default search action
Security and Communication Networks, Volume 5
Volume 5, Number 1, January 2012
- Xiaodong Lin, Jianwei Liu, Stefanos Gritzalis:
Security and privacy in emerging information technologies. 1-2 - Dimitrios Damopoulos, Sofia-Anna Menesidou, Georgios Kambourakis, Maria Papadaki, Nathan L. Clarke, Stefanos Gritzalis:
Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers. 3-14 - Dingbang Xu, Yu Wang, Xinghua Shi, Xiaohang Yin:
User identification and anonymization in 802.11 wireless LANs. 15-27 - Yang Xiao, Ke Meng, Daisuke Takahashi:
Accountability using flow-net: design, implementation, and performance evaluation. 29-49 - Zhongtian Jia, Shudong Li, Haipeng Peng, Yixian Yang, Shize Guo:
Modelling security message propagation in delay tolerant networks. 51-58 - Jianwei Liu, Ruiying Du, Jing Chen, Kun He:
A key distribution scheme using network coding for mobile ad hoc network. 59-67 - Xiaoping Xue, Jia Ding:
LPA: a new location-based privacy-preserving authentication protocol in VANET. 69-78 - Yipin Sun, Zhenqian Feng, Qiaolin Hu, Jinshu Su:
An efficient distributed key management scheme for group-signature based anonymous authentication in VANET. 79-86
- Gina Kounga, Chris J. Mitchell, Thomas Walter:
Generating certification authority authenticated public keys in ad hoc networks. 87-106 - Daojing He, Chun Chen, Maode Ma, Jiajun Bu:
Cryptanalysis of some conference schemes for mobile communications. 107-112 - Wassim El-Hajj:
The most recent SSL security attacks: origins, implementation, evaluation, and suggested countermeasures. 113-124
Volume 5, Number 2, February 2012
- Hani Alzaid, Ernest Foo, Juan Manuel González Nieto, Ejaz Ahmed:
Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks. 125-144 - Ehsan Malekian, Ali Zakerolhosseini:
A non-associative lattice-based public key cryptosystem. 145-163 - Ming-Hour Yang, Hung Yuan Hu:
Protocol for ownership transfer across authorities: with the ability to assign transfer target. 164-177 - Gulshan Kumar, Krishan Kumar:
An information theoretic approach for feature selection. 178-185 - Issa Khalil, Mamoun A. Awad, Salah Bouktif, Falah R. Awwad:
MSN: mutual secure neighbor verification in multi-hop wireless networks. 186-196 - Qi Liao, Zhen Li, Aaron Striegel:
Could firewall rules be public - a game theoretical perspective. 197-210 - Yakun Hu, Dapeng Wu, Antonio Nucci:
Pitch-based gender identification with two-stage classification. 211-225 - Cong Jin, Xiaoyan Wang:
Analysis and control stratagems of flash disk virus dynamic propagation model. 226-235 - Shuhua Wu, Yuefei Zhu, Qiong Pu:
Robust smart-cards-based user authentication scheme with user anonymity. 236-248
Volume 5, Number 3, March 2012
- Jong Hyuk Park, Shiuh-Jeng Wang, Damien Sauveron:
Security technologies and applications for convergence environments. 249-251 - Junbeom Hur, Chanil Park, Seongoun Hwang:
Fine-grained user access control in ciphertext-policy attribute-based encryption. 253-261 - Kok-Seng Wong, Myung Ho Kim:
Privacy-preserving frequent itemsets mining via secure collaborative framework. 263-272 - Jianjie Zhao, Dawu Gu, Lei Zhang:
Security analysis and enhancement for three-party password-based authenticated key exchange protocol. 273-278 - Raylin Tso:
Convertible ring signatures with gradual revelation of non-signers. 279-286 - Imran Erguler, Cihan Unsal, Emin Anarim, Gökay Saldamli:
Security analysis of an ultra-lightweight RFID authentication protocol - SLMAP. 287-291 - Young-Gab Kim, Sung Deok Cha:
Threat scenario-based security risk analysis using use case modeling in information systems. 293-300 - Mi-Young Kim, Randy Goebel:
Adaptive-capacity and robust natural language watermarking for agglutinative languages. 301-310 - Wei Wang, Guosun Zeng, Junqi Zhang, Daizhong Tang:
Dynamic trust evaluation and scheduling framework for cloud computing. 311-318 - Ming-Huang Guo, Horng-Twu Liaw, Jyun-Fu Chen, Der-Jiunn Deng:
Secure authentication mechanism for RFID tag in WLAN convergence 3G networks. 319-330 - Chun-Hui Huang, Jue-Sam Chou, Yalin Chen, Siang Yu Wun:
Improved multi-server authentication protocol. 331-341
Volume 5, Number 4, April 2012
- Chao Lv, Maode Ma, Hui Li, Jianfeng Ma, Ben Niu:
A security enhanced authentication and key distribution protocol for wireless networks. 343-352 - Lei Yang, Qian Chen, Jun Tian, Dapeng Wu:
Robust track-and-trace video watermarking. 353-363 - Geethapriya Thamilarasu, Ramalingam Sridhar:
A cross-layer game for energy-efficient jamming detection in ad hoc networks. 364-373 - Gang Li, Hongmei Sun:
Discovering AODV-based multipath routes in wireless ad hoc networks. 374-383 - Jie Yang, Yingying Chen:
Toward attack-resistant localization under infrastructure attacks. 384-403
- Yanping Zhang, Yang Xiao, Min Chen, Jingyuan Zhang, Hongmei Deng:
A survey of security visualization for computer network logs. 404-421 - Yanping Zhang, Yang Xiao, Kaveh Ghaboosi, Jingyuan Zhang, Hongmei Deng:
A survey of cyber crimes. 422-437
Volume 5, Number 5, May 2012
- Jun Shao, Peng Liu, Guiyi Wei, Yun Ling:
Anonymous proxy re-encryption. 439-449 - Huiyun Li, Hai Yuan:
Dependability evaluation of integrated circuits at design time against laser fault injection. 450-461 - Chun-I Fan, Ruei-Hau Hsu, Wei-Kuei Chen:
Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme. 462-478 - Yanyan Jia, Yupu Hu, Fenghe Wang, Hongxian Wang:
Correlation power analysis of Trivium. 479-484 - Nguyen Thi Thanh Huyen, Minho Jo, Tien-Dung Nguyen, Eui-nam Huh:
A beneficial analysis of deployment knowledge for key distribution in wireless sensor networks. 485-495 - Wen Tao Zhu, Jianying Zhou, Robert H. Deng, Feng Bao:
Detecting node replication attacks in mobile sensor networks: theory and approaches. 496-507 - Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar, Tai-Hoon Kim, Hassan M. Elkamchouchi:
Mobile one-time passwords: two-factor authentication using mobile phones. 508-516 - Chien-Lung Hsu, Han-Yu Lin:
Pairing-based strong designated verifier proxy signature scheme with low cost. 517-522 - Seongan Lim, Eunjeong Lee, Cheol-Min Park:
A short redactable signature scheme using pairing. 523-534 - Daniel D. Hein, Serhiy Morozov, Hossein Saiedian:
A survey of client-side Web threats and counter-threat measures. 535-544 - Muthulakshmi Angamuthu, Anitha Ramalingam:
Balanced key tree management for multi-privileged groups using (N, T) policy. 545-555
Volume 5, Number 6, June 2012
- Chin-Ling Chen, Mei-Li Chong:
RFID system for public train transportation. 557-571 - Wei Yan, Nirwan Ansari:
Anti-virus in-the-cloud service: are we ready for the security evolution? 572-582 - Zhi Chen, Dapeng Wu, Pingyi Fan, Khaled Ben Letaief:
Leakage-probability-constrained secrecy capacity of a fading channel. 583-593 - Dimitris Glynos, Patroklos G. Argyroudis, Christos Douligeris:
Collaborative service evaluation with the TwoHop trust framework. 594-613 - Fengrong Zhang, Yupu Hu, Min Xie, Yongzhuang Wei:
Constructions of 1-resilient Boolean functions on odd number of variables with a high nonlinearity. 614-624 - Amirhossein Taherinia, Mansour Jamzad:
A two-step watermarking attack using long-range correlation image restoration. 625-635 - Lei Yang, Jun Tian, Dapeng Wu:
Content-based image authentication by feature point clustering and matching. 636-647 - Keke Wu, Huiyun Li, Dingju Zhu:
Fast and scalable parallel processing of scalar multiplication in elliptic curve cryptosystems. 648-657 - Machigar Ongtang, Stephen E. McLaughlin, William Enck, Patrick D. McDaniel:
Semantically rich application-centric security in Android. 658-673 - Chao Lv, Maode Ma, Hui Li, Jianfeng Ma, Ben Niu:
Security enhancement of the communication-efficient AUTHMAC_DH protocols. 674-680 - Sattar J. Aboud, Abid T. Al Ajeeli:
Efficient multiple-collision trapdoor hash family. 681-688 - Weiyi Zhang, Farah I. Kandah, Xiaojiang Du, Chonggang Wang:
Self-protecting networking using dynamic p-cycle construction within link capacity constraint. 689-708
Volume 5, Number 7, July 2012
- Martine Bellaïche, Jean-Charles Grégoire:
SYN flooding attack detection by TCP handshake anomalies. 709-724 - Chin-Ling Chen, Cheng-Chi Lee, Yuh-Min Tseng, Teng-Tai Chou:
A private online system for executing wills based on a secret sharing mechanism. 725-737 - Alfredo Matos, Rui Ferreira, Susana Sargento, Rui L. Aguiar:
Virtual network stacks: from theory to practice. 738-751 - Atanu Basu, Indranil Sengupta, Jamuna Kanta Sing:
Secured hierarchical secret sharing using ECC based signcryption. 752-763 - Yuan Zhou, Haifeng Qian:
Practical round-optimal blind signatures without random oracles or non-interactive zero-knowledge proofs. 764-775 - Mihui Kim, Min Young Chung, Hyunseung Choo:
VeriEST: verification via primary user emulation signal-based test for secure distributed spectrum sensing in cognitive radio networks. 776-788 - Xueying Zhang, Howard M. Heys, Cheng Li:
Energy efficiency of encryption schemes applied to wireless sensor networks. 789-808 - Ping Pan, Lihua Wang, Licheng Wang, Lixiang Li, Yixian Yang:
CSP-DHIES: a new public-key encryption scheme from matrix conjugation. 809-822 - Daojing He, Sammy Chan, Chun Chen, Jiajun Bu:
Secure and efficient dynamic program update in wireless sensor networks. 823-830
Volume 5, Number 8, August 2012
- Ilsun You, Gabriele Lenzini, Marek R. Ogiela, Elisa Bertino:
Defending against insider threats and internal data leakage. 831-833 - Kyungroul Lee, Kangbin Yim, Eugene H. Spafford:
Reverse-safe authentication protocol for secure USB memories. 834-845 - Ludwig Fuchs, Günther Pernul:
Minimizing insider misuse through secure Identity Management. 847-862 - Malek Ben Salem, Salvatore J. Stolfo:
A comparison of one-class bag-of-words user behavior modeling techniques for masquerade detection. 863-872 - William R. Claycomb, Dongwan Shin, Gail-Joon Ahn:
Enhancing directory virtualization to detect insider activity. 873-886 - Mucheol Kim, Jiwan Seo, Sanghyun Noh, Sangyong Han:
Identity management-based social trust model for mediating information sharing and privacy enhancement. 887-897 - Shun-Te Liu, Yi-Ming Chen:
MalPEFinder: fast and retrospective assessment of data breaches in malware attacks. 899-915 - Do-Hoon Kim, Taek Lee, Jaewoo Kang, Hyunchoel Jeong, Hoh Peter In:
Adaptive pattern mining model for early detection of botnet-propagation scale. 917-927 - Arpan Roy, Dong Seong Kim, Kishor S. Trivedi:
Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees. 929-943
Volume 5, Number 9, September 2012
- Seok-Hun Kim, Soo-Kyun Kim, Jong Hyuk Park:
A VoIP system for mobility voice security support using the VPN. 945-956 - Zhangjie Fu, Xingming Sun, Yuling Liu, Bo Li:
Text split-based steganography in OOXML format documents for covert communication. 957-968 - Lian Jie Wang, Jonathan Jen-Rong Chen:
An improved discrete logarithm-based multisignature scheme. 969-973 - Taeshik Shon, Jong Hyuk Park, Doo-Soon Park:
Improved RF4CE key agreement approach involving two-phase key distribution for smart-convergence home device. 974-986 - Giannis F. Marias, João Barros, Markus Fiedler, Andreas Fischer, Harald Hauff, Ralph Herkenhöner, Antonio Grillo, Alessandro Lentini, Luísa Lima, Charlott Lorentzen, Wojciech Mazurczyk, Hermann de Meer, Paulo F. Oliveira, George C. Polyzos, Enric Pujol, Krzysztof Szczypiorski, João P. Vilela, Tiago T. V. Vinhoza:
Security and privacy issues for the network of the future. 987-1005 - Alexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis:
SIPA: generic and secure accounting for SIP. 1006-1027 - Shichuan Ma, Michael Hempel, Yaoqing (Lamar) Yang, Hamid Sharif:
Securing wireless communications in transmit-beamforming systems by precoding jamming noise signals. 1028-1036 - Sanaa Sharafeddine, Amal El Arid:
An empirical energy model for secure Web browsing over mobile devices. 1037-1048
- Hamza Rahmani, Nabil Sahli, Farouk Kamoun:
Distributed denial-of-service attack detection scheme-based joint-entropy. 1049-1061 - Masoom Alam, Tamleek Ali, Sanaullah Khan, Shahbaz Khan, Muhammad Ali, Mohammad Nauman, Amir Hayat, Muhammad Khurram Khan, Khaled Alghathbar:
Analysis of existing remote attestation techniques. 1062-1082
Volume 5, Number 10, October 2012
- Taeshik Shon, Costas Lambrinoudakis, Xiaobo Zhou:
Special issue on next generation communication and network security. 1083-1085
- Namheun Son, Keun-Gi Lee, Sangjun Jeon, Sangjin Lee, Changhoon Lee:
The effective method of database server forensics on the enterprise environment. 1086-1093 - Young-Hoon Moon, Eunjin Kim, Suh Mahn Hur, Huy Kang Kim:
Detection of botnets before activation: an enhanced honeypot system for intentional infection and behavioral observation of malware. 1094-1101 - Lingli Deng, Qing Yu, Jin Peng:
Adaptive scheduling strategies for cloud-based resource infrastructures. 1102-1111 - Shangguang Wang, Hua Zou, Qibo Sun, Fangchun Yang:
Bayesian Approach with Maximum Entropy Principle for trusted quality of Web service metric in e-commerce applications. 1112-1120 - Yinghui Zhang, Xiaofeng Chen, H. Li, J. Cao:
Identity-based construction for secure and efficient handoff authentication schemes in wireless networks. 1121-1130 - Shangguang Wang, Qibo Sun, Hua Zou, Fangchun Yang:
Detecting SYN flooding attacks based on traffic prediction. 1131-1140 - Jongsung Kim:
Study on the security of the extended version for the ISO/IEC international standardized block cipher SEED. 1141-1146 - Cándido Caballero-Gil, Pino Caballero-Gil, Jezabel Molina-Gil:
Self-organizing life cycle management of mobile ad hoc networks. 1147-1158 - Fanbao Liu, Tao Xie, Yumeng Feng, Dengguo Feng:
On the security of PPPoE network. 1159-1168 - Feng Zhao, Min Li, Weizhong Qiang, Hai Jin, Deqing Zou, Qin Zhang:
Proactive recovery approach for intrusion tolerance with dynamic configuration of physical and virtual replicas. 1169-1180 - Young-Gab Kim, Min-Soo Lee, Sanghyun Cho, Sung Deok Cha:
A quantitative approach to estimate a website security risk using whitelist. 1181-1192 - Hai-Cheng Chu, Szu-Wei Yang, Jong Hyuk Park:
A partially reconstructed previous Gmail session by live digital evidences investigation through volatile data acquisition. 1193-1198 - Dong Seong Kim, Sang Min Lee, Tae Hwan Kim, Jong Sou Park:
Quantitative intrusion intensity assessment for intrusion detection systems. 1199-1208 - Muhammad Taufiq Nuruzzaman, Changmoo Lee, Mohd. Fikri Azli bin Abdullah, Deokjai Choi:
Simple SMS spam filtering on independent mobile phone. 1209-1220
Volume 5, Number 11, November 2012
- Wenyu Qu, Yang Xiang, Yong Zhang:
Special issue on security in ubiquitous computing. 1221-1222
- Neda Edalat, Wendong Xiao, Mehul Motani, Nirmalya Roy, Sajal K. Das:
Auction-based task allocation with trust management for shared sensor networks. 1223-1234 - Md. Tanzim Khorshed, A. B. M. Shawkat Ali, Saleh A. Wasimi:
Classifying different denial-of-service attacks in cloud computing using rule-based learning. 1235-1247 - Xinyi Huang, Cheng-Kang Chu, Hung-Min Sun, Jianying Zhou, Robert H. Deng:
Enhanced authentication for commercial video services. 1248-1259 - Muhammad Khurram Khan, Debiao He:
A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography. 1260-1266 - Wei-Tong Hu, Mingchu Li, Cheng Guo, Yizhi Ren:
Reversible secret image sharing with steganography and dynamic embedding. 1267-1276
Volume 5, Number 12, December 2012
- Brandon Shirley, Lokesh Babu, Chad D. Mano:
Bot detection evasion: a case study on local-host alert correlation bot detection methods. 1277-1295 - Mehdi Mohammadi, Bijan Raahemi, Ahmad Akbari, Babak Nasersharif:
New class-dependent feature transformation for intrusion detection systems. 1296-1311 - Syh-Yuan Tan, Zhe Jin, Andrew Beng Jin Teoh, Bok-Min Goi, Swee-Huay Heng:
On the realization of fuzzy identity-based identification scheme using fingerprint biometrics. 1312-1324 - Chung-Hua Chu, Yen-Chieh Ouyang, Chang-Bu Jang:
Secure data transmission with cloud computing in heterogeneous wireless networks. 1325-1336 - Mansour Alsaleh, Paul C. van Oorschot:
Revisiting network scanning detection using sequential hypothesis testing. 1337-1350 - Qiang Tang:
Public key encryption supporting plaintext equality test and user-specified authorization. 1351-1362 - Qiuhua Wang, Huifang Chen, Lei Xie, Kuang Wang:
Access-polynomial-based self-healing group key distribution scheme for resource-constrained wireless networks. 1363-1374 - Cheng-Chi Lee, Tsung-Hung Lin, Chwei-Shyong Tsai:
Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications. 1375-1378 - Haifeng Qian, Junqing Gong, Yuan Zhou:
Anonymous password-based key exchange with low resources consumption and better user-friendliness. 1379-1393 - Wojciech Mazurczyk:
Lost audio packets steganography: the first practical evaluation. 1394-1403 - Zongyang Zhang, Zhenfu Cao, Haifeng Qian:
Chosen-ciphertext attack secure public key encryption with auxiliary inputs. 1404-1411 - Wei-Chuen Yau, Swee-Huay Heng, Syh-Yuan Tan, Bok-Min Goi, Raphael C.-W. Phan:
Efficient encryption with keyword search in mobile networks. 1412-1422 - Debiao He, Jianhua Chen, Yitao Chen:
A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. 1423-1429 - Mingwu Zhang, Bo Yang, Tsuyoshi Takagi:
Reconciling and improving of multi-receiver signcryption protocols with threshold decryption. 1430-1440 - Hu Xiong, Zhong Chen, Fagen Li:
Efficient privacy-preserving authentication protocol for vehicular communications with trustworthy. 1441-1451 - Sang Guun Yoo, Keunyoung Park, Juho Kim:
Confidential information protection system for mobile devices. 1452-1461 - Tarik Taleb, Yassine Hadjadj Aoul:
QoS2: a framework for integrating quality of security with quality of service. 1462-1470 - Suleyman Kondakci:
Intelligent network security assessment with modeling and analysis of attack patterns. 1471-1486
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.