam email detection based on shifted binary patterns
1226 -- 1246Charalampos Manifavas, George Hatzivasilis, Konstantinos Fysarakis, Yannis Papaefstathiou. A survey of lightweight stream ciphers for embedded systems
1247 -- 1265Yefeng Ruan, Sivapriya Kalyanasundaram, Xukai Zou. Survey of return-oriented programming defense mechanisms

Volume 9, Issue 1

5 -- 18Yongming Xie, Yan Zhang. A secure, service priority-based incentive scheme for delay tolerant networks
19 -- 26Mohsen Toorani. Cryptanalysis of a robust key agreement based on public key authentication
27 -- 33Mohammad Hossein Faghihi Sereshgi, Mohammad Dakhilalian, Mohsen Shakiba. Biclique cryptanalysis of MIBS-80 and PRESENT-80 block ciphers
34 -- 42Changhui Hu, Lidong Han, Siu-Ming Yiu. Efficient and secure multi-functional searchable symmetric encryption schemes
43 -- 53Yushu Zhang, Di Xiao, Kwok-Wo Wong, Jiantao Zhou, Sen Bai, Moting Su. Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization
54 -- 59Jianhong Zhang, Xubing Zhao, Jian Mao. et al.'s certificateless aggregate signature scheme
60 -- 71Xuping Zhang, Feng Ye, Sucheng Fan, Jinghong Guo, Guoliang Xu, Yi Qian. An adaptive security protocol for a wireless sensor-based monitoring network in smart grid transmission lines