Journal: Telecommunication Systems

Volume 69, Issue 2

169 -- 0. Introduction to the special issue on secure communications
171 -- 186Jaafar Almasizadeh, Mohammad Abdollahi Azgomi. A probabilistic model for anonymity analysis of anonymous communication networks
187 -- 205Wei Feng, Yu Qin, Dengguo Feng. Using mobile phones to enhance computing platform trust
207 -- 216Natarajan Venkatachalam, R. Anitha 0002. Steganalysis of BCH code based stego schemes
217 -- 222Zhiwei Wang, Aidong Xia, Mingjun He. ID-based proxy re-signature without pairing
223 -- 235Peyman Taher, Alireza T. Boloorchi, M. H. Samadzadeh. Age-based anonymity: a randomized routing approach to communication unobservability
237 -- 251Jahangir H. Sarker, Ahmed M. Nahhas. A secure wireless mission critical networking system for unmanned aerial vehicle communications
253 -- 262Quanyun Wei, Fang Qi, Zhe Tang. Remove key escrow from the BF and Gentry identity-based encryption with non-interactive key generation