Abstract is missing.
- A Lightweight RFID Authentication Protocol with Forward Security and Randomized IdentifierZhicai Shi, Fei Wu, Changzhi Wang, Shitao Ren. 1-13 [doi]
- A Security Proxy Scheme Based on Attribute Node Mapping for Cloud StorageHuakang Li, Zhenyu Wang, Yitao Yang, Guozi Sun. 14-25 [doi]
- Privacy Preserving Scheme for Location and Content Protection in Location-Based ServicesTao Peng, Qin Liu, Guojun Wang, Yang Xiang. 26-38 [doi]
- An Improved Asymmetric Searchable Encryption SchemeQi Wu. 39-44 [doi]
- Recommendation Systems in Real Applications: Algorithm and Parallel ArchitectureMengxian Li, Wenjun Jiang, Kenli Li. 45-58 [doi]
- Big Data Security Analytic for Smart Grid with Fog NodesWenlin Han, Yang Xiao. 59-69 [doi]
- A Reduction Method of Analyzing Data-Liveness and Data-Boundedness for a Class of E-commerce Business Process NetsWangyang Yu, GuanJun Liu, Leifeng He. 70-83 [doi]
- Computation of Secure Consistency for Real SystemsMimi Wang, GuanJun Liu, Changjun Jiang, ChunGang Yan. 84-97 [doi]
- Study on Personalized Location Privacy Protection Algorithms for Continuous Queries in LBSJiayi Gan, Hongyun Xu, Mengzhen Xu, Kai Tian, Yaohui Zheng, Yong Zhang. 98-108 [doi]
- A Novel Signature Generation Approach in Noisy Environments for Detecting Polymorphic WormJie Wang, Jie Wu. 109-121 [doi]
- A User Authentication Scheme Based on Trusted Platform for Cloud ComputingJiaqing Mo, Zhongwang Hu, Yuhua Lin. 122-130 [doi]
- ROP-Hunt: Detecting Return-Oriented Programming Attacks in ApplicationsLu Si, Jie Yu, Lei Luo, Jun Ma, Qingbo Wu, Shasha Li. 131-144 [doi]
- On the Security of a Threshold Anonymous Authentication Protocol for VANETsJianhong Zhang, Zhibin Sun, Shuai Liu, Pengyan Liu. 145-155 [doi]
- The Encryption Scheme with Data Compression Based on QC-LDPCYiliang Han. 156-163 [doi]
- Location Privacy Preserving Scheme Based on Attribute EncryptionXi Lin, Yiliang Han, Yan Ke, Xiaoyuan Yang 0002. 164-177 [doi]
- Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile HealthcareDacheng Meng, Wenbo Wang, Entao Luo, Guojun Wang. 178-189 [doi]
- A Privacy Preserving Friend Discovery Strategy Using Proxy Re-encryption in Mobile Social NetworksEntao Luo, Wenbo Wang, Dacheng Meng, Guojun Wang. 190-203 [doi]
- Defect Analysis and Risk Assessment of Mainstream File Access Control PoliciesLi Luo, Hongjun He, Jiao Zhu. 204-212 [doi]
- A Comprehensive Survey of Privacy-Preserving in Smart GridGuanlin Si, Zhitao Guan, Jing Li, Peng Liu, Hong Yao. 213-223 [doi]
- Ghost Train for Anonymous CommunicationPrzemyslaw Blaskiewicz, Miroslaw Kutylowski, Jakub Lemiesz, Malgorzata Sulkowska. 224-239 [doi]
- Efficient Detection Method for Data Integrity Attacks in Smart GridPeixiu An, Zhitao Guan. 240-250 [doi]
- Fully Secure Unbounded Revocable Key-Policy Attribute-Based Encryption SchemeChangji Wang, Jian Fang, Jianguo Xie. 251-264 [doi]
- A Privacy-Preserving Hybrid Cooperative Searching Scheme over Outsourced Cloud DataQiang Zhang, Qin Liu, Guojun Wang. 265-278 [doi]
- Modeling and Propagation Analysis on Social Influence Using Social Big DataSancheng Peng, Shengyi Jiang, Pengfei Yin. 279-291 [doi]
- FASRP: A Fully Anonymous Security Routing Protocol in MANETsJun Pan, Lin Ma, Kai Yu. 292-304 [doi]
- Privacy Protection in Mobile Recommender Systems: A SurveyKun Xu, Zheng Yan. 305-318 [doi]
- Security in Software-Defined-Networking: A SurveyZhen Yao, Zheng Yan. 319-332 [doi]
- Building Root of Trust for Report with Virtual AIK and Virtual PCR Usage for CloudQiang Huang, Dehua Zhang, Le Chang, Jinhua Zhao. 333-342 [doi]
- On the Impact of Location Errors on Localization Attacks in Location-Based Social Network ServicesHanni Cheng, Shiling Mao, Minhui Xue, Xiaojun Hei. 343-357 [doi]
- Service-Oriented Workflow Executability from a Security PerspectiveSardar Hussain, Richard O. Sinnott, Ron Poet. 358-373 [doi]
- Distributed Multi-authority Attribute-Based Encryption for Secure Friend Discovery and Data Sharing in Mobile Social NetworksFang Qi, Wenbo Wang, Zhe Tang. 374-382 [doi]
- Modeling Attack Process of Advanced Persistent ThreatWei-na Niu, Xiaosong Zhang, Kenli Li, Guowu Yang, Ruidong Chen. 383-391 [doi]
- A New Image Encryption Scheme Using a Hyperchaotic SystemChong Fu, Ming Tie, Jian-Lin Wang, Shao-ting Chen, Hui-yan Jiang. 392-405 [doi]
- Architectural Patterns for Security-Oriented Workflows in Collaborative EnvironmentsSardar Hussain, Richard O. Sinnott, Ron Poet. 406-421 [doi]
- Modeling and Vulnerable Points Analysis for E-commerce Transaction System with a Known AttackMimi Wang, GuanJun Liu, ChunGang Yan, Changjun Jiang. 422-436 [doi]
- Authentication and Transaction Verification Using QR Codes with a Mobile DeviceYang-Wai Chow, Willy Susilo, Guomin Yang, Man Ho Au, Cong Wang. 437-451 [doi]
- Secure and Efficient Mobile Payment Using QR Code in an Environment with Dishonest AuthorityXiaoling Zhu, Zhengfeng Hou, Donghui Hu, Jing Zhang. 452-465 [doi]
- User Preference-Based Spamming Detection with Coupled Behavioral AnalysisFrank Jiang, Mingdong Tang, Quang-Anh Tran. 466-477 [doi]
- Analysis of SIFT Method Based on Swarm Intelligent Algorithms for Copy-Move Forgery DetectionFei Zhao, Wenchang Shi, Bo Qin, Bin Liang. 478-490 [doi]
- Encryption Scheme Based on Hyperelliptic Curve CryptographyAsha Liza John, Sabu M. Thampi. 491-506 [doi]