Printer Friendly

Articles from Security and Communication Networks (January 1, 2017)

1-146 out of 146 article(s)
Title Author Type Words
1-Resilient Boolean Functions on Even Variables with Almost Perfect Algebraic Immunity. Han, Gang; Yu, Yu; Li, Xiangxue; Zhou, Qifeng; Zheng, Dong; Li, Hui Report 6097
A Chaos-Based Authenticated Cipher with Associated Data. The, Je Sen; Samsudin, Azman Report 10248
A Cloud-User Protocol Based on Ciphertext Watermarking Technology. Liu, Keyang; Zhang, Weiming; Dong, Xiaojuan Report 7839
A Collaborative Approach for Monitoring Nodes Behavior during Spectrum Sensing to Mitigate Multiple Attacks in Cognitive Radio Networks. Khasawneh, Mahmoud; Agarwal, Anjali Report 12015
A Comparative Evaluation of Algorithms in the Implementation of an Ultra-Secure Router-to-Router Key Exchange System. Parmar, Nishaal J.; Verma, Pramode K. Report 5532
A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT. Sharma, Vishal; Lee, Kyungroul; Kwon, Soonhyun; Kim, Jiyoon; Park, Hyungjoon; Yim, Kangbin; Lee, Sun Report 14512
A Fusion of Multiagent Functionalities for Effective Intrusion Detection System. Sadhasivan, Dhanalakshmi Krishnan; Balasubramanian, Kannapiran Report 8573
A Hybrid Chaotic and Number Theoretic Approach for Securing DICOM Images. Chandrasekaran, Jeyamala; Thiruvengadam, S.J. Report 6120
A Low-Complexity Region-Based Authentication Algorithm for 3D Polygonal Models. Tsai, Yuan-Yu; Cheng, Tsung-Chieh; Huang, Yao-Hsien Report 6094
A Multidomain Survivable Virtual Network Mapping Algorithm. Xiao, Xiancui; Zheng, Xiangwei; Zhang, Yuang Report 6456
A New Approach for Delivering Customized Security Everywhere: Security Service Chain. Liu, Yi; Zhang, Hong-qi; Liu, Jiang; Yang, Ying-jie Report 12555
A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT. Zhang, Guoyin; Kou, Liang; Zhang, Liguo; Liu, Chao; Da, Qingan; Sun, Jianguo Report 6996
A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace. Wu, Fusheng; Zhang, Huanguo; Wang, Wengqing; Jia, Jianwei; Yuan, Shi Report 9727
A Novel Construction of Substitution Box Involving Coset Diagram and a Bijective Map. Razaq, Abdul; Yousaf, Awais; Shuaib, Umer; Siddiqui, Nasir; Ullah, Atta; Waheed, Adil Report 7976
A Novel Design of Membership Authentication and Group Key Establishment Protocol. Ham, Lein; Hsu, Ching-Fang Report 5429
A Novel Fuzzy Encryption Technique Based on Multiple Right Translated AES Gray S-Boxes and Phase Embedding. Azam, Naveed Ahmed Report 3824
A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives. Vorakulpipat, Chalee; Sirapaisan, Soontorn; Rattanalerdnusorn, Ekkachan; Savangsuk, Visut Report 8771
A Privacy Model for RFID Tag Ownership Transfer. Yang, Xingchun; Xu, Chunxiang; Li, Chaorong Report 8526
A Secure Steganographic Algorithm Based on Frequency Domain for the Transmission of Hidden Information. Soria-Lorente, A.; Berres, S. Report 8774
A Secured Load Mitigation and Distribution Scheme for Securing SIP Server. Ganesan, Vennila; Manikandan, MSK Report 7302
A Security and Efficient Routing Scheme with Misbehavior Detection in Delay-Tolerant Networks. Li, Feng; Si, Yali; Lu, Ning; Chen, Zhen; Shen, Limin Report 11222
A Survey on Secure Wireless Body Area Networks. Zou, Shihong; Xu, Yanhong; Wang, Honggang; Li, Zhouzhou; Chen, Shanzhi; Hu, Bo Report 5354
A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments. Amin, Ruhul; Islam, SK Hafizul; Khan, Muhammad Khurram; Karati, Arijit; Giri, Debasis; Kumari, Saru Report 9351
ABS-TrustSDN: An Agent-Based Simulator of Trust Strategies in Software-Defined Networks. Garcia-Magarino, Ivan; Lacuesta, Raquel Report 5517
Adaptive PVD Steganography Using Horizontal, Vertical, and Diagonal Edges in Six-Pixel Blocks. Pradhan, Anita; Sekhar, K. Raja; Swain, Gandharba Report 5884
Adaptive Security of Broadcast Encryption, Revisited. Zhu, Bingxin; Wei, Puwen; Wang, Mingqiang Report 10815
Adaptive Steganalysis Based on Selection Region and Combined Convolutional Neural Networks. Hu, Donghui; Shen, Qiang; Zhou, Shengnan; Liu, Xueliang; Fan, Yuqi; Wang, Lina Report 5537
An ECC-Based Blind Signcryption Scheme for Multiple Digital Documents. Tsai, Chien-Hua; Su, Pin-Chang Report 10708
An Edge Correlation Based Differentially Private Network Data Release Method. Lu, Junling; Cai, Zhipeng; Wang, Xiaoming; Zhang, Lichen; Duan, Zhuojun Report 8529
An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model. Zhou, Guomin; Zeng, Peng; Yuan, Xiaohui; Chen, Siyuan; Choo, Kim-Kwang Raymond Report 5907
An Efficient Context-Aware Privacy Preserving Approach for Smartphones. Zhang, Lichen; Li, Yingshu; Wang, Liang; Lu, Junling; Li, Peng; Wang, Xiaoming Report 8719
An Efficient Secret Key Homomorphic Encryption Used in Image Processing Service. Yang, Pan; Gui, Xiaolin; An, Jian; Tian, Feng Report 7890
An Improved Privacy-Preserving Framework for Location-Based Services Based on Double Cloaking Regions with Supplementary Information Constraints. Kuang, Li; Wang, Yin; Ma, Pengju; Yu, Long; Li, Chuanbin; Huang, Lan; Zhu, Mengyao Report 7708
An SDN-Based Authentication Mechanism for Securing Neighbor Discovery Protocol in IPv6. Lu, Yiqin; Wang, Meng; Huang, Pengsen Report 6381
An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks. Zhao, Zheng; Liu, Fenlin; Gong, Daofu Report 8542
Android Rooting: An Arms Race between Evasion and Detection. Nguyen-Vu, Long; Chau, Ngoc-Tu; Kang, Seongeun; Jung, Souhwan Report 8622
Authenticated Location-Aware Publish/Subscribe Services in Untrusted Outsourced Environments. Yan, Han; Cheng, Xiang; Su, Sen; Zhang, Siyao Report 11237
Automatic Reverse Engineering of Private Flight Control Protocols of UAVs. Ji, Ran; Wang, Jian; Tang, Chaojing; Li, Ruilin Report 5111
Automatic Test Pattern Generator for Fuzzing Based on Finite State Machine. Wang, Ming-Hung; Wang, Han-Chi; Chen, You-Ru; Lei, Chin-Laung Report 7599
BAS: The Biphase Authentication Scheme for Wireless Sensor Networks. Riaz, Rabia; Chung, Tae-Sun; Rizvi, Sanam Shahla; Yaqub, Nazish Report 6729
BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications. Shehada, Dina; Yeun, Chan Yeob; Zemerly, M. Jamal; Qutayri, Mahmoud Al; Hammadi, Yousof Al; Damiani, Report 11060
Building Secure Public Key Encryption Scheme from Hidden Field Equations. Ping, Yuan; Wang, Baocang; Yang, Yuehua; Tian, Shengli Report 4115
Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings. Zhou, Caixue; Zhao, Zhiqiang; Zhou, Wan; Mei, Yuan Report 15158
Certificateless Public Auditing Protocol with Constant Verification Time. Kim, Dongmin; Jeong, Ik Rae Report 12354
CHAOS: An SDN-Based Moving Target Defense System. Shi, Yuan; Zhang, Huanguo; Wang, Juan; Xiao, Feng; Huang, Jianwei; Zha, Daochen; Hu, Hongxin; Yan, F Report 7469
CLAS: A Novel Communications Latency Based Authentication Scheme. Dou, Zuochao; Khalil, Issa; Khreishah, Abdallah Report 12908
Cloud Service Scheduling Algorithm Research and Optimization. Cui, Hongyan; Liu, Xiaofei; Yu, Tao; Zhang, Honggang; Fang, Yajun; Xia, Zongguo Report 4020
Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment. Mao, Jian; Tian, Wenqian; Zhang, Yan; Cui, Jian; Ma, Hanjun; Bian, Jingdong; Liu, Jianwei; Zhang, Ji Report 7906
Computing Adaptive Feature Weights with PSO to Improve Android Malware Detection. Xu, Yanping; Wu, Chunhua; Zheng, Kangfeng; Wang, Xu; Niu, Xinxin; Lu, Tianliang Report 9287
Corrigendum to "Research on a New Signature Scheme on Blockchain". Yuan, Chao; Xu, Mi-xue; Si, Xue-ming Correction notice 102
CP-ABE Access Control Scheme for Sensitive Data Set Constraint with Hidden Access Policy and Constraint Policy. Helil, Nurmamat; Rahman, Kaysar Report 10616
Cryptanalysis of Three Password-Based Remote User Authentication Schemes with Non-Tamper-Resistant Smart Card. Wang, Chenyu; Xu, Guoai Report 12161
Cybersecurity Vulnerability Analysis of the PLC PRIME Standard. Simo, Miguel Seijo; Lopez, Gregorio Lopez; Novella, Jose Ignacio Moreno Report 12330
Data Placement for Privacy-Aware Applications over Big Data in Hybrid Clouds. Xu, Xiaolong; Zhao, Xuan; Ruan, Feng; Zhang, Jie; Tian, Wei; Dou, Wanchun; Liu, Alex X. Report 9283
Deniable Key Establishment Resistance against eKCI Attacks. (Research Article). Krzywiecki, Aukasz; Wlislocki, Tomasz Report 9556
Design and Analysis of Self-Healing Tree-Based Hybrid Spectral Amplitude Coding OCDMA System. Imtiaz, Waqas A.; Qamar, Affaq; Ur Rehman, Atiq; Ali, Haider; Chaudhry, Adnan Rashid; Iqbal, Javed Report 7703
Detecting Web-Based Botnets Using Bot Communication Traffic Features. Hsu, Fu-Hau; Ou, Chih-Wen; Hwang, Yan-Ling; Chang, Ya-Ching; Lin, Po-Ching Report 8364
Differential Privacy for Edge Weights in Social Networks. Li, Xiaoye; Yang, Jing; Sun, Zhenlong; Zhang, Jianpei Report 6027
Digital Implementation of an Improved LTE Stream Cipher Snow-3G Based on Hyperchaotic PRNG. Madani, Mahdi; Benkhaddra, Ilyas; Tanougast, Camel; Chitroub, Salim; Sieler, Loic Report 8842
Dynamic Rule Encryption for Mobile Payment. Husni, Emir Report 6422
Efficient Anonymous Authenticated Key Agreement Scheme for Wireless Body Area Networks. Li, Tong; Zheng, Yuhui; Zhou, Ti Report 6066
Efficient Asymmetric Index Encapsulation Scheme for Anonymous Content Centric Networking. Ma, Rong; Cao, Zhenfu; Wang, Xingkai Report 6310
Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption. Han, Shuai; Liu, Shengli; Lyu, Lin Report 21192
Efficient Secure Multiparty Subset Computation. Zhou, Sufang; Li, Shundong; Dou, Jiawei; Geng, Yaling; Liu, Xin Report 9762
Efficient Solutions to Two-Party and Multiparty Millionaires' Problem. Liu, Xin; Li, Shundong; Chen, XiuBo; Xu, Gang; Zhang, Xiaolin; Zhou, Yong Report 8985
Efficient Two-Step Protocol and Its Discriminative Feature Selections in Secure Similar Document Detection. Kim, Sang-Pil; Gil, Myeong-Sun; Kim, Hajin; Choi, Mi-Jung; Moon, Yang-Sae; Won, Hee-Sun Report 8719
Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing. Hussain, Mohammed Abdulridha; Jin, Hai; Hussien, Zaid Alaa; Abduljabbar, Zaid Ameen; Abbdal, Salah H Report 10407
Erratum to "An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model". Zhou, Guomin; Zeng, Peng; Yuan, Xiaohui; Chen, Siyuan; Choo, Kim-Kwang Raymond Correction notice 191
F-DDIA: A Framework for Detecting Data Injection Attacks in Nonlinear Cyber-Physical Systems. Wang, Jingxuan; Hui, Lucas C.K.; Yiu, S.M.; Zhou, Gang; Zhang, Ruoqing Report 6760
Fault Attack on the Authenticated Cipher ACORN v2. Zhang, Xiaojuan; Feng, Xiutao; Lin, Dongdai Report 11484
GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack Detection in WSN. Gunasekaran, Mahalakshmi; Periakaruppan, Subathra Report 5079
Group Authentication with Multiple Trials and Multiple Authentications. Chien, Hung-Yu Report 5364
Hierarchical Group Based Mutual Authentication and Key Agreement for Machine Type Communication in LTE and Future 5G Networks. Roychoudhury, Probidita; Roychoudhury, Basav; Saikia, Dilip Kumar Report 14465
How to Share Secret Efficiently over Networks. Ham, Lein; Hsu, Ching-Fang; Xia, Zhe; Zhou, Junwei Report 5250
Identification of ICS Security Risks toward the Analysis of Packet Interaction Characteristics Using State Sequence Matching Based on SF-FSM. Xu, Jianxin; Feng, Dongqin Report 10567
Improved Biclique Cryptanalysis of the Lightweight Block Cipher Piccolo. Han, Guoyong; Zhang, Wenying Report 6165
Improved Instance Selection Methods for Support Vector Machine Speed Optimization. Akinyelu, Andronicus A.; Adewumi, Aderemi O. Report 7147
Improvements for Finding Impossible Differentials of Block Cipher Structures. Luo, Yiyuan; Lai, Xuejia Report 7563
Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User. Moon, Jongho; Lee, Youngsook; Kim, Jiye; Won, Dongho Report 10303
LEPA: A Lightweight and Efficient Public Auditing Scheme for Cloud-Assisted Wireless Body Sensor Networks. Li, Song; Cui, Jie; Zhong, Hong; Zhang, Yiwen; He, Qiang Report 11543
Locality-Based Visual Outlier Detection sAlgorithm for Time Series. Li, Zhihua; Li, Ziyuan; Yu, Ning; Wen, Steven Report 6620
Location Privacy Leakage through Sensory Data. Liang, Yi; Cai, Zhipeng; Han, Qilong; Li, Yingshu Report 9536
Low-Rate DDoS Attack Detection Using Expectation of Packet Size. Zhou, Lu; Liao, Mingchao; Yuan, Cao; Zhang, Haoyu Report 9489
Malware Propagation and Prevention Model for Time-Varying Community Networks within Software Defined Networks. Liu, Lan; Ko, Ryan K.L.; Ren, Guangming; Xu, Xiaoping Report 6091
Mlifdect: Android Malware Detection Based on Parallel Machine Learning and Information Fusion. Wang, Xin; Zhang, Dafang; Su, Xin; Li, Wenjia Report 8054
Multiuser Searchable Encryption with Token Freshness Verification. Sharma, Dhruti; Jinwala, Devesh C. Report 12294
MUSE: An Efficient and Accurate Verifiable Privacy-Preserving Multikeyword Text Search over Encrypted Cloud Data. Xiangyang, Zhu; Hua, Dai; Xun, Yi; Geng, Yang; Xiao, Li Report 12450
Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders. Yu, Yang; Long, Jun; Cai, Zhiping Report 6009
Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications. Dalai, Asish Kumar; Jena, Sanjay Kumar Report 8115
New Hybrid Features Selection Method: A Case Study on Websites Phishing. Rajab, Khairan D. Case study 7485
New Linear Cryptanalysis of Chinese Commercial Block Cipher Standard SM4. Liu, Yu; Liang, Huicong; Wang, Wei; Wang, Meiqin Report 6522
NFC Secure Payment and Verification Scheme with CS E-Ticket. Fan, Kai; Song, Panfei; Du, Zhao; Zhu, Haojin; Li, Hui; Yang, Yintang; Li, Xinghua; Yang, Chao Report 5742
Noncooperative 802.11 MAC Layer Fingerprinting and Tracking of Mobile Devices. Robyns, Pieter; Bonne, Bram; Quax, Peter; Lamotte, Wim Report 16442
Noninteractive Verifiable Outsourcing Algorithm for Bilinear Pairing with Improved Checkability. Ren, Yanli; Dong, Min; Niu, Zhihua; Du, Xiaoni Report 6389
Novel Noncommutative Cryptography Scheme Using Extra Special Group. Kumar, Gautam; Saini, Hemraj Report 12931
Optimization of a Blind Speech Watermarking Technique against Amplitude Scaling. Nematollahi, Mohammad Ali; Vorakulpipat, Chalee; Rosales, Hamurabi Gamboa Report 6328
Parameterization of LSB in Self-Recovery Speech Watermarking Framework in Big Data Mining. Li, Shuo; Song, Zhanjie; Lu, Wenhuan; Sun, Daniel; Wei, Jianguo Report 6101
Pattern Extraction Algorithm for NetFlow-Based Botnet Activities Detection. Kozik, Rafal; Choras, Michal Report 6837
Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems. Pereira, Geovandro C.C.F.; Alves, Renan C.A.; da Silva, Felipe L.; Azevedo, Roberto M.; Albertini, B Report 10469
Performance-Based Comparative Assessment of Open Source Web Vulnerability Scanners. Alsaleh, Mansour; Alomar, Noura; Alshreef, Monirah; Alarifi, Abdulrahman; Salman, AbdulMalik Al- Report 11142
Phishing Detection: Analysis of Visual Similarity Based Approaches. Jain, Ankit Kumar; Gupta, B.B. Report 11896
PMCAP: A Threat Model of Process Memory Data on the Windows Operating System. Pan, Jiaye; Zhuang, Yi Report 10541
PMDP: A Framework for Preserving Multiparty Data Privacy in Cloud Computing. Li, Ji; Wei, Jianghong; Liu, Wenfen; Hu, Xuexian Report 10745
Practical Implementation of an Adaptive Detection-Defense Unit against Link Layer DoS Attacks for Wireless Sensor Networks. Dener, Murat; Bay, Omer Faruk Report 4885
Practical m-k-Anonymization for Collaborative Data Publishing without Trusted Third Party. Hua, Jingyu; Tang, An; Pan, Qingyun; Choo, Kim-Kwang Raymond; Ding, Hong; Ren, Yizhi Report 7015
Predictive Abuse Detection for a PLC Smart Lighting Network Based on Automatically Created Models of Exponential Smoothing. Andrysiak, Tomasz; Saganowski, Aukasz; Kiedrowski, Piotr Report 14587
Privacy Preserved Self-Awareness on the Community via Crowd Sensing. Fan, Huiting; Xing, Kai; Tan, Lei; Rui, Weikang; Xu, Zhonghu; Zhang, Shuo; Xu, Jing Report 4085
Privacy-Preserving Biometric Authentication: Challenges and Directions. Pagnin, Elena; Mitrokotsa, Aikaterini Report 6478
Privacy-Preserving k-Means Clustering under Multiowner Setting in Distributed Cloud Environments. Rong, Hong; Wang, Huimei; Liu, Jian; Hao, Jialu; Xian, Ming Report 13479
Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud. Tu, Tengfei; Rao, Lu; Zhang, Hua; Wen, Qiaoyan; Xiao, Jia Report 13407
Protecting Information with Subcodstanography. Kohler, Mirko; Lukic, Ivica; Cik, Visnja Krizanovic Report 8130
Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth. Liu, Yujia; Zhang, Weiming; Yu, Nenghai Report 8422
Protecting Private Data by Honey Encryption. Yin, Wei; Indulska, Jadwiga; Zhou, Hongjian Report 6314
Quantitative Method for Network Security Situation Based on Attack Prediction. Hu, Hao; Zhang, Hongqi; Liu, Yuling; Wang, Yongwei Report 13597
Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment. Asif, Rameez; Buchanan, William J. Report 5735
Relay Selections for Security and Reliability in Mobile Communication Networks over Nakagami-m Fading Channels. Huang, Hongji; Sun, Wanyou; Yang, Jie; Gui, Guan Report 3762
Remotely Exploiting AT Command Attacks on ZigBee Networks. Vaccari, Ivan; Cambiaso, Enrico; Aiello, Maurizio Report 6949
Research on a New Signature Scheme on Blockchain. Yuan, Chao; Xu, Mi-xue; Si, Xue-ming Report 7795
Research on Secure Localization Model Based on Trust Valuation in Wireless Sensor Networks. Li, Peng; Yu, Xiaotian; Xu, He; Qian, Jiewei; Dong, Lu; Nie, Huqing Report 6653
Research on the Effectiveness Evaluation Model of the Prison Physical Protection System Based on Grey Analytic Hierarchy Process. Yin, Ke Report 5837
Revocable ID-Based Signature with Short Size over Lattices. Hung, Ying-Hao; Tseng, Yuh-Min; Huang, Sen-Shan Report 8043
Revocable Key-Aggregate Cryptosystem for Data Sharing in Cloud. Gan, Qingqing; Wang, Xiaoming; Wu, Daini Report 8778
RFA: R-Squared Fitting Analysis Model for Power Attack. Wang, An; Zhang, Yu; Zhu, Liehuang; Tian, Weina; Xu, Rixin; Zhang, Guoshuang Report 4900
SCPR: Secure Crowdsourcing-Based Parking Reservation System. Wan, Changsheng; Zhang, Juan; Huang, Daoli Report 7909
Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities. Huang, Qinlong; Wang, Licheng; Yang, Yixian Report 8302
Security Analysis of a Certificateless Signature from Lattices. Chang, Seunghwan; Lee, Hyang-Sook; Lee, Juhee; Lim, Seongan Report 5113
Security and Privacy in Emerging Wireless Networks. Yang, Qing; Lu, Rongxing; Challal, Yacine; Laurent, Maryline Editorial 899
Segmentation Based Video Steganalysis to Detect Motion Vector Modification. Wang, Peipei; Zhao, Yun Cao Xianfeng Report 5726
Semantically Secure Symmetric Encryption with Error Correction for Distributed Storage. Partala, Juha Report 8595
Shorter Decentralized Attribute-Based Encryption via Extended Dual System Groups. Zhang, Jie; Chen, Jie; Ge, Aijun; Ma, Chuangui Report 7542
Similarity Digest Search: A Survey and Comparative Analysis of Strategies to Perform Known File Filtering Using Approximate Matching. Moia, Vitor Hugo Galhardo; Henriques, Marco Aurelio Amaral Report 14414
Stackelberg Interdependent Security Game in Distributed and Hierarchical Cyber-Physical Systems. Shen, Jiajun; Feng, Dongqin Report 12712
Strong Designated Verifier Signature Schemes with Undeniable Property and Their Applications. Hu, Xiaoming; Tan, Wenan; Xu, Huajie; Wang, Jian; Ma, Chuang Report 7319
Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC. Yang, Wenjie; Weng, Jian; Luo, Weiqi; Yang, Anjia Report 6461
The Concept Drift Problem in Android Malware Detection and Its Solution. Hu, Donghui; Ma, Zhongjin; Zhang, Xiaotian; Li, Peipei; Ye, Dengpan; Ling, Baohong Report 8603
The Performance Evaluation of an IEEE 802.11 Network Containing Misbehavior Nodes under Different Backoff Algorithms. Hoang, Trong-Minh; Bui, Van-Kien; Nguyen, Thanh-Tra Report 3865
Thwarting Nonintrusive Occupancy Detection Attacks from Smart Meters. Man, Dapeng; Yang, Wu; Xuan, Shichang; Du, Xiaojiang Report 6120
Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems. Zhao, Ju-min; Feng, Ding; Li, Deng-ao; Gong, Wei; Liu, Hao-xiang; Huo, Shi- min Report 7309
Towards Large-Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends. Iturbe, Mikel; Garitano, Inaki; Zurutuza, Urko; Uribeetxeberria, Roberto Report 13811
Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker. Wazan, Ahmad Samer; Laborde, Romain; Chadwick, David W.; Barrere, Francois; Benzekri, Abdelmalek; Ka Report 16951
Trusted Service Scheduling and Optimization Strategy Design of Service Recommendation. Xia, Xiaona; Yu, Jiguo; Zhang, Shanshan; Wu, Shu Report 5173
Two-Phase Image Encryption Scheme Based on FFCT and Fractals. Mikhail, Mervat; Abouelseoud, Yasmine; ElKobrosy, Galal Report 7387
Utilizing the Double-Precision Floating-Point Computing Power of GPUs for RSA Acceleration. Dong, Jiankuo; Zheng, Fangyu; Pan, Wuqiong; Lin, Jingqiang; Jing, Jiwu; Zhao, Yuan Report 10451
Vague Sets Security Measure for Steganographic System Based on High-Order Markov Model. Ouyang, Chun-Juan; Leng, Ming; Xia, Jie-Wu; Liu, Huan Report 6745
Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length. Li, Jiguo; Sha, Fengjie; Zhang, Yichen; Huang, Xinyi; Shen, Jian Report 7981
Visible Watermarking Technique Based on Human Visual System for Single Sensor Digital Cameras. Santoyo-Garcia, Hector; Fragoso-Navarro, Eduardo; Reyes-Reyes, Rogelio; Cruz- Ramos, Clara; Nakano-M Report 7831

Terms of use | Privacy policy | Copyright © 2020 Farlex, Inc. | Feedback | For webmasters