Journal: ICST Trans. Security Safety

Volume 2, Issue 6

0 -- 0Xiqing Zhang, Yuan Feng, Feng Hong, Zhongwen Guo. Redundancy Elimination in DTN via ACK Mechanism
0 -- 0Chung-Yen Su, Jeng-Ji Huang, Che-Yang Shih, Yu-Tang Chen. Reversible and Embedded Watermarking of Medical Images for Telemedicine
0 -- 0Fangwei Li, Wang Yan, Jiang Zhu, Zhang Xinyue. A Hierarchical of Security Situation Element Acquisition Mechanism in Wireless Sensor Network
0 -- 0Qingzhong Liu, Andrew H. Sung, Lei Chen, Ming Yang, Zhongxue Chen, Yanxin Liu, Jing Zhang. A Method to Detect AAC Audio Forgery
0 -- 0Christian T. Zenger, Jan Zimmer, Christof Paar. Security Analysis of Quantization Schemes for Channel-based Key Extraction

Volume 2, Issue 5

0 -- 0Fangwei Li, Xinyu Zhang, Jiang Zhu, Wang Yan. A improved Network Security Situation Awareness Model
0 -- 0Jing Zhang, Meili Zhi, Yuting Su, Qingzhong Liu. Mobile Watermarking against Geometrical Distortions
0 -- 0Zhaoyuan Wang, Huanlai Xing, Tianrui Li, Yan Yang, Rong Qu. An Improved MOEA/D for QoS Oriented Multimedia Multicasting with Network Coding
0 -- 0Marshall Brinn, Nicholas Bastin, Andy C. Bavier, Mark Berman, Jeffrey S. Chase, Robert Ricci. Trust as the Foundation of Resource Exchange in GENI
0 -- 0Fangwei Li, Qing Huang, Jiang Zhu, Zhuxun Peng. Network Security Risk Assessment Based on Item Response Theory

Volume 2, Issue 4

0 -- 0Minghui Zhu, Peng Liu. Reviewing the book "Principles of Cyber-physical Systems" from a security perspective
0 -- 0Yazhe Wang, Mingming Hu, Chen Li. UAuth: A Strong Authentication Method from Personal Devices to Multi-accounts
0 -- 0Christopher Kugler, Tilo Müller. Separated Control and Data Stacks to Mitigate Buffer Overflow Exploits
0 -- 0Kai Chen, Jun Shao. Preface to special issue on miscellaneous emerging security problems
0 -- 0Fahad Alarfi, Maribel Fernández. Towards Privacy-Preserving Web Metering Via User-Centric Hardware
0 -- 0Pieter Burghouwt, Marcel E. M. Spruit, Henk J. Sips. Detection of Botnet Command and Control Traffic by the Multistage Trust Evaluation of Destination Identifiers