Abstract is missing.
- A Crawler Guard for Quickly Blocking Unauthorized Web RobotJan-Min Chen. 1-13 [doi]
- Privacy Preserving for Location-Based Services Using Location TransformationTao Peng, Qin Liu, Guojun Wang. 14-28 [doi]
- Design of Lightweight Web Page Tamper-Resistant Mechanism for LinuxAng Mi, Weiping Wang 0003, Shigeng Zhang, Hong Song. 29-39 [doi]
- Multiple-Bank E-Cash without Random OraclesJiangxiao Zhang, Zhoujun Li, Hua Guo. 40-51 [doi]
- A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation StrategyChong Fu, Tao Wang, Zhao-yu Meng, Jun-xin Chen, Hong-feng Ma. 52-66 [doi]
- Preserving User Privacy in the Smart Grid by Hiding Appliance Load CharacteristicsBaosheng Ge, Wen Tao Zhu. 67-80 [doi]
- Cancelable Fingerprint Templates with Delaunay Triangle-Based Local StructuresWenCheng Yang, Jiankun Hu, Song Wang, Jucheng Yang. 81-91 [doi]
- Towards a Security-Enhanced Firewall Application for OpenFlow NetworksJuan Wang, Yong Wang, Hongxin Hu, Qingxin Sun, He Shi, Longjie Zeng. 92-103 [doi]
- Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-Stage Clustering MethodLin-Bo Qiao, Bo-Feng Zhang, Rui-Yuan Zhao, Jin-Shu Su. 104-116 [doi]
- Detection of Covert Botnet Command and Control Channels by Causal Analysis of Traffic FlowsPieter Burghouwt, Marcel E. M. Spruit, Henk J. Sips. 117-131 [doi]
- Situation Calculus and Graph Based Defensive Modeling of Simultaneous AttacksLayal Samarji, Frédéric Cuppens, Nora Cuppens-Boulahia, Wael Kanoun, Samuel Dubus. 132-150 [doi]
- Geolocation and Verification of IP-Addresses with Specific Focus on IPv6Robert Koch, Mario Golling, Gabi Dreo Rodosek. 151-170 [doi]
- Fast Scalar Multiplication on Elliptic Curve Cryptography in Selected Intervals Suitable for Wireless Sensor NetworksYoussou Faye, Hervé Guyennet, Ibrahima Niang, Yanbo Shou. 171-182 [doi]
- Alert Correlation Algorithms: A Survey and TaxonomySeyed Ali Mirheidari, Sajjad Arshad, Rasool Jalili. 183-197 [doi]
- Construction and Verification of Mobile Ad Hoc Network ProtocolsNatsuki Kimura, Noriaki Yoshiura. 198-212 [doi]
- Zero-Day Traffic IdentificationJun Zhang, Xiao Chen, Yang Xiang, Wanlei Zhou. 213-227 [doi]
- Design and Implementation of a Testbed for the Security Assessment of MANETsChristian Callegari, Stefano Giordano, Susanna Mannella, Michele Pagano. 228-242 [doi]
- A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive ImmunologyQiang Liu, Jianping Yin, Shui Yu. 243-257 [doi]
- Anonymous Identity-Based Broadcast Encryption with Adaptive SecurityLeyou Zhang, Qing Wu, Yi Mu. 258-271 [doi]
- Hierarchical Identity-Based Signature with Short Public KeysQing Wu, Leyou Zhang. 272-281 [doi]
- PeerViewer: Behavioral Tracking and Classification of P2P MalwareNizar Kheir, Xiao Han. 282-298 [doi]
- Selecting Features for Anomaly Intrusion Detection: A Novel Method using Fuzzy C Means and Decision Tree ClassificationJingping Song, Zhiliang Zhu, Peter Scully, Chris Price. 299-307 [doi]
- Detecting Stepping Stones by Abnormal Causality ProbabilitySheng Wen, Ping Li, Di Wu, Yang Xiang, Wanlei Zhou. 308-322 [doi]
- Algebra-Based Behavior Identification of Trojan HorseAihua Peng, Lansheng Han, Yanan Yu, Nan Du, Mingquan Li. 323-337 [doi]
- Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart CardsCheng-Chi Lee, Chun-Ta Li, Chi-Yao Weng, Jian-Jhong Jheng, Xiao-Qian Zhang, Yi-Rui Zhu. 338-348 [doi]
- The Hot-Spots Problem in Windows 8 Graphical Password SchemeHaichang Gao, Wei Jia, Ning Liu, Kaisheng Li. 349-362 [doi]
- Static Detection of Dangerous Behaviors in Android AppsShaoyin Cheng, Shengmei Luo, Zifeng Li, Wei Wang, Yan Wu, Fan Jiang. 363-376 [doi]
- A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search FunctionChangji Wang, Wentao Li, Yuan Li, Xi-Lei Xu. 377-386 [doi]
- A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud ComputingShuhong Chen, Guojun Wang, Weijia Jia. 387-402 [doi]
- NetSecRadar: A Visualization System for Network Security Situational AwarenessFangfang Zhou, Ronghua Shi, Ying Zhao, Yezi Huang, Xing Liang. 403-416 [doi]
- Quantum Secret Sharing Based on Chinese Remainder Theorem in Hyperchaotic SystemRonghua Shi, Ye Kang, Zhaoyuan Zhang. 417-428 [doi]
- Restraining and Characterization of Virus Propagation in Large-Scale Wireless LANCai Fu, Deliang Xu, Lansheng Han, Jingfang Xu, Zhicun Fang. 429-440 [doi]
- An Improved Differential Fault Analysis Attack to AES Using Reduced Searching SpaceZemin Cai, Yi Wang, Renfa Li. 441-449 [doi]
- An Out-of-the-Box Dynamic Binary Analysis Tool for ARM-Based LinuxZhenyu Wang, Yanqiu Ye, Ruimin Wang. 450-457 [doi]
- Towards an Open Framework Leveraging a Trusted Execution EnvironmentJavier González, Philippe Bonnet. 458-467 [doi]
- Secure Re-publication of Dynamic Big DataKok Seng Wong, Myung Ho Kim. 468-477 [doi]