default search action
Search dblp for Publications
export results for "toc:db/journals/scn/scn6.bht:"
@article{DBLP:journals/scn/0005MJ13, author = {Peng Liu and Refik Molva and Jiwu Jing}, title = {Special issue on "security and privacy in pervasive and ubiquitous computing and communication systems"}, journal = {Secur. Commun. Networks}, volume = {6}, number = {12}, pages = {1522--1523}, year = {2013}, url = {https://doi.org/10.1002/sec.947}, doi = {10.1002/SEC.947}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/0005MJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AbrouguiB13, author = {Kaouther Abrougui and Azzedine Boukerche}, title = {Efficient group-based authentication protocol for location-based service discovery in intelligent transportation systems}, journal = {Secur. Commun. Networks}, volume = {6}, number = {4}, pages = {473--484}, year = {2013}, url = {https://doi.org/10.1002/sec.641}, doi = {10.1002/SEC.641}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AbrouguiB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Abu-AmaraAMSA13, author = {Marwan H. Abu{-}Amara and Abdulaziz Al{-}Baiz and Ashraf S. Mahmoud and Mohammed H. Sqalli and Farag Azzedin}, title = {A scalable NAT-based solution to Internet access denial by higher-tier ISPs}, journal = {Secur. Commun. Networks}, volume = {6}, number = {2}, pages = {194--209}, year = {2013}, url = {https://doi.org/10.1002/sec.557}, doi = {10.1002/SEC.557}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Abu-AmaraAMSA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Al-SinaniM13, author = {Haitham S. Al{-}Sinani and Chris J. Mitchell}, title = {Enabling interoperation between Shibboleth and Information Card systems}, journal = {Secur. Commun. Networks}, volume = {6}, number = {2}, pages = {219--229}, year = {2013}, url = {https://doi.org/10.1002/sec.560}, doi = {10.1002/SEC.560}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Al-SinaniM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AlaghebandA13, author = {Mahdi R. Alagheband and Mohammad Reza Aref}, title = {Unified privacy analysis of new-found {RFID} authentication protocols}, journal = {Secur. Commun. Networks}, volume = {6}, number = {8}, pages = {999--1009}, year = {2013}, url = {https://doi.org/10.1002/sec.650}, doi = {10.1002/SEC.650}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AlaghebandA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AmiraniTM13, author = {Mehdi Chehel Amirani and Mohsen Toorani and Sara Mihandoost}, title = {Feature-based Type Identification of File Fragments}, journal = {Secur. Commun. Networks}, volume = {6}, number = {1}, pages = {115--128}, year = {2013}, url = {https://doi.org/10.1002/sec.553}, doi = {10.1002/SEC.553}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AmiraniTM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AmiriNSA13, author = {Iraj Sadegh Amiri and Mehrnaz Nikmaram and Ali Shahidinejad and Jalil Ali}, title = {Generation of potential wells used for quantum codes transmission via a {TDMA} network communication system}, journal = {Secur. Commun. Networks}, volume = {6}, number = {11}, pages = {1301--1309}, year = {2013}, url = {https://doi.org/10.1002/sec.712}, doi = {10.1002/SEC.712}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AmiriNSA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AnL13, author = {Wenjuan An and Mangui Liang}, title = {A new intrusion detection method based on {SVM} with minimum within-class scatter}, journal = {Secur. Commun. Networks}, volume = {6}, number = {9}, pages = {1064--1074}, year = {2013}, url = {https://doi.org/10.1002/sec.666}, doi = {10.1002/SEC.666}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AnL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AnuarPFC13, author = {Nor Badrul Anuar and Maria Papadaki and Steven Furnell and Nathan L. Clarke}, title = {Incident prioritisation using analytic hierarchy process {(AHP):} Risk Index Model {(RIM)}}, journal = {Secur. Commun. Networks}, volume = {6}, number = {9}, pages = {1087--1116}, year = {2013}, url = {https://doi.org/10.1002/sec.673}, doi = {10.1002/SEC.673}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AnuarPFC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BaldiniFBT13, author = {Gianmarco Baldini and Igor Nai Fovino and Stefano Braghin and Alberto Trombetta}, title = {Distributed access control policies for spectrum sharing}, journal = {Secur. Commun. Networks}, volume = {6}, number = {8}, pages = {925--935}, year = {2013}, url = {https://doi.org/10.1002/sec.629}, doi = {10.1002/SEC.629}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/BaldiniFBT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BallariniMM13, author = {Paolo Ballarini and Lynda Mokdad and Quentin Monnet}, title = {Modeling tools for detecting DoS attacks in WSNs}, journal = {Secur. Commun. Networks}, volume = {6}, number = {4}, pages = {420--436}, year = {2013}, url = {https://doi.org/10.1002/sec.630}, doi = {10.1002/SEC.630}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/BallariniMM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BarryC13, author = {Bazara I. A. Barry and H. Anthony Chan}, title = {Architecture and performance evaluation of a hybrid intrusion detection system for {IP} telephony}, journal = {Secur. Commun. Networks}, volume = {6}, number = {12}, pages = {1539--1555}, year = {2013}, url = {https://doi.org/10.1002/sec.174}, doi = {10.1002/SEC.174}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/BarryC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BenitezBC13, author = {Yesica Imelda Saavedra Benitez and Jalel Ben{-}Othman and Jean{-}Pierre Claud{\'{e}}}, title = {Performance comparison between {IBE-HWMP} and {ECDSA-HWMP}}, journal = {Secur. Commun. Networks}, volume = {6}, number = {4}, pages = {437--449}, year = {2013}, url = {https://doi.org/10.1002/sec.632}, doi = {10.1002/SEC.632}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/BenitezBC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BoseS13, author = {Abhijit Bose and Kang G. Shin}, title = {Agent-based modeling of malware dynamics in heterogeneous environments}, journal = {Secur. Commun. Networks}, volume = {6}, number = {12}, pages = {1576--1589}, year = {2013}, url = {https://doi.org/10.1002/sec.298}, doi = {10.1002/SEC.298}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/BoseS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Bou-HarbPDA13, author = {Elias Bou{-}Harb and Makan Pourzandi and Mourad Debbabi and Chadi Assi}, title = {A secure, efficient, and cost-effective distributed architecture for spam mitigation on {LTE} 4G mobile networks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {12}, pages = {1478--1489}, year = {2013}, url = {https://doi.org/10.1002/sec.413}, doi = {10.1002/SEC.413}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Bou-HarbPDA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChangCY13, author = {Chin{-}Chen Chang and Shih{-}Chang Chang and Jen{-}Ho Yang}, title = {A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment}, journal = {Secur. Commun. Networks}, volume = {6}, number = {8}, pages = {972--984}, year = {2013}, url = {https://doi.org/10.1002/sec.647}, doi = {10.1002/SEC.647}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChangCY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChaoYLL13, author = {Chih{-}Hung Chao and Ching{-}Fang Yang and Po{-}Ting Lin and Jung{-}Shian Li}, title = {Novel distributed key revocation scheme for wireless sensor networks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {10}, pages = {1271--1280}, year = {2013}, url = {https://doi.org/10.1002/sec.707}, doi = {10.1002/SEC.707}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChaoYLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Chen13, author = {Hsing{-}Chung Chen}, title = {Secure multicast key protocol for electronic mail systems with providing perfect forward secrecy}, journal = {Secur. Commun. Networks}, volume = {6}, number = {1}, pages = {100--107}, year = {2013}, url = {https://doi.org/10.1002/sec.536}, doi = {10.1002/SEC.536}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Chen13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChenCZ13, author = {Chia{-}Mei Chen and Sheng{-}Tzong Cheng and Ruei{-}Yu Zeng}, title = {A proactive approach to intrusion detection and malware collection}, journal = {Secur. Commun. Networks}, volume = {6}, number = {7}, pages = {844--853}, year = {2013}, url = {https://doi.org/10.1002/sec.619}, doi = {10.1002/SEC.619}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChenCZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChenHJH13, author = {Liang Chen and Lansheng Han and Jiandu Jing and Dongping Hu}, title = {A post-quantum provable data possession protocol in cloud}, journal = {Secur. Commun. Networks}, volume = {6}, number = {5}, pages = {658--667}, year = {2013}, url = {https://doi.org/10.1002/sec.691}, doi = {10.1002/SEC.691}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChenHJH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChenWTW13, author = {Tzung{-}Her Chen and Bing{-}Jian Wang and Tai{-}Yuan Tu and Chih{-}Hung Wang}, title = {A security-enhanced key agreement protocol based on chaotic maps}, journal = {Secur. Commun. Networks}, volume = {6}, number = {1}, pages = {108--114}, year = {2013}, url = {https://doi.org/10.1002/sec.537}, doi = {10.1002/SEC.537}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChenWTW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChengLCC13, author = {Zi{-}Yao Cheng and Yun Liu and Chin{-}Chen Chang and Shih{-}Chang Chang}, title = {Authenticated {RFID} security mechanism based on chaotic maps}, journal = {Secur. Commun. Networks}, volume = {6}, number = {2}, pages = {247--256}, year = {2013}, url = {https://doi.org/10.1002/sec.709}, doi = {10.1002/SEC.709}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChengLCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChienLW13, author = {Hung{-}Yu Chien and Chin{-}I Lee and Tzong{-}Chen Wu}, title = {Comments on {IMBAS:} identity-based multi-user broadcast authentication in wireless sensor networks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {8}, pages = {993--998}, year = {2013}, url = {https://doi.org/10.1002/sec.649}, doi = {10.1002/SEC.649}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChienLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChienYH13, author = {Hung{-}Yu Chien and Chu{-}Sing Yang and Hung{-}Pin Hou}, title = {Non-linearity cannot help {RFID} resist full-disclosure attacks and terrorist fraud attacks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {12}, pages = {1490--1495}, year = {2013}, url = {https://doi.org/10.1002/sec.410}, doi = {10.1002/SEC.410}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChienYH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChumZ13, author = {Chi Sing Chum and Xiaowen Zhang}, title = {Hash function-based secret sharing scheme designs}, journal = {Secur. Commun. Networks}, volume = {6}, number = {5}, pages = {584--592}, year = {2013}, url = {https://doi.org/10.1002/sec.576}, doi = {10.1002/SEC.576}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChumZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/CorradiFFC13, author = {Antonio Corradi and Mario Fanelli and Luca Foschini and Marcello Cinque}, title = {Context data distribution with quality guarantees for Android-based mobile systems}, journal = {Secur. Commun. Networks}, volume = {6}, number = {4}, pages = {450--460}, year = {2013}, url = {https://doi.org/10.1002/sec.633}, doi = {10.1002/SEC.633}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/CorradiFFC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/CuiZC13, author = {Zongmin Cui and Hong Zhu and Lianhua Chi}, title = {Lightweight key management on sensitive data in the cloud}, journal = {Secur. Commun. Networks}, volume = {6}, number = {10}, pages = {1290--1299}, year = {2013}, url = {https://doi.org/10.1002/sec.850}, doi = {10.1002/SEC.850}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/CuiZC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DingG13, author = {Lin Ding and Jie Guan}, title = {Cryptanalysis of {MICKEY} family of stream ciphers}, journal = {Secur. Commun. Networks}, volume = {6}, number = {8}, pages = {936--941}, year = {2013}, url = {https://doi.org/10.1002/sec.637}, doi = {10.1002/SEC.637}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/DingG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DjebbarAAH13, author = {Fatiha Djebbar and Beghdad Ayad and Karim Abed{-}Meraim and Habib Hamam}, title = {Unified phase and magnitude speech spectra data hiding algorithm}, journal = {Secur. Commun. Networks}, volume = {6}, number = {8}, pages = {961--971}, year = {2013}, url = {https://doi.org/10.1002/sec.644}, doi = {10.1002/SEC.644}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/DjebbarAAH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DuanXF13, author = {Meijiao Duan and Jing Xu and Dengguo Feng}, title = {Efficient identity-based strong designated verifier signature schemes}, journal = {Secur. Commun. Networks}, volume = {6}, number = {7}, pages = {902--911}, year = {2013}, url = {https://doi.org/10.1002/sec.645}, doi = {10.1002/SEC.645}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/DuanXF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/EmbletonSZ13, author = {Shawn Embleton and Sherri Sparks and Cliff Changchun Zou}, title = {{SMM} rootkit: a new breed of {OS} independent malware}, journal = {Secur. Commun. Networks}, volume = {6}, number = {12}, pages = {1590--1605}, year = {2013}, url = {https://doi.org/10.1002/sec.166}, doi = {10.1002/SEC.166}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/EmbletonSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/FanLZCGJS13, author = {Xinxin Fan and Mingchu Li and Hui Zhao and Xiaodong Chen and Zhenzhou Guo and Dong Jiao and Weifeng Sun}, title = {Peer cluster: a maximum flow-based trust mechanism in {P2P} file sharing networks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {9}, pages = {1126--1142}, year = {2013}, url = {https://doi.org/10.1002/sec.682}, doi = {10.1002/SEC.682}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/FanLZCGJS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/FeiLM13, author = {Fei Peng and Chen Li and Min Long}, title = {A reversible watermark scheme for 2D vector map based on reversible contrast mapping}, journal = {Secur. Commun. Networks}, volume = {6}, number = {9}, pages = {1117--1125}, year = {2013}, url = {https://doi.org/10.1002/sec.680}, doi = {10.1002/SEC.680}, timestamp = {Wed, 06 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/FeiLM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/GaoL13, author = {Ang Gao and Zengzhi Li}, title = {Free global {ID} against collusion attack on multi-authority attribute-based encryption}, journal = {Secur. Commun. Networks}, volume = {6}, number = {9}, pages = {1143--1152}, year = {2013}, url = {https://doi.org/10.1002/sec.683}, doi = {10.1002/SEC.683}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/GaoL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/GhosalB13, author = {Amrita Ghosal and Sipra Das Bit}, title = {A jamming-attack-defending data forwarding scheme based on channel surfing in wireless sensor networks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {11}, pages = {1367--1388}, year = {2013}, url = {https://doi.org/10.1002/sec.719}, doi = {10.1002/SEC.719}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/GhosalB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/GongB13, author = {Tao Gong and Bharat K. Bhargava}, title = {Immunizing mobile ad hoc networks against collaborative attacks using cooperative immune model}, journal = {Secur. Commun. Networks}, volume = {6}, number = {1}, pages = {58--68}, year = {2013}, url = {https://doi.org/10.1002/sec.530}, doi = {10.1002/SEC.530}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/GongB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/GuWODCY13, author = {Lize Gu and Licheng Wang and Kaoru Ota and Mianxiong Dong and Zhenfu Cao and Yixian Yang}, title = {New public key cryptosystems based on non-Abelian factorization problems}, journal = {Secur. Commun. Networks}, volume = {6}, number = {7}, pages = {912--922}, year = {2013}, url = {https://doi.org/10.1002/sec.710}, doi = {10.1002/SEC.710}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/GuWODCY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/GuoLDC13, author = {Ming{-}Huang Guo and Horng{-}Twu Liaw and Der{-}Jiunn Deng and Han{-}Chieh Chao}, title = {Centralized group key management mechanism for {VANET}}, journal = {Secur. Commun. Networks}, volume = {6}, number = {8}, pages = {1035--1043}, year = {2013}, url = {https://doi.org/10.1002/sec.676}, doi = {10.1002/SEC.676}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/GuoLDC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/GuoLF13, author = {Zhenzhou Guo and Mingchu Li and Xinxin Fan}, title = {Attribute-based ring signcryption scheme}, journal = {Secur. Commun. Networks}, volume = {6}, number = {6}, pages = {790--796}, year = {2013}, url = {https://doi.org/10.1002/sec.614}, doi = {10.1002/SEC.614}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/GuoLF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/GyongyosiI13, author = {Laszlo Gyongyosi and S{\'{a}}ndor Imre}, title = {Information geometric security analysis of differential phase-shift quantum key distribution protocol}, journal = {Secur. Commun. Networks}, volume = {6}, number = {2}, pages = {129--150}, year = {2013}, url = {https://doi.org/10.1002/sec.542}, doi = {10.1002/SEC.542}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/GyongyosiI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HongSL13, author = {Tao Hong and Mao{-}zhong Song and Yu Liu}, title = {Directional spread-spectrum modulation signal for physical layer security communication applications}, journal = {Secur. Commun. Networks}, volume = {6}, number = {2}, pages = {182--193}, year = {2013}, url = {https://doi.org/10.1002/sec.554}, doi = {10.1002/SEC.554}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HongSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HsiaoSF13, author = {Han{-}Wei Hsiao and Huey{-}Min Sun and Wei{-}Cheng Fan}, title = {Detecting stepping-stone intrusion using association rule mining}, journal = {Secur. Commun. Networks}, volume = {6}, number = {10}, pages = {1225--1235}, year = {2013}, url = {https://doi.org/10.1002/sec.692}, doi = {10.1002/SEC.692}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HsiaoSF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HsiehLL13, author = {Che{-}Jen Hsieh and Jung{-}Shian Li and Wei{-}Cheng Liu}, title = {Digital evidence collection for web image access}, journal = {Secur. Commun. Networks}, volume = {6}, number = {6}, pages = {765--776}, year = {2013}, url = {https://doi.org/10.1002/sec.610}, doi = {10.1002/SEC.610}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HsiehLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HuangML13, author = {Yingsong Huang and Shiwen Mao and Yihan Li}, title = {On downlink power allocation for multiuser variable-bit-rate video streaming}, journal = {Secur. Commun. Networks}, volume = {6}, number = {4}, pages = {485--497}, year = {2013}, url = {https://doi.org/10.1002/sec.642}, doi = {10.1002/SEC.642}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HuangML13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HubballiBN13, author = {Neminath Hubballi and Santosh Biswas and Sukumar Nandi}, title = {Towards reducing false alarms in network intrusion detection systems with data summarization technique}, journal = {Secur. Commun. Networks}, volume = {6}, number = {3}, pages = {275--285}, year = {2013}, url = {https://doi.org/10.1002/sec.562}, doi = {10.1002/SEC.562}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HubballiBN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/JannatiSMM13, author = {Hoda Jannati and Mahmoud Salmasizadeh and Javad Mohajeri and Amir Moradi}, title = {Introducing proxy zero-knowledge proof and utilization in anonymous credential systems}, journal = {Secur. Commun. Networks}, volume = {6}, number = {2}, pages = {161--172}, year = {2013}, url = {https://doi.org/10.1002/sec.543}, doi = {10.1002/SEC.543}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/JannatiSMM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/JiaTLFXY13, author = {Weijia Jia and Fung Po Tso and Zhen Ling and Xinwen Fu and Dong Xuan and Wei Yu}, title = {Blind detection of spread spectrum flow watermarks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {3}, pages = {257--274}, year = {2013}, url = {https://doi.org/10.1002/sec.540}, doi = {10.1002/SEC.540}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/JiaTLFXY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/JiaWJZL13, author = {Xiaoqi Jia and Rui Wang and Jun Jiang and Shengzhi Zhang and Peng Liu}, title = {Defending return-oriented programming based on virtualization techniques}, journal = {Secur. Commun. Networks}, volume = {6}, number = {10}, pages = {1236--1249}, year = {2013}, url = {https://doi.org/10.1002/sec.693}, doi = {10.1002/SEC.693}, timestamp = {Mon, 27 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/JiaWJZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/JinJT13, author = {Cong Jin and Shu{-}Wei Jin and Hua{-}Yong Tan}, title = {Computer virus propagation model based on bounded rationality evolutionary game theory}, journal = {Secur. Commun. Networks}, volume = {6}, number = {2}, pages = {210--218}, year = {2013}, url = {https://doi.org/10.1002/sec.558}, doi = {10.1002/SEC.558}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/JinJT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KandahSZW13, author = {Farah I. Kandah and Yashaswi Singh and Weiyi Zhang and Chonggang Wang}, title = {Mitigating colluding injected attack using monitoring verification in mobile ad-hoc networks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {4}, pages = {539--547}, year = {2013}, url = {https://doi.org/10.1002/sec.681}, doi = {10.1002/SEC.681}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KandahSZW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KazienkoRMA13, author = {Juliano F. Kazienko and Igor Cesar Gonzalez Ribeiro and Igor M. Moraes and C{\'{e}}lio Vinicius N. de Albuquerque}, title = {SENSORLock: a lightweight key management scheme for wireless sensor networks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {10}, pages = {1198--1210}, year = {2013}, url = {https://doi.org/10.1002/sec.686}, doi = {10.1002/SEC.686}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/KazienkoRMA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KhalidKMHKMKWZC13, author = {Osman Khalid and Samee Ullah Khan and Sajjad Ahmad Madani and Khizar Hayat and Majid Iqbal Khan and Nasro Min{-}Allah and Joanna Kolodziej and Lizhe Wang and Sherali Zeadally and Dan Chen}, title = {Comparative study of trust and reputation systems for wireless sensor networks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {6}, pages = {669--688}, year = {2013}, url = {https://doi.org/10.1002/sec.597}, doi = {10.1002/SEC.597}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KhalidKMHKMKWZC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KhalilBAH13, author = {Issa Khalil and Saurabh Bagchi and Najah AbuAli and Mohammad Hayajneh}, title = {{DISA:} Detection and isolation of sneaky attackers in locally monitored multi-hop wireless networks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {12}, pages = {1524--1538}, year = {2013}, url = {https://doi.org/10.1002/sec.152}, doi = {10.1002/SEC.152}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KhalilBAH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KhelifaMH13, author = {Benahmed Khelifa and Madjid Merabti and Hafid Haffaf}, title = {Distributed monitoring for misbehaviour detection in wireless sensor networks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {4}, pages = {388--400}, year = {2013}, url = {https://doi.org/10.1002/sec.624}, doi = {10.1002/SEC.624}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KhelifaMH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KifayatMSA13, author = {Kashif Kifayat and Madjid Merabti and Qi Shi and Sohail Abbas}, title = {Component-based security system {(COMSEC)} with QoS for wireless sensor networks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {4}, pages = {461--472}, year = {2013}, url = {https://doi.org/10.1002/sec.634}, doi = {10.1002/SEC.634}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KifayatMSA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KongTPLW13, author = {Deguang Kong and Donghai Tian and Qiha Pan and Peng Liu and Dinghao Wu}, title = {Semantic aware attribution analysis of remote exploits}, journal = {Secur. Commun. Networks}, volume = {6}, number = {7}, pages = {818--832}, year = {2013}, url = {https://doi.org/10.1002/sec.613}, doi = {10.1002/SEC.613}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KongTPLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Kumar13, author = {Ch. Aswani Kumar}, title = {Designing role-based access control using formal concept analysis}, journal = {Secur. Commun. Networks}, volume = {6}, number = {3}, pages = {373--383}, year = {2013}, url = {https://doi.org/10.1002/sec.589}, doi = {10.1002/SEC.589}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Kumar13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Lee13, author = {Tian{-}Fu Lee}, title = {User authentication scheme with anonymity, unlinkability and untrackability for global mobility networks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {11}, pages = {1404--1413}, year = {2013}, url = {https://doi.org/10.1002/sec.734}, doi = {10.1002/SEC.734}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Lee13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LeeCW13, author = {Tian{-}Fu Lee and I{-}Pin Chang and Ching{-}Cheng Wang}, title = {Efficient three-party encrypted key exchange using trapdoor functions}, journal = {Secur. Commun. Networks}, volume = {6}, number = {11}, pages = {1353--1358}, year = {2013}, url = {https://doi.org/10.1002/sec.717}, doi = {10.1002/SEC.717}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LeeCW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiJLD13, author = {Jingwei Li and Chunfu Jia and Zheli Liu and Zongqing Dong}, title = {Cycle-walking revisited: consistency, security, and efficiency}, journal = {Secur. Commun. Networks}, volume = {6}, number = {8}, pages = {985--992}, year = {2013}, url = {https://doi.org/10.1002/sec.648}, doi = {10.1002/SEC.648}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiJLD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiZ13, author = {Xiaowei Li and Yuqing Zhang}, title = {A simple and robust anonymous two-factor authenticated key exchange protocol}, journal = {Secur. Commun. Networks}, volume = {6}, number = {6}, pages = {711--722}, year = {2013}, url = {https://doi.org/10.1002/sec.605}, doi = {10.1002/SEC.605}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiZZ13, author = {Xiaowei Li and Yuqing Zhang and Geifei Zhang}, title = {A new certificateless authenticated key agreement protocol for {SIP} with different KGCs}, journal = {Secur. Commun. Networks}, volume = {6}, number = {5}, pages = {631--643}, year = {2013}, url = {https://doi.org/10.1002/sec.595}, doi = {10.1002/SEC.595}, timestamp = {Wed, 14 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiangXOVD13, author = {Xiannuan Liang and Yang Xiao and Suat Ozdemir and Athanasios V. Vasilakos and Hongmei Deng}, title = {Cipher feedback mode under go-back-N and selective-reject protocols in error channels}, journal = {Secur. Commun. Networks}, volume = {6}, number = {8}, pages = {942--954}, year = {2013}, url = {https://doi.org/10.1002/sec.638}, doi = {10.1002/SEC.638}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiangXOVD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LimLA13, author = {Seongan Lim and Juhee Lee and Youngjoo An}, title = {Key exposure free chameleon hash schemes based on discrete logarithm problem}, journal = {Secur. Commun. Networks}, volume = {6}, number = {7}, pages = {812--817}, year = {2013}, url = {https://doi.org/10.1002/sec.612}, doi = {10.1002/SEC.612}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LimLA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LinLJW13, author = {Jingqiang Lin and Peng Liu and Jiwu Jing and Qiongxiao Wang}, title = {Impossibility of finding any third family of server protocols integrating Byzantine quorum systems with threshold signature schemes}, journal = {Secur. Commun. Networks}, volume = {6}, number = {5}, pages = {612--630}, year = {2013}, url = {https://doi.org/10.1002/sec.593}, doi = {10.1002/SEC.593}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LinLJW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuHZL13, author = {Zhenhua Liu and Yupu Hu and Xiangsong Zhang and Fagen Li}, title = {Efficient and strongly unforgeable identity-based signature scheme from lattices in the standard model}, journal = {Secur. Commun. Networks}, volume = {6}, number = {1}, pages = {69--77}, year = {2013}, url = {https://doi.org/10.1002/sec.531}, doi = {10.1002/SEC.531}, timestamp = {Wed, 22 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiuHZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuL13, author = {He Liu and Mangui Liang}, title = {Efficient identity-based hierarchical access authentication protocol for mobile network}, journal = {Secur. Commun. Networks}, volume = {6}, number = {12}, pages = {1509--1521}, year = {2013}, url = {https://doi.org/10.1002/sec.412}, doi = {10.1002/SEC.412}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiuL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuY13, author = {Yi{-}Ning Liu and Jihong Yan}, title = {A lightweight micropayment scheme based on Lagrange interpolation formula}, journal = {Secur. Commun. Networks}, volume = {6}, number = {8}, pages = {955--960}, year = {2013}, url = {https://doi.org/10.1002/sec.643}, doi = {10.1002/SEC.643}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiuY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuZ13, author = {Xuefeng Liu and Yuqing Zhang}, title = {A privacy-preserving acceleration authentication protocol for mobile pay-TV systems}, journal = {Secur. Commun. Networks}, volume = {6}, number = {3}, pages = {361--372}, year = {2013}, url = {https://doi.org/10.1002/sec.584}, doi = {10.1002/SEC.584}, timestamp = {Fri, 03 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/LiuZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuZHH13, author = {Yan{-}Xiao Liu and Yuqing Zhang and Lein Harn and Yu{-}pu Hu}, title = {Verifiable symmetric polynomial-based key distribution schemes}, journal = {Secur. Commun. Networks}, volume = {6}, number = {8}, pages = {1028--1034}, year = {2013}, url = {https://doi.org/10.1002/sec.671}, doi = {10.1002/SEC.671}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiuZHH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LvLW13, author = {Xixiang Lv and Hui Li and Baocang Wang}, title = {Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {1}, pages = {49--57}, year = {2013}, url = {https://doi.org/10.1002/sec.529}, doi = {10.1002/SEC.529}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LvLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MagkosAKS13, author = {Emmanouil Magkos and Markos Avlonitis and Panayiotis Kotzanikolaou and Michalis Stefanidakis}, title = {Toward early warning against Internet worms based on critical-sized networks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {1}, pages = {78--88}, year = {2013}, url = {https://doi.org/10.1002/sec.534}, doi = {10.1002/SEC.534}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/MagkosAKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MalekM13, author = {Behzad Malek and Ali Miri}, title = {Chaotic masking for securing {RFID} systems against relay attacks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {12}, pages = {1496--1508}, year = {2013}, url = {https://doi.org/10.1002/sec.586}, doi = {10.1002/SEC.586}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MalekM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MazurczykSTL13, author = {Wojciech Mazurczyk and Krzysztof Szczypiorski and Hui Tian and Yali Liu}, title = {Trends in modern information hiding: techniques, applications and detection}, journal = {Secur. Commun. Networks}, volume = {6}, number = {11}, pages = {1414--1415}, year = {2013}, url = {https://doi.org/10.1002/sec.919}, doi = {10.1002/SEC.919}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MazurczykSTL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MohammadiSJ13, author = {Shahriyar Mohammadi and Mohammad Hussein Sherkat and Mona Jamporazmey}, title = {A taxonomy framework based on {ITU-TX-805} security architecture for quantitative determination of computer network vulnerabilities}, journal = {Secur. Commun. Networks}, volume = {6}, number = {7}, pages = {864--880}, year = {2013}, url = {https://doi.org/10.1002/sec.623}, doi = {10.1002/SEC.623}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MohammadiSJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/NajeraRL13, author = {Pablo Najera and Rodrigo Roman and Javier L{\'{o}}pez}, title = {User-centric secure integration of personal {RFID} tags and sensor networks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {10}, pages = {1177--1197}, year = {2013}, url = {https://doi.org/10.1002/sec.684}, doi = {10.1002/SEC.684}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/NajeraRL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/NjoguLK13, author = {Humphrey Waita Njogu and Jiawei Luo and Jane Nduta Kiere}, title = {Network specific vulnerability based alert reduction approach}, journal = {Secur. Commun. Networks}, volume = {6}, number = {1}, pages = {15--27}, year = {2013}, url = {https://doi.org/10.1002/sec.520}, doi = {10.1002/SEC.520}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/NjoguLK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/OlteanuXLCC13, author = {Alina Olteanu and Yang Xiao and Jing Liu and Thomas M. Chen and C. L. Philip Chen}, title = {Nonintrusive tracing in the Internet}, journal = {Secur. Commun. Networks}, volume = {6}, number = {7}, pages = {833--843}, year = {2013}, url = {https://doi.org/10.1002/sec.616}, doi = {10.1002/SEC.616}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/OlteanuXLCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/OzdemirX13, author = {Suat Ozdemir and Yang Xiao}, title = {{FTDA:} outlier detection-based fault-tolerant data aggregation for wireless sensor networks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {6}, pages = {702--710}, year = {2013}, url = {https://doi.org/10.1002/sec.604}, doi = {10.1002/SEC.604}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/OzdemirX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Parakh13, author = {Abhishek Parakh}, title = {A probabilistic quantum key transfer protocol}, journal = {Secur. Commun. Networks}, volume = {6}, number = {11}, pages = {1389--1395}, year = {2013}, url = {https://doi.org/10.1002/sec.736}, doi = {10.1002/SEC.736}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Parakh13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ParkATZ13, author = {Soyoung Park and Baber Aslam and Damla Turgut and Cliff Changchun Zou}, title = {Defense against Sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support}, journal = {Secur. Commun. Networks}, volume = {6}, number = {4}, pages = {523--538}, year = {2013}, url = {https://doi.org/10.1002/sec.679}, doi = {10.1002/SEC.679}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ParkATZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/PengCP13, author = {Dichao Peng and Wei Chen and Qunsheng Peng}, title = {TrustVis: visualizing trust toward attack identification in distributed computing environments}, journal = {Secur. Commun. Networks}, volume = {6}, number = {12}, pages = {1445--1459}, year = {2013}, url = {https://doi.org/10.1002/sec.521}, doi = {10.1002/SEC.521}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/PengCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/PuWW13, author = {Qiong Pu and Jian Wang and Shuhua Wu}, title = {Secure {SIP} authentication scheme supporting lawful interception}, journal = {Secur. Commun. Networks}, volume = {6}, number = {3}, pages = {340--350}, year = {2013}, url = {https://doi.org/10.1002/sec.568}, doi = {10.1002/SEC.568}, timestamp = {Fri, 07 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/PuWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/PurushothamaA13, author = {B. R. Purushothama and B. B. Amberker}, title = {Secure group and multi-layer group communication schemes based on polynomial interpolation}, journal = {Secur. Commun. Networks}, volume = {6}, number = {6}, pages = {735--756}, year = {2013}, url = {https://doi.org/10.1002/sec.607}, doi = {10.1002/SEC.607}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/PurushothamaA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/QabajehKQ13, author = {Liana Khamis Qabajeh and Miss Laiha Mat Kiah and Mohammad Moustafa Qabajeh}, title = {A more secure and scalable routing protocol for mobile ad hoc networks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {3}, pages = {286--308}, year = {2013}, url = {https://doi.org/10.1002/sec.563}, doi = {10.1002/SEC.563}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/QabajehKQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/QinL13, author = {Baodong Qin and Shengli Liu}, title = {Efficient chosen ciphertext secure public-key encryption under factoring assumption}, journal = {Secur. Commun. Networks}, volume = {6}, number = {3}, pages = {351--360}, year = {2013}, url = {https://doi.org/10.1002/sec.571}, doi = {10.1002/SEC.571}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/QinL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/RajiMJM13, author = {Fatemeh Raji and Ali Miri and Mohammad Davarpanah Jazi and Behzad Malek}, title = {{DEFF:} a new architecture for private online social networks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {12}, pages = {1460--1470}, year = {2013}, url = {https://doi.org/10.1002/sec.533}, doi = {10.1002/SEC.533}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/RajiMJM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/RyuY13, author = {Eun{-}Kyung Ryu and Kee{-}Young Yoo}, title = {Certificateless broadcast authentication for vehicular ad hoc networks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {5}, pages = {602--611}, year = {2013}, url = {https://doi.org/10.1002/sec.590}, doi = {10.1002/SEC.590}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/RyuY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SedjelmaciSF13, author = {Hichem Sedjelmaci and Sidi{-}Mohammed Senouci and Mohammed Feham}, title = {An efficient intrusion detection framework in cluster-based wireless sensor networks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {10}, pages = {1211--1224}, year = {2013}, url = {https://doi.org/10.1002/sec.687}, doi = {10.1002/SEC.687}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SedjelmaciSF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SelvarajA13, author = {Chithra Selvaraj and Sheila Anand}, title = {Outlier detection in reputation management system for {P2P} networks using rough set theory}, journal = {Secur. Commun. Networks}, volume = {6}, number = {9}, pages = {1153--1160}, year = {2013}, url = {https://doi.org/10.1002/sec.685}, doi = {10.1002/SEC.685}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SelvarajA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SeoSK13, author = {Hwajeong Seo and Kyung{-}Ah Shim and Howon Kim}, title = {Performance enhancement of TinyECC based on multiplication optimizations}, journal = {Secur. Commun. Networks}, volume = {6}, number = {2}, pages = {151--160}, year = {2013}, url = {https://doi.org/10.1002/sec.422}, doi = {10.1002/SEC.422}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/SeoSK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SharifiSA13, author = {Mohsen Sharifi and Hadi Salimi and Ebrahim Asadi}, title = {Alamut: a high-performance network intrusion detection system in support of virtualized environments}, journal = {Secur. Commun. Networks}, volume = {6}, number = {11}, pages = {1310--1318}, year = {2013}, url = {https://doi.org/10.1002/sec.713}, doi = {10.1002/SEC.713}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SharifiSA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SheikhanR13, author = {Mansour Sheikhan and Maryam Sharifi Rad}, title = {Using particle swarm optimization in fuzzy association rules-based feature selection and fuzzy ARTMAP-based attack recognition}, journal = {Secur. Commun. Networks}, volume = {6}, number = {7}, pages = {797--811}, year = {2013}, url = {https://doi.org/10.1002/sec.609}, doi = {10.1002/SEC.609}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SheikhanR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Shi13, author = {Wenbo Shi}, title = {A sealed-bid multi-attribute auction protocol with strong bid privacy and bidder privacy}, journal = {Secur. Commun. Networks}, volume = {6}, number = {10}, pages = {1281--1289}, year = {2013}, url = {https://doi.org/10.1002/sec.708}, doi = {10.1002/SEC.708}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Shi13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SouthernOS13, author = {Eric Southern and Abdelkader H. Ouda and Abdallah Shami}, title = {Wireless security: securing mobile {UMTS} communications from interoperation of {GSM}}, journal = {Secur. Commun. Networks}, volume = {6}, number = {4}, pages = {498--508}, year = {2013}, url = {https://doi.org/10.1002/sec.674}, doi = {10.1002/SEC.674}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/SouthernOS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SqalliFSA13, author = {Mohammed H. Sqalli and Syed Naeem Firdous and Khaled Salah and Marwan H. Abu{-}Amara}, title = {Classifying malicious activities in Honeynets using entropy and volume-based thresholds}, journal = {Secur. Commun. Networks}, volume = {6}, number = {5}, pages = {567--583}, year = {2013}, url = {https://doi.org/10.1002/sec.575}, doi = {10.1002/SEC.575}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SqalliFSA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SunBN13, author = {Dongdong Sun and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Predicate encryption for multi-inner-products}, journal = {Secur. Commun. Networks}, volume = {6}, number = {3}, pages = {325--339}, year = {2013}, url = {https://doi.org/10.1002/sec.566}, doi = {10.1002/SEC.566}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SunBN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SzottNP13, author = {Szymon Szott and Marek Natkaniec and Andrzej R. Pach}, title = {Improving QoS and security in wireless ad hoc networks by mitigating the impact of selfish behaviors: a game-theoretic approach}, journal = {Secur. Commun. Networks}, volume = {6}, number = {4}, pages = {509--522}, year = {2013}, url = {https://doi.org/10.1002/sec.677}, doi = {10.1002/SEC.677}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SzottNP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TahaS13, author = {Sanaa Taha and Xuemin (Sherman) Shen}, title = {{ALPP:} anonymous and location privacy preserving scheme for mobile IPv6 heterogeneous networks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {4}, pages = {401--419}, year = {2013}, url = {https://doi.org/10.1002/sec.625}, doi = {10.1002/SEC.625}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/TahaS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Tan13, author = {Zuowen Tan}, title = {Efficient pairing-free provably secure identity-based proxy blind signature scheme}, journal = {Secur. Commun. Networks}, volume = {6}, number = {5}, pages = {593--601}, year = {2013}, url = {https://doi.org/10.1002/sec.582}, doi = {10.1002/SEC.582}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Tan13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Tan13a, author = {Zuowen Tan}, title = {A communication and computation-efficient three-party authenticated key agreement protocol}, journal = {Secur. Commun. Networks}, volume = {6}, number = {7}, pages = {854--863}, year = {2013}, url = {https://doi.org/10.1002/sec.622}, doi = {10.1002/SEC.622}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Tan13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TanJT13, author = {Syh{-}Yuan Tan and Zhe Jin and Andrew Beng Jin Teoh}, title = {Argument on biometrics identity-based encryption schemes}, journal = {Secur. Commun. Networks}, volume = {6}, number = {11}, pages = {1344--1352}, year = {2013}, url = {https://doi.org/10.1002/sec.716}, doi = {10.1002/SEC.716}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/TanJT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Thomas13, author = {Ciza Thomas}, title = {Improving intrusion detection for imbalanced network traffic}, journal = {Secur. Commun. Networks}, volume = {6}, number = {3}, pages = {309--324}, year = {2013}, url = {https://doi.org/10.1002/sec.564}, doi = {10.1002/SEC.564}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Thomas13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ThukralS13, author = {Manish Kumar Thukral and Karma Sonam Sherpa}, title = {Chaotic modulation-based spread spectrum communication using complex dynamics of chaotic {DC-DC} current mode controlled boost converter}, journal = {Secur. Commun. Networks}, volume = {6}, number = {9}, pages = {1053--1063}, year = {2013}, url = {https://doi.org/10.1002/sec.665}, doi = {10.1002/SEC.665}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ThukralS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TiwariP13, author = {Namita Tiwari and Sahadeo Padhye}, title = {Analysis on the generalization of proxy signature}, journal = {Secur. Commun. Networks}, volume = {6}, number = {5}, pages = {549--566}, year = {2013}, url = {https://doi.org/10.1002/sec.581}, doi = {10.1002/SEC.581}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/TiwariP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TsaiTW13, author = {Tung{-}Tso Tsai and Yuh{-}Min Tseng and Tsu{-}Yang Wu}, title = {Provably secure revocable ID-based signature in the standard model}, journal = {Secur. Commun. Networks}, volume = {6}, number = {10}, pages = {1250--1260}, year = {2013}, url = {https://doi.org/10.1002/sec.696}, doi = {10.1002/SEC.696}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/TsaiTW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/UnalC13, author = {Devrim Unal and M. Ufuk {\c{C}}aglayan}, title = {{XFPM-RBAC:} XML-based specification language for security policies in multidomain mobile networks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {12}, pages = {1420--1444}, year = {2013}, url = {https://doi.org/10.1002/sec.411}, doi = {10.1002/SEC.411}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/UnalC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Wang13, author = {Zhiwei Wang}, title = {Improved group key transfer protocols from the protocol of Harn \emph{et al}}, journal = {Secur. Commun. Networks}, volume = {6}, number = {12}, pages = {1471--1477}, year = {2013}, url = {https://doi.org/10.1002/sec.415}, doi = {10.1002/SEC.415}, timestamp = {Sat, 03 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Wang13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangC13, author = {Hongbing Wang and Zhenfu Cao}, title = {More efficient CCA-secure unidirectional proxy re-encryption schemes without random oracles}, journal = {Secur. Commun. Networks}, volume = {6}, number = {2}, pages = {173--181}, year = {2013}, url = {https://doi.org/10.1002/sec.552}, doi = {10.1002/SEC.552}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangLMLC13, author = {Yuanzhuo Wang and Jingyuan Li and Kun Meng and Chuang Lin and Xueqi Cheng}, title = {Modeling and security analysis of enterprise network using attack-defense stochastic game Petri nets}, journal = {Secur. Commun. Networks}, volume = {6}, number = {1}, pages = {89--99}, year = {2013}, url = {https://doi.org/10.1002/sec.535}, doi = {10.1002/SEC.535}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangLMLC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangM13, author = {Xiaonan Wang and Yi Mu}, title = {A secure IPv6 address configuration scheme for a {MANET}}, journal = {Secur. Commun. Networks}, volume = {6}, number = {6}, pages = {777--789}, year = {2013}, url = {https://doi.org/10.1002/sec.611}, doi = {10.1002/SEC.611}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangMBWX13, author = {Wei Wang and Ilona Murynets and Jeffrey Bickford and Christopher Van Wart and Gang Xu}, title = {What you see predicts what you get - lightweight agent-based malware detection}, journal = {Secur. Commun. Networks}, volume = {6}, number = {1}, pages = {33--48}, year = {2013}, url = {https://doi.org/10.1002/sec.528}, doi = {10.1002/SEC.528}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangMBWX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangTCMKHK13, author = {Peng Wang and James Tyra and Eric Chan{-}Tin and Tyson Malchow and Denis Foo Kune and Nicholas Hopper and Yongdae Kim}, title = {Attacking the kad network - real world evaluation and high fidelity simulation using {DVN}}, journal = {Secur. Commun. Networks}, volume = {6}, number = {12}, pages = {1556--1575}, year = {2013}, url = {https://doi.org/10.1002/sec.172}, doi = {10.1002/SEC.172}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/WangTCMKHK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangZ13, author = {Bin Wang and Qing Zhao}, title = {Server-aided batch verification signature schemes in the multiple-signer setting}, journal = {Secur. Commun. Networks}, volume = {6}, number = {11}, pages = {1359--1366}, year = {2013}, url = {https://doi.org/10.1002/sec.718}, doi = {10.1002/SEC.718}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WeiCD13, author = {Lifei Wei and Zhenfu Cao and Xiaolei Dong}, title = {Secure identity-based multisignature schemes under quadratic residue assumptions}, journal = {Secur. Commun. Networks}, volume = {6}, number = {6}, pages = {689--701}, year = {2013}, url = {https://doi.org/10.1002/sec.600}, doi = {10.1002/SEC.600}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WeiCD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WuCOL13, author = {Guowei Wu and Xiaojie Chen and Mohammad S. Obaidat and Chi Lin}, title = {A high efficient node capture attack algorithm in wireless sensor network based on route minimum key set}, journal = {Secur. Commun. Networks}, volume = {6}, number = {2}, pages = {230--238}, year = {2013}, url = {https://doi.org/10.1002/sec.570}, doi = {10.1002/SEC.570}, timestamp = {Fri, 24 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/WuCOL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WuL13, author = {Tzong{-}Sun Wu and Han{-}Yu Lin}, title = {A novel probabilistic signature based on bilinear square Diffie-Hellman problem and its extension}, journal = {Secur. Commun. Networks}, volume = {6}, number = {6}, pages = {757--764}, year = {2013}, url = {https://doi.org/10.1002/sec.608}, doi = {10.1002/SEC.608}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WuL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WuT13, author = {Tsu{-}Yang Wu and Yuh{-}Min Tseng}, title = {Further analysis of pairing-based traitor tracing schemes for broadcast encryption}, journal = {Secur. Commun. Networks}, volume = {6}, number = {1}, pages = {28--32}, year = {2013}, url = {https://doi.org/10.1002/sec.522}, doi = {10.1002/SEC.522}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WuT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/XuGLM13, author = {Chang Xu and Hua Guo and Zhoujun Li and Yi Mu}, title = {New construction of affiliation-hiding authenticated group key agreement}, journal = {Secur. Commun. Networks}, volume = {6}, number = {6}, pages = {723--734}, year = {2013}, url = {https://doi.org/10.1002/sec.606}, doi = {10.1002/SEC.606}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/XuGLM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YanZY13, author = {Jingbo Yan and Yuqing Zhang and Dingning Yang}, title = {Structurized grammar-based fuzz testing for programs with highly structured inputs}, journal = {Secur. Commun. Networks}, volume = {6}, number = {11}, pages = {1319--1330}, year = {2013}, url = {https://doi.org/10.1002/sec.714}, doi = {10.1002/SEC.714}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YanZY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YangWLL13, author = {Chien{-}Chang Yang and Kuo{-}Jui Wei and Bo Li and Jung{-}San Lee}, title = {{HORME:} hierarchical-object-relational medical management for electronic record}, journal = {Secur. Commun. Networks}, volume = {6}, number = {10}, pages = {1261--1270}, year = {2013}, url = {https://doi.org/10.1002/sec.704}, doi = {10.1002/SEC.704}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YangWLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YangZHL13, author = {Huan Yang and Yuqing Zhang and Yu{-}pu Hu and Qixu Liu}, title = {{IKE} vulnerability discovery based on fuzzing}, journal = {Secur. Commun. Networks}, volume = {6}, number = {7}, pages = {889--901}, year = {2013}, url = {https://doi.org/10.1002/sec.628}, doi = {10.1002/SEC.628}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YangZHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YehCW13, author = {Her{-}Tyan Yeh and Bing{-}Chang Chen and Yi{-}Cong Wu}, title = {Mobile user authentication system in cloud environment}, journal = {Secur. Commun. Networks}, volume = {6}, number = {9}, pages = {1161--1168}, year = {2013}, url = {https://doi.org/10.1002/sec.688}, doi = {10.1002/SEC.688}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YehCW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YenGLD13, author = {Chih{-}Ta Yen and Ming{-}Huang Guo and Nai{-}Wei Lo and Der{-}Jiunn Deng}, title = {Authentication with low-cost {RFID} tags in mobile networks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {8}, pages = {1021--1027}, year = {2013}, url = {https://doi.org/10.1002/sec.667}, doi = {10.1002/SEC.667}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YenGLD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YuanHLC13, author = {Wei Yuan and Liang Hu and Hongtu Li and Jianfeng Chu}, title = {Secure event signature protocol for peer-to-peer massive multiplayer online games using bilinear pairing}, journal = {Secur. Commun. Networks}, volume = {6}, number = {7}, pages = {881--888}, year = {2013}, url = {https://doi.org/10.1002/sec.627}, doi = {10.1002/SEC.627}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YuanHLC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZaraiDOK13, author = {Faouzi Zarai and Ikbel Daly and Mohammad S. Obaidat and Lotfi Kamoun}, title = {Secured and fast handoff in wireless mesh networks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {5}, pages = {644--657}, year = {2013}, url = {https://doi.org/10.1002/sec.596}, doi = {10.1002/SEC.596}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZaraiDOK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Zhang13, author = {Xinpeng Zhang}, title = {Commutative reversible data hiding and encryption}, journal = {Secur. Commun. Networks}, volume = {6}, number = {11}, pages = {1396--1403}, year = {2013}, url = {https://doi.org/10.1002/sec.742}, doi = {10.1002/SEC.742}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Zhang13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangCC13, author = {Jie Zhang and Chen Chen and Robin Cohen}, title = {Trust modeling for message relay control and local action decision making in VANETs}, journal = {Secur. Commun. Networks}, volume = {6}, number = {1}, pages = {1--14}, year = {2013}, url = {https://doi.org/10.1002/sec.519}, doi = {10.1002/SEC.519}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangWQ13, author = {Lei Zhang and Qianhong Wu and Bo Qin}, title = {Identity-based optimistic fair exchange in the standard model}, journal = {Secur. Commun. Networks}, volume = {6}, number = {8}, pages = {1010--1020}, year = {2013}, url = {https://doi.org/10.1002/sec.652}, doi = {10.1002/SEC.652}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangWQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangYCT13, author = {Mingwu Zhang and Bo Yang and Zhenhua Chen and Tsuyoshi Takagi}, title = {Efficient and adaptively secure broadcast encryption systems}, journal = {Secur. Commun. Networks}, volume = {6}, number = {8}, pages = {1044--1052}, year = {2013}, url = {https://doi.org/10.1002/sec.678}, doi = {10.1002/SEC.678}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangYCT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhaoSWZ13, author = {Hui Zhao and Jonathan Z. Sun and Fengying Wang and Lei Zhao}, title = {A finite equivalence of multisecret sharing based on Lagrange interpolating polynomial}, journal = {Secur. Commun. Networks}, volume = {6}, number = {9}, pages = {1169--1175}, year = {2013}, url = {https://doi.org/10.1002/sec.694}, doi = {10.1002/SEC.694}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhaoSWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhaoWW13, author = {Zongqu Zhao and Junfeng Wang and Chonggang Wang}, title = {An unknown malware detection scheme based on the features of graph}, journal = {Secur. Commun. Networks}, volume = {6}, number = {2}, pages = {239--246}, year = {2013}, url = {https://doi.org/10.1002/sec.524}, doi = {10.1002/SEC.524}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhaoWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Zhioua13, author = {Sami Zhioua}, title = {Tor traffic analysis using Hidden Markov Models}, journal = {Secur. Commun. Networks}, volume = {6}, number = {9}, pages = {1075--1086}, year = {2013}, url = {https://doi.org/10.1002/sec.669}, doi = {10.1002/SEC.669}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/Zhioua13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhuLYXW13, author = {Liehuang Zhu and Dan Liu and Litao Yu and Yuzhou Xie and Mingzhong Wang}, title = {Content integrity and non-repudiation preserving audio-hiding scheme based on robust digital signature}, journal = {Secur. Commun. Networks}, volume = {6}, number = {11}, pages = {1331--1343}, year = {2013}, url = {https://doi.org/10.1002/sec.715}, doi = {10.1002/SEC.715}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhuLYXW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.