


default search action
Security and Communication Networks, Volume 6
Volume 6, Number 1, January 2013
- Jie Zhang, Chen Chen, Robin Cohen:

Trust modeling for message relay control and local action decision making in VANETs. 1-14 - Humphrey Waita Njogu, Jiawei Luo, Jane Nduta Kiere:

Network specific vulnerability based alert reduction approach. 15-27 - Tsu-Yang Wu

, Yuh-Min Tseng:
Further analysis of pairing-based traitor tracing schemes for broadcast encryption. 28-32 - Wei Wang, Ilona Murynets, Jeffrey Bickford, Christopher Van Wart, Gang Xu:

What you see predicts what you get - lightweight agent-based malware detection. 33-48 - Xixiang Lv, Hui Li, Baocang Wang:

Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks. 49-57 - Tao Gong, Bharat K. Bhargava:

Immunizing mobile ad hoc networks against collaborative attacks using cooperative immune model. 58-68 - Zhenhua Liu, Yupu Hu, Xiangsong Zhang, Fagen Li

:
Efficient and strongly unforgeable identity-based signature scheme from lattices in the standard model. 69-77 - Emmanouil Magkos, Markos Avlonitis

, Panayiotis Kotzanikolaou
, Michalis Stefanidakis:
Toward early warning against Internet worms based on critical-sized networks. 78-88 - Yuanzhuo Wang, Jingyuan Li

, Kun Meng, Chuang Lin, Xueqi Cheng:
Modeling and security analysis of enterprise network using attack-defense stochastic game Petri nets. 89-99 - Hsing-Chung Chen:

Secure multicast key protocol for electronic mail systems with providing perfect forward secrecy. 100-107 - Tzung-Her Chen

, Bing-Jian Wang, Tai-Yuan Tu, Chih-Hung Wang:
A security-enhanced key agreement protocol based on chaotic maps. 108-114 - Mehdi Chehel Amirani

, Mohsen Toorani
, Sara Mihandoost:
Feature-based Type Identification of File Fragments. 115-128
Volume 6, Number 2, February 2013
- Laszlo Gyongyosi, Sándor Imre

:
Information geometric security analysis of differential phase-shift quantum key distribution protocol. 129-150
- Hwajeong Seo, Kyung-Ah Shim, Howon Kim:

Performance enhancement of TinyECC based on multiplication optimizations. 151-160 - Hoda Jannati, Mahmoud Salmasizadeh, Javad Mohajeri, Amir Moradi

:
Introducing proxy zero-knowledge proof and utilization in anonymous credential systems. 161-172 - Hongbing Wang, Zhenfu Cao

:
More efficient CCA-secure unidirectional proxy re-encryption schemes without random oracles. 173-181 - Tao Hong, Mao-zhong Song, Yu Liu:

Directional spread-spectrum modulation signal for physical layer security communication applications. 182-193 - Marwan H. Abu-Amara

, Abdulaziz Al-Baiz
, Ashraf S. Mahmoud
, Mohammed H. Sqalli, Farag Azzedin
:
A scalable NAT-based solution to Internet access denial by higher-tier ISPs. 194-209 - Cong Jin, Shu-Wei Jin, Hua-Yong Tan:

Computer virus propagation model based on bounded rationality evolutionary game theory. 210-218 - Haitham S. Al-Sinani

, Chris J. Mitchell
:
Enabling interoperation between Shibboleth and Information Card systems. 219-229 - Guowei Wu, Xiaojie Chen, Mohammad S. Obaidat

, Chi Lin:
A high efficient node capture attack algorithm in wireless sensor network based on route minimum key set. 230-238 - Zongqu Zhao, Junfeng Wang, Chonggang Wang:

An unknown malware detection scheme based on the features of graph. 239-246 - Zi-Yao Cheng, Yun Liu, Chin-Chen Chang, Shih-Chang Chang:

Authenticated RFID security mechanism based on chaotic maps. 247-256
Volume 6, Number 3, March 2013
- Weijia Jia

, Fung Po Tso
, Zhen Ling, Xinwen Fu
, Dong Xuan, Wei Yu
:
Blind detection of spread spectrum flow watermarks. 257-274 - Neminath Hubballi, Santosh Biswas, Sukumar Nandi

:
Towards reducing false alarms in network intrusion detection systems with data summarization technique. 275-285 - Liana Khamis Qabajeh, Miss Laiha Mat Kiah

, Mohammad Moustafa Qabajeh:
A more secure and scalable routing protocol for mobile ad hoc networks. 286-308 - Ciza Thomas:

Improving intrusion detection for imbalanced network traffic. 309-324 - Dongdong Sun, Colin Boyd, Juan Manuel González Nieto:

Predicate encryption for multi-inner-products. 325-339 - Qiong Pu, Jian Wang, Shuhua Wu:

Secure SIP authentication scheme supporting lawful interception. 340-350 - Baodong Qin, Shengli Liu:

Efficient chosen ciphertext secure public-key encryption under factoring assumption. 351-360 - Xuefeng Liu, Yuqing Zhang:

A privacy-preserving acceleration authentication protocol for mobile pay-TV systems. 361-372 - Ch. Aswani Kumar:

Designing role-based access control using formal concept analysis. 373-383
Volume 6, Number 4, April 2013
- Benahmed Khelifa, Madjid Merabti, Hafid Haffaf:

Distributed monitoring for misbehaviour detection in wireless sensor networks. 388-400 - Sanaa Taha, Xuemin (Sherman) Shen

:
ALPP: anonymous and location privacy preserving scheme for mobile IPv6 heterogeneous networks. 401-419 - Paolo Ballarini

, Lynda Mokdad, Quentin Monnet:
Modeling tools for detecting DoS attacks in WSNs. 420-436 - Yesica Imelda Saavedra Benitez, Jalel Ben-Othman

, Jean-Pierre Claudé:
Performance comparison between IBE-HWMP and ECDSA-HWMP. 437-449 - Antonio Corradi

, Mario Fanelli, Luca Foschini
, Marcello Cinque
:
Context data distribution with quality guarantees for Android-based mobile systems. 450-460 - Kashif Kifayat

, Madjid Merabti, Qi Shi
, Sohail Abbas
:
Component-based security system (COMSEC) with QoS for wireless sensor networks. 461-472 - Kaouther Abrougui, Azzedine Boukerche:

Efficient group-based authentication protocol for location-based service discovery in intelligent transportation systems. 473-484 - Yingsong Huang, Shiwen Mao, Yihan Li:

On downlink power allocation for multiuser variable-bit-rate video streaming. 485-497 - Eric Southern, Abdelkader H. Ouda, Abdallah Shami

:
Wireless security: securing mobile UMTS communications from interoperation of GSM. 498-508 - Szymon Szott

, Marek Natkaniec
, Andrzej R. Pach
:
Improving QoS and security in wireless ad hoc networks by mitigating the impact of selfish behaviors: a game-theoretic approach. 509-522 - Soyoung Park, Baber Aslam, Damla Turgut, Cliff Changchun Zou:

Defense against Sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support. 523-538 - Farah I. Kandah

, Yashaswi Singh, Weiyi Zhang, Chonggang Wang:
Mitigating colluding injected attack using monitoring verification in mobile ad-hoc networks. 539-547
Volume 6, Number 5, May 2013
- Namita Tiwari

, Sahadeo Padhye
:
Analysis on the generalization of proxy signature. 549-566
- Mohammed H. Sqalli, Syed Naeem Firdous

, Khaled Salah
, Marwan H. Abu-Amara
:
Classifying malicious activities in Honeynets using entropy and volume-based thresholds. 567-583 - Chi Sing Chum, Xiaowen Zhang:

Hash function-based secret sharing scheme designs. 584-592 - Zuowen Tan:

Efficient pairing-free provably secure identity-based proxy blind signature scheme. 593-601 - Eun-Kyung Ryu, Kee-Young Yoo:

Certificateless broadcast authentication for vehicular ad hoc networks. 602-611 - Jingqiang Lin, Peng Liu, Jiwu Jing, Qiongxiao Wang:

Impossibility of finding any third family of server protocols integrating Byzantine quorum systems with threshold signature schemes. 612-630 - Xiaowei Li, Yuqing Zhang, Geifei Zhang:

A new certificateless authenticated key agreement protocol for SIP with different KGCs. 631-643 - Faouzi Zarai

, Ikbel Daly, Mohammad S. Obaidat
, Lotfi Kamoun:
Secured and fast handoff in wireless mesh networks. 644-657 - Liang Chen, Lansheng Han, Jiandu Jing, Dongping Hu:

A post-quantum provable data possession protocol in cloud. 658-667
Volume 6, Number 6, June 2013
- Osman Khalid, Samee Ullah Khan

, Sajjad Ahmad Madani
, Khizar Hayat
, Majid Iqbal Khan, Nasro Min-Allah
, Joanna Kolodziej
, Lizhe Wang
, Sherali Zeadally, Dan Chen:
Comparative study of trust and reputation systems for wireless sensor networks. 669-688
- Lifei Wei, Zhenfu Cao

, Xiaolei Dong:
Secure identity-based multisignature schemes under quadratic residue assumptions. 689-701 - Suat Ozdemir

, Yang Xiao
:
FTDA: outlier detection-based fault-tolerant data aggregation for wireless sensor networks. 702-710 - Xiaowei Li

, Yuqing Zhang:
A simple and robust anonymous two-factor authenticated key exchange protocol. 711-722 - Chang Xu

, Hua Guo, Zhoujun Li, Yi Mu:
New construction of affiliation-hiding authenticated group key agreement. 723-734 - B. R. Purushothama

, B. B. Amberker:
Secure group and multi-layer group communication schemes based on polynomial interpolation. 735-756 - Tzong-Sun Wu, Han-Yu Lin:

A novel probabilistic signature based on bilinear square Diffie-Hellman problem and its extension. 757-764 - Che-Jen Hsieh, Jung-Shian Li, Wei-Cheng Liu:

Digital evidence collection for web image access. 765-776 - Xiaonan Wang, Yi Mu:

A secure IPv6 address configuration scheme for a MANET. 777-789 - Zhenzhou Guo, Mingchu Li, Xinxin Fan:

Attribute-based ring signcryption scheme. 790-796
Volume 6, Number 7, July 2013
- Mansour Sheikhan

, Maryam Sharifi Rad:
Using particle swarm optimization in fuzzy association rules-based feature selection and fuzzy ARTMAP-based attack recognition. 797-811 - Seongan Lim, Juhee Lee, Youngjoo An:

Key exposure free chameleon hash schemes based on discrete logarithm problem. 812-817 - Deguang Kong, Donghai Tian, Qiha Pan, Peng Liu, Dinghao Wu:

Semantic aware attribution analysis of remote exploits. 818-832 - Alina Olteanu

, Yang Xiao
, Jing Liu, Thomas M. Chen
, C. L. Philip Chen
:
Nonintrusive tracing in the Internet. 833-843 - Chia-Mei Chen, Sheng-Tzong Cheng, Ruei-Yu Zeng:

A proactive approach to intrusion detection and malware collection. 844-853 - Zuowen Tan:

A communication and computation-efficient three-party authenticated key agreement protocol. 854-863 - Shahriyar Mohammadi, Mohammad Hussein Sherkat, Mona Jamporazmey:

A taxonomy framework based on ITU-TX-805 security architecture for quantitative determination of computer network vulnerabilities. 864-880 - Wei Yuan, Liang Hu, Hongtu Li, Jianfeng Chu:

Secure event signature protocol for peer-to-peer massive multiplayer online games using bilinear pairing. 881-888 - Huan Yang, Yuqing Zhang, Yu-pu Hu, Qixu Liu:

IKE vulnerability discovery based on fuzzing. 889-901 - Meijiao Duan, Jing Xu, Dengguo Feng:

Efficient identity-based strong designated verifier signature schemes. 902-911 - Lize Gu, Licheng Wang, Kaoru Ota

, Mianxiong Dong
, Zhenfu Cao
, Yixian Yang:
New public key cryptosystems based on non-Abelian factorization problems. 912-922
Volume 6, Number 8, August 2013
- Gianmarco Baldini, Igor Nai Fovino, Stefano Braghin

, Alberto Trombetta
:
Distributed access control policies for spectrum sharing. 925-935 - Lin Ding

, Jie Guan:
Cryptanalysis of MICKEY family of stream ciphers. 936-941 - Xiannuan Liang, Yang Xiao

, Suat Ozdemir
, Athanasios V. Vasilakos
, Hongmei Deng:
Cipher feedback mode under go-back-N and selective-reject protocols in error channels. 942-954 - Yi-Ning Liu

, Jihong Yan:
A lightweight micropayment scheme based on Lagrange interpolation formula. 955-960 - Fatiha Djebbar

, Beghdad Ayad, Karim Abed-Meraim, Habib Hamam
:
Unified phase and magnitude speech spectra data hiding algorithm. 961-971 - Chin-Chen Chang, Shih-Chang Chang, Jen-Ho Yang:

A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment. 972-984 - Jingwei Li

, Chunfu Jia, Zheli Liu, Zongqing Dong:
Cycle-walking revisited: consistency, security, and efficiency. 985-992 - Hung-Yu Chien, Chin-I Lee, Tzong-Chen Wu:

Comments on IMBAS: identity-based multi-user broadcast authentication in wireless sensor networks. 993-998 - Mahdi R. Alagheband, Mohammad Reza Aref:

Unified privacy analysis of new-found RFID authentication protocols. 999-1009 - Lei Zhang, Qianhong Wu, Bo Qin:

Identity-based optimistic fair exchange in the standard model. 1010-1020 - Chih-Ta Yen, Ming-Huang Guo, Nai-Wei Lo, Der-Jiunn Deng:

Authentication with low-cost RFID tags in mobile networks. 1021-1027 - Yan-Xiao Liu, Yuqing Zhang, Lein Harn, Yu-pu Hu:

Verifiable symmetric polynomial-based key distribution schemes. 1028-1034 - Ming-Huang Guo, Horng-Twu Liaw, Der-Jiunn Deng, Han-Chieh Chao

:
Centralized group key management mechanism for VANET. 1035-1043 - Mingwu Zhang, Bo Yang, Zhenhua Chen, Tsuyoshi Takagi:

Efficient and adaptively secure broadcast encryption systems. 1044-1052
Volume 6, Number 9, September 2013
- Manish Kumar Thukral

, Karma Sonam Sherpa:
Chaotic modulation-based spread spectrum communication using complex dynamics of chaotic DC-DC current mode controlled boost converter. 1053-1063 - Wenjuan An, Mangui Liang:

A new intrusion detection method based on SVM with minimum within-class scatter. 1064-1074 - Sami Zhioua

:
Tor traffic analysis using Hidden Markov Models. 1075-1086 - Nor Badrul Anuar

, Maria Papadaki
, Steven Furnell
, Nathan L. Clarke
:
Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM). 1087-1116 - Fei Peng, Chen Li, Min Long:

A reversible watermark scheme for 2D vector map based on reversible contrast mapping. 1117-1125 - Xinxin Fan, Mingchu Li, Hui Zhao, Xiaodong Chen, Zhenzhou Guo, Dong Jiao, Weifeng Sun:

Peer cluster: a maximum flow-based trust mechanism in P2P file sharing networks. 1126-1142 - Ang Gao, Zengzhi Li:

Free global ID against collusion attack on multi-authority attribute-based encryption. 1143-1152 - Chithra Selvaraj

, Sheila Anand:
Outlier detection in reputation management system for P2P networks using rough set theory. 1153-1160 - Her-Tyan Yeh

, Bing-Chang Chen, Yi-Cong Wu:
Mobile user authentication system in cloud environment. 1161-1168 - Hui Zhao, Jonathan Z. Sun, Fengying Wang, Lei Zhao:

A finite equivalence of multisecret sharing based on Lagrange interpolating polynomial. 1169-1175
Volume 6, Number 10, October 2013
- Pablo Najera, Rodrigo Roman, Javier López

:
User-centric secure integration of personal RFID tags and sensor networks. 1177-1197 - Juliano F. Kazienko

, Igor Cesar Gonzalez Ribeiro, Igor M. Moraes, Célio Vinicius N. de Albuquerque
:
SENSORLock: a lightweight key management scheme for wireless sensor networks. 1198-1210 - Hichem Sedjelmaci, Sidi-Mohammed Senouci

, Mohammed Feham:
An efficient intrusion detection framework in cluster-based wireless sensor networks. 1211-1224 - Han-Wei Hsiao, Huey-Min Sun, Wei-Cheng Fan:

Detecting stepping-stone intrusion using association rule mining. 1225-1235 - Xiaoqi Jia, Rui Wang

, Jun Jiang, Shengzhi Zhang
, Peng Liu:
Defending return-oriented programming based on virtualization techniques. 1236-1249 - Tung-Tso Tsai, Yuh-Min Tseng, Tsu-Yang Wu

:
Provably secure revocable ID-based signature in the standard model. 1250-1260 - Chien-Chang Yang, Kuo-Jui Wei, Bo Li, Jung-San Lee:

HORME: hierarchical-object-relational medical management for electronic record. 1261-1270 - Chih-Hung Chao, Ching-Fang Yang, Po-Ting Lin, Jung-Shian Li:

Novel distributed key revocation scheme for wireless sensor networks. 1271-1280 - Wenbo Shi:

A sealed-bid multi-attribute auction protocol with strong bid privacy and bidder privacy. 1281-1289 - Zongmin Cui, Hong Zhu

, Lianhua Chi:
Lightweight key management on sensitive data in the cloud. 1290-1299
Volume 6, Number 11, November 2013
- Iraj Sadegh Amiri

, Mehrnaz Nikmaram, Ali Shahidinejad
, Jalil Ali:
Generation of potential wells used for quantum codes transmission via a TDMA network communication system. 1301-1309 - Mohsen Sharifi

, Hadi Salimi, Ebrahim Asadi:
Alamut: a high-performance network intrusion detection system in support of virtualized environments. 1310-1318 - Jingbo Yan, Yuqing Zhang, Dingning Yang:

Structurized grammar-based fuzz testing for programs with highly structured inputs. 1319-1330 - Liehuang Zhu, Dan Liu, Litao Yu, Yuzhou Xie, Mingzhong Wang

:
Content integrity and non-repudiation preserving audio-hiding scheme based on robust digital signature. 1331-1343 - Syh-Yuan Tan, Zhe Jin, Andrew Beng Jin Teoh

:
Argument on biometrics identity-based encryption schemes. 1344-1352 - Tian-Fu Lee, I-Pin Chang

, Ching-Cheng Wang:
Efficient three-party encrypted key exchange using trapdoor functions. 1353-1358 - Bin Wang, Qing Zhao:

Server-aided batch verification signature schemes in the multiple-signer setting. 1359-1366 - Amrita Ghosal

, Sipra Das Bit
:
A jamming-attack-defending data forwarding scheme based on channel surfing in wireless sensor networks. 1367-1388 - Abhishek Parakh:

A probabilistic quantum key transfer protocol. 1389-1395 - Xinpeng Zhang:

Commutative reversible data hiding and encryption. 1396-1403 - Tian-Fu Lee:

User authentication scheme with anonymity, unlinkability and untrackability for global mobility networks. 1404-1413
- Wojciech Mazurczyk, Krzysztof Szczypiorski, Hui Tian, Yali Liu:

Trends in modern information hiding: techniques, applications and detection. 1414-1415
Volume 6, Number 12, December 2013
- Devrim Unal

, M. Ufuk Çaglayan
:
XFPM-RBAC: XML-based specification language for security policies in multidomain mobile networks. 1420-1444 - Dichao Peng, Wei Chen, Qunsheng Peng:

TrustVis: visualizing trust toward attack identification in distributed computing environments. 1445-1459 - Fatemeh Raji

, Ali Miri, Mohammad Davarpanah Jazi, Behzad Malek:
DEFF: a new architecture for private online social networks. 1460-1470 - Zhiwei Wang:

Improved group key transfer protocols from the protocol of Harn et al. 1471-1477 - Elias Bou-Harb

, Makan Pourzandi, Mourad Debbabi
, Chadi Assi:
A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks. 1478-1489 - Hung-Yu Chien, Chu-Sing Yang, Hung-Pin Hou:

Non-linearity cannot help RFID resist full-disclosure attacks and terrorist fraud attacks. 1490-1495 - Behzad Malek, Ali Miri:

Chaotic masking for securing RFID systems against relay attacks. 1496-1508 - He Liu, Mangui Liang:

Efficient identity-based hierarchical access authentication protocol for mobile network. 1509-1521
- Peng Liu, Refik Molva

, Jiwu Jing:
Special issue on "security and privacy in pervasive and ubiquitous computing and communication systems". 1522-1523
- Issa Khalil

, Saurabh Bagchi, Najah AbuAli
, Mohammad Hayajneh
:
DISA: Detection and isolation of sneaky attackers in locally monitored multi-hop wireless networks. 1524-1538 - Bazara I. A. Barry, H. Anthony Chan:

Architecture and performance evaluation of a hybrid intrusion detection system for IP telephony. 1539-1555 - Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim

:
Attacking the kad network - real world evaluation and high fidelity simulation using DVN. 1556-1575 - Abhijit Bose, Kang G. Shin:

Agent-based modeling of malware dynamics in heterogeneous environments. 1576-1589 - Shawn Embleton, Sherri Sparks, Cliff Changchun Zou:

SMM rootkit: a new breed of OS independent malware. 1590-1605

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














