169 | -- | 0 | . Introduction to the special issue on secure communications |
171 | -- | 186 | Jaafar Almasizadeh, Mohammad Abdollahi Azgomi. A probabilistic model for anonymity analysis of anonymous communication networks |
187 | -- | 205 | Wei Feng, Yu Qin, Dengguo Feng. Using mobile phones to enhance computing platform trust |
207 | -- | 216 | Natarajan Venkatachalam, R. Anitha 0002. Steganalysis of BCH code based stego schemes |
217 | -- | 222 | Zhiwei Wang, Aidong Xia, Mingjun He. ID-based proxy re-signature without pairing |
223 | -- | 235 | Peyman Taher, Alireza T. Boloorchi, M. H. Samadzadeh. Age-based anonymity: a randomized routing approach to communication unobservability |
237 | -- | 251 | Jahangir H. Sarker, Ahmed M. Nahhas. A secure wireless mission critical networking system for unmanned aerial vehicle communications |
253 | -- | 262 | Quanyun Wei, Fang Qi, Zhe Tang. Remove key escrow from the BF and Gentry identity-based encryption with non-interactive key generation |