
Security and Communication Networks, Volume 7
Volume 7, Number 1, January 2014
- Madhusanka Liyanage
, Andrei V. Gurtov
:
Securing virtual private LAN service by efficient key management. 1-13
- Hongbing Wang, Zhenfu Cao, Lifei Wei:
A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption. 14-32
- Kazim Yumbul, Erkay Savas, Övünç Kocabas, Johann Großschädl:
Design and implementation of a versatile cryptographic unit for RISC processors. 36-52 - Bora Aslan, Muharrem Tolga Sakalli:
Algebraic construction of cryptographically good binary linear transformations. 53-63
- Kun Peng:
Efficient homomorphic sealed-bid auction free of bid validity check and equality test. 64-76
- Son Thanh Nguyen, Erdal Cayirci, Chunming Rong
:
A secure many-to-many routing protocol for wireless sensor and actuator networks. 88-98
- Riccardo Bresciani, Andrew Butterfield
:
A UTP approach towards probabilistic protocol verification. 99-107 - Manoj Singh Gaur, Rajbir Kaur, P. Lalith Suresh, Vijay Laxmi
:
Exploiting convergence characteristics to tackle collusion attacks in OLSR for Security and Communication Networks. 108-122
- Alper Kanak, Ibrahim Sogukpinar
:
BioPSTM: a formal model for privacy, security, and trust in template-protecting biometric authentication. 123-138 - Steffen Bartsch:
Policy override in practice: model, evaluation, and decision support. 139-156 - Maria B. Line:
Why securing smart grids is not just a straightforward consultancy exercise. 160-174 - Jingcheng Gao, Jing Liu, Bharat Rajan, Rahul Nori, Bo Fu, Yang Xiao, Wei Liang, C. L. Philip Chen
:
SCADA communication and security issues. 175-194 - Nasim Beigi Mohammadi, Jelena V. Misic, Vojislav B. Misic, Hamzeh Khazaei:
A framework for intrusion detection system in advanced metering infrastructure. 195-205 - Nico Saputro
, Kemal Akkaya:
On preserving user privacy in Smart Grid advanced metering infrastructure applications. 206-220 - Hasen Nicanfar, Victor C. M. Leung
:
Password-authenticated cluster-based group key agreement for smart grid communication. 221-233 - Mi Wen, Rongxing Lu, Jingsheng Lei, Hongwei Li, Xiaohui Liang, Xuemin (Sherman) Shen:
SESA: an efficient searchable encryption scheme for auction in emerging smart grid marketing. 234-244
Volume 7, Number 2, February 2014
- Mehran S. Fallah, Nafiseh Kahani:
TDPF: a traceback-based distributed packet filter to mitigate spoofed DDoS attacks. 245-264 - Shuhui Chen, Rongxing Lu, Xuemin (Sherman) Shen:
SRC: a multicore NPU-based TCP stream reassembly card for deep packet inspection. 265-278 - Ghada Zaibi, Fabrice Peyrard, Abdennaceur Kachouri, Daniele Fournier-Prunaret, Mounir Samet:
Efficient and secure chaotic S-Box for wireless sensor network. 279-292 - Idris Ahmed, Anne James
, Dhananjay Singh
:
Critical analysis of counter mode with cipher block chain message authentication mode protocol - CCMP. 293-308 - Ning Lu, Yulong Wang, Sen Su, Fangchun Yang:
A novel path-based approach for single-packet IP traceback. 309-321
- Mohammad S. Obaidat
, Petros Nicopolitidis, Weili Han:
Security of e-systems. 322-324
- David M. Monteiro, Joel J. P. C. Rodrigues, Jaime Lloret, Sandra Sendra
:
A hybrid NFC-Bluetooth secure protocol for Credit Transfer among mobile phones. 325-337
- Abdallah Ghourabi
, Tarek Abbes, Adel Bouhoula:
Characterization of attacks collected from the deployment of Web service honeypot. 338-351
- Fahim H. Abbasi, Richard J. Harris, Stephen Marsland, Giovanni Moretti:
An exemplar-based learning approach for detection and classification of malicious network streams in honeynets. 352-364
- Lingzhi Fu, Xiang Shen, Linghao Zhu, Junyu Wang:
A low-cost UHF RFID tag chip with AES cryptography engine. 365-375 - Mohammad S. Obaidat
, Isaac Woungang, Sanjay Kumar Dhurandher, Vincent Koo:
A cryptography-based protocol against packet dropping and message tampering attacks on mobile ad hoc networks. 376-384 - Weili Han, Chen Sun, Chenguang Shen, Chang Lei, Sean Shen:
Dynamic combination of authentication factors based on quantified risk and benefit. 385-396
- Peter Mueller, Der-Chyuan Lou
, Xinyi Huang:
Special issue on applied cryptography for information and communication networks. 397-398
- Muhammad Khurram Khan, Saru Kumari:
Cryptanalysis and Improvement of "An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems". 399-408 - Huimin Shuai, Wen Tao Zhu, Xin Liu:
Publishing and sharing encrypted data with potential friends in online social networks. 409-421 - Huaqun Wang:
Signer-admissible strong designated verifier signature from bilinear pairings. 422-428 - Weijia Wang, Lei Hu:
A generic homomorphic MAC construction for authentication in network coding. 429-433 - Changlu Lin, Fei Tang, Pinhui Ke, Lein Harn, Shengyuan Zhang:
Secure universal designated verifier identity-based signcryption. 434-444 - Wenjie Yang
, Futai Zhang, Limin Shen:
Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles. 445-454 - Yuan He, Li Xu, Wei Wu:
A local joint fast handoff scheme in cognitive wireless mesh networks. 455-465 - Yong Yu, Jianbing Ni, Haomiao Yang, Yi Mu, Willy Susilo:
Efficient public key encryption with revocable keyword search. 466-472
Volume 7, Number 3, March 2014
- Yi Luo, Ferenc Szidarovszky, Youssif B. Al-Nashif, Salim Hariri:
A fictitious play-based response strategy for multistage intrusion defense systems. 473-491 - Hongli Zhang, Lin Ye, Jiantao Shi, Xiaojiang Du, Mohsen Guizani:
Verifying cloud service-level agreement by a third-party auditor. 492-502 - Heliang Huang, Wansu Bao, Shukai Liu:
Parallel Gaussian elimination for XL family over GF(2). 503-510 - Lanxiang Chen, Gongde Guo, Zhen Peng:
A hill cipher-based remote data possession checking in cloud storage. 511-518 - Zhejun Fang, Yuqing Zhang, Ying Kong, Qixu Liu:
Static detection of logic vulnerabilities in Java web applications. 519-531 - Novarun Deb, Manali Chakraborty, Nabendu Chaki
:
CORIDS: a cluster-oriented reward-based intrusion detection system for wireless mesh networks. 532-543 - JingZheng Wu, Liping Ding, Yanjun Wu, Nasro Min-Allah, Samee Ullah Khan, Yongji Wang:
C2Detector: a covert channel detection framework in cloud computing. 544-557 - Daniel Caragata, Safwan El Assad, Charles A. Shoniregun, Galyna A. Akmayeva:
Confidential initial identification and other improvements for UMTS security. 558-566 - Lein Harn:
Secure secret reconstruction and multi-secret sharing schemes with unconditional security. 567-573 - Yan Bai, Lirong Dai, Sam Chung, Durga D. Devaraj:
Access control for cloud-based eHealth social networking: design and evaluation. 574-587 - Amizah Malip, Siaw-Lynn Ng, Qin Li:
A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks. 588-601 - Xuefeng Liu, Yuqing Zhang, Boyang Wang, Huaqun Wang:
An anonymous data aggregation scheme for smart grid systems. 602-610 - Robert H. Deng
, Xuhua Ding
, Swee-Won Lo:
Efficient authentication and access control of scalable multimedia streams over packet-lossy networks. 611-625 - Ying-Dar Lin, Tzung-Bi Shih, Yu-Sung Wu, Yuan-Cheng Lai:
Secure and transparent network traffic replay, redirect, and relay in a dynamic malware analysis environment. 626-640 - Xiaonan Wang, Yi Mu:
A secure mobility support scheme for 6LoWPAN wireless sensor networks. 641-652 - Sachin Kumar, Rajendra Kumar Sharma
:
Threshold visual secret sharing based on Boolean operations. 653-664 - Tahani Gazdar, Abderrahim Benslimane
, Abdelfettah Belghith
, Abderrezak Rachedi
:
A secure cluster-based architecture for certificates management in vehicular networks. 665-683
Volume 7, Number 4, April 2014
- Kai Wang
, Huachun Zhou, Hongbin Luo, Jianfeng Guan, Yajuan Qin, Hongke Zhang:
Detecting and mitigating interest flooding attacks in content-centric network. 685-699 - Peiqing Zhang, Nikos Fotiou, Bjarne E. Helvik
, Giannis F. Marias, George C. Polyzos
:
Analysis of the effect of InfoRanking on content pollution in peer-to-peer systems. 700-713 - Ali Sedaghatbaf, Mohammad Abdollahi Azgomi
:
Attack modelling and security evaluation based on stochastic activity networks. 714-737 - Jin Wang, Kejie Lu:
On the mobile relay placement in hybrid MANETs with secure network coding. 738-749 - Cheng-Jung Tasia, Ting-Yi Chang, Pei-Cheng Cheng, Jyun-Hao Lin:
Two novel biometric features in keystroke dynamics authentication systems for touch screen devices. 750-758 - Changsha Ma, Kaiping Xue, Peilin Hong:
Distributed access control with adaptive privacy preserving property for wireless sensor networks. 759-773 - Hwajeong Seo, Yeoncheol Lee, Hyunjin Kim, Taehwan Park, Howon Kim:
Binary and prime field multiplication for public key cryptography on embedded microprocessors. 774-787 - Yahui Wu, Su Deng, Hongbin Huang
:
Optimal incentive policy in delay tolerant networks with limited cost. 788-799 - Mohammad Ghebleh
, Ali Kanso, Hala S. Own:
A blind chaos-based watermarking technique. 800-811
Volume 7, Number 5, May 2014
- Alfonso Muñoz Muñoz, Irina Arguelles Álvarez
, Sergio Sánchez García:
A formal model for the creation and evaluation of steganographic solutions based in lexical-semantic substitutions: a case applied to Spanish. 813-832
- Fatemeh Kavousi, Behzad Akbari:
A Bayesian network-based approach for learning attack strategies from intrusion alerts. 833-853 - Wun-She Yap
, Sze Ling Yeo, Swee-Huay Heng
, Matt Henricksen:
Security analysis of GCM for communication. 854-864 - Nils Gruschka, Luigi Lo Iacono
, Christoph Sorge:
Analysis of the current state in website certificate validation. 865-877 - Sebastián García, Alejandro Zunino
, Marcelo Campo:
Survey on network-based botnet detection methods. 878-903 - Yingjie Zhou, Guangmin Hu, Dapeng Wu:
A data mining system for distributed abnormal event detection in backbone networks. 904-913 - Intae Kim, Seong Oun Hwang:
Efficient identity-based broadcast signcryption schemes. 914-925 - Fady A. Mohamed, Elsayed E. Hemayed
:
Using trusted computing in trusted mail transfer protocol. 926-933 - Wei Xie, Lei Xie, Chen Zhang, Qiang Wang, Chao Wang, Chaojing Tang:
TOA: a tag-owner-assisting RFID authentication protocol toward access control and ownership transfer. 934-944
Volume 7, Number 6, June 2014
- Nasour Bagheri
, Masoumeh Safkhani
, Pedro Peris-Lopez
, Juan E. Tapiador
:
Weaknesses in a new ultralightweight RFID authentication protocol with permutation - RAPP. 945-949 - Lein Harn, Fuyou Miao, Chin-Chen Chang:
Verifiable secret sharing based on the Chinese remainder theorem. 950-957 - Tingting Liu, Shu Feng:
Research on hidden malicious user detection problem. 958-963 - Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai:
Collaborative agglomerative document clustering with limited information disclosure. 964-978 - Massoud Hadian Dehkordi, Reza Alimoradi:
Certificateless identification protocols from super singular elliptic curve. 979-986 - Fengtong Wen, Willy Susilo, Guomin Yang
:
A robust smart card-based anonymous user authentication protocol for wireless communications. 987-993 - Rui Zhang, Ling Liu, Rui Xue:
Role-based and time-bound access and management of EHR data. 994-1015 - Jung-San Lee, Ya-Chieh Huang:
Fast authentication mechanism with provable correctness for cluster-based VANETs. 1016-1030 - Fei Wang, Liusheng Huang, Haibo Miao, Miaomiao Tian:
A novel distributed covert channel in HTTP. 1031-1041 - Yinfeng Wu, Liping Huang, Xiao Wang, Ning Yu:
An extensible cheat-proofing multi-secret sharing scheme with low computation complexity. 1042-1048 - Wei Song, Zhiyong Peng, Qian Wang, Fangquan Cheng, Xiaoxin Wu, Yihui Cui:
Efficient privacy-preserved data query over ciphertext in cloud computing. 1049-1065
Volume 7, Number 7, July 2014
- Wee-How Khoh, Thian Song Ong
, Ying-Han Pang
, Andrew Beng Jin Teoh
:
Score level fusion approach in dynamic signature verification based on hybrid wavelet-Fourier transform. 1067-1078 - Niu Liu, Shaohua Tang, Lingling Xu:
Yet another attack on the chinese remainder theorem-based hierarchical access control scheme. 1079-1095 - Tal Grinshpoun
, Amnon Meisels, Eyal Felstaine:
Avoidance of misbehaving nodes in wireless mesh networks. 1096-1114 - Wun-She Yap
, Sze Ling Yeo, Swee-Huay Heng
, Matt Henricksen:
Parallelizable MAC revisited. 1115-1127 - Yilei Wang, Zhe Liu, Qiuliang Xu:
New rational parties relying on reputation. 1128-1137 - Lingling Xu, Fangguo Zhang, Shaohua Tang:
Timed-release oblivious transfer. 1138-1149 - Ning Lu, Yulong Wang, Sen Su, Fangchun Yang, Rui Han:
Filtering location optimization for the reactive packet filtering. 1150-1164 - Henry Carter
, Chaitrali Amrutkar, Italo Dacosta, Patrick Traynor:
For your phone only: custom protocols for efficient secure function evaluation on mobile devices. 1165-1176 - Jinguo Li, Yaping Lin, Gang Wang, Rui Li, Bo Yin:
Privacy and integrity preserving skyline queries in tiered sensor networks. 1177-1188
Volume 7, Number 8, August 2014
- Jie Huang, Bei Huang:
A security key distribution scheme based on energy efficiency for hybrid wireless sensor networks. 1189-1198 - Umberto Ferraro Petrillo, Giovanni Mastroianni, Ivan Visconti:
The design and implementation of a secure CAPTCHA against man-in-the-middle attacks. 1199-1209 - Azeem Irshad, Muhammad Sher, Muhammad Shahzad Faisal, Anwer Ghani
, Mahmood Ul Hassan, Shehzad Ashraf Chaudhry
:
A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme. 1210-1218 - Yuan Chen, Qingkuan Dong:
RCCA security for KEM+DEM style hybrid encryptions and a general hybrid paradigm from RCCA-secure KEMs to CCA-secure encryptions. 1219-1231 - Sha Ma, Bo Yang, Mingwu Zhang:
PPGJ: A privacy-preserving general join for outsourced encrypted database. 1232-1244 - Bo Wang, Jianyong Chen, Songsong Jia, Chunli Lv, Xiaomin Wang, Hongying Zheng:
Secret sharing scheme with dynamic size of shares for distributed storage system. 1245-1252 - Ou Ruan, Jing Chen, Jing Zhou, Yongquan Cui, Mingwu Zhang:
An efficient fair UC-secure protocol for two-party computation. 1253-1263 - Qi Xie, Xiao Tan, Duncan S. Wong, Guilin Wang, Mengjie Bao, Na Dong:
A practical anonymous authentication protocol for wireless roaming. 1264-1273 - Seongan Lim, Eunjeong Lee, Cheol-Min Park:
Equivalent public keys and a key substitution attack on the schemes from vector decomposition. 1274-1282 - Zhihua Xia, Xinhui Wang, Xingming Sun, Baowei Wang:
Steganalysis of least significant bit matching using multi-order differences. 1283-1291 - Faraz Idris Khan, Taeshik Shon, Taekkyeun Lee, Ki-Hyung Kim:
Merkle tree-based wormhole attack avoidance mechanism in low power and lossy network based networks. 1292-1309
Volume 7, Number 9, September 2014
Editorials
- Yulei Wu, Guojun Wang, Ahmed Yassin Al-Dubai:
Advances in trusted network computing. 1311-1312
- Yu-Teng Jang, Shuchih Ernest Chang, Yi-Jey Tsai:
Smartphone security: understanding smartphone users' trust in information security management. 1313-1321 - Zhigang Chen, Jiang-tao Wang
, Xiao-heng Deng:
A trust model based on semantic distance for pervasive environments. 1322-1330 - Haibin Zhang, Yan Wang
, Xiuzhen Zhang:
The approaches to contextual transaction trust computation in e-Commerce environments. 1331-1351 - Wei Zhou, Zhiqiang Wei, Xiangjun Ren, Mijun Kang:
A game theoretic truthful reputation mechanism in mobile ad hoc networks. 1352-1363 - Chaoliang Li, Guojun Wang, Jin Zheng:
An aggregated signature-based fast RFID batch detection protocol. 1364-1371 - Lei (Chris) Liu, Xiaolong Jin, Geyong Min, Li Xu:
Anomaly diagnosis based on regression and classification analysis of statistical traffic features. 1372-1383 - Xiangyu Liu, Bin Wang, Xiaochun Yang, Meng Yu, Wanyu Zang:
Obtaining K-obfuscation for profile privacy in social networks. 1384-1398 - Jun Yang, Bin Wang, Xiaochun Yang, Hongyi Zhang, Guang Xiang:
A secure K-automorphism privacy preserving approach with high data utility in social networks. 1399-1411 - Deqing Zou, Weide Zheng, Wenbin Jiang, Hai Jin, Gang Chen:
Memshepherd: comprehensive memory bug fault-tolerance system. 1412-1419 - Bo Li, Xuefeng Ma, Jianming Li, Zhou Zong:
A fixed point model for rate control and routing in cloud data center networks. 1420-1436
Volume 7, Number 10, October 2014
- Hangbae Chang, Hosin David Lee, Richard E. Overill:
Human-centric security service and its application in smart space. 1439-1440 - Eun-Ha Song, Su-Hyun Yang, Young-Sik Jeong:
Human-centric visual monitoring of multi-clients system behavior and BiT for trust computing. 1441-1453 - Xiaohong Li, Ke He, Zhiyong Feng, Guangquan Xu:
Unified threat model for analyzing and evaluating software threats. 1454-1466 - Jianwei Niu, Xiong Li
:
A novel user authentication scheme with anonymity for wireless communications. 1467-1476 - Yi Jun He, Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu:
UFLE: a user-friendly location-free encryption system for mobile users. 1477-1487 - Xiong Li
, Jianwei Niu, Zhibo Wang, Cai-Sen Chen:
Applying biometrics to design three-factor remote user authentication scheme with key agreement. 1488-1497 - Hyeong-Il Kim, Al-Amin Hossain, Jae-Woo Chang:
A spatial transformation scheme supporting data privacy and query integrity for security of outsourced databases. 1498-1509 - I Luk Kim, Jung-Taek Seo
, Taeshik Shon, Jongsub Moon:
A novel approach to detection of mobile rogue access points. 1510-1516 - Daehoon Kim, Eenjun Hwang, Seungmin Rho:
Multi-camera-based security log management scheme for smart surveillance. 1517-1527 - Jin-Mook Kim, Hwa-Young Jeong
, Bong-Hwa Hong:
A study of privacy problem solving using device and user authentication for M2M environments. 1528-1535 - Deok Seok Seo, Soon-Seok Kim, Yong-Hee Lee, Gwang-Hee Kim
, Yoon Seok Shin:
Privacy protection in human-centric healthcare home environment. 1536-1542 - Daesung Moon, Jang-Hee Yoo
, Mun-Kyu Lee:
Improved cancelable fingerprint templates using minutiae-based functional transform. 1543-1551 - Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng, Ziping Wang:
Robust password changing and DoS resilience for human-centric password authentication. 1552-1559 - Ming Luo, Min Tu, Jianfeng Xu:
A security communication model based on certificateless online/offline signcryption for Internet of Things. 1560-1569 - Xuejiao Liu, Yingjie Xia, Yanbo Wang, Jing Ren:
Discovering anomaly on the basis of flow estimation of alert feature distribution. 1570-1581 - Fulvio Corno
, Muhammad Sanaullah:
Modeling and formal verification of smart environments. 1582-1598 - Jin-Hyung Park, Seungmin Rho, Chang-Sung Jeong:
Real-time robust 3D object tracking and estimation for surveillance system. 1599-1611 - Sang-Soo Choi, Jungsuk Song, Seokhun Kim, Sookyun Kim:
A model of analyzing cyber threats trend and tracing potential attackers based on darknet traffic. 1612-1621 - Yang-Hoon Kim, Hangbae Chang:
Human centric security policy and management design for small and medium business. 1622-1632 - Seung-Ryung Oh, Kun Woo Kim:
A study on the influences of R&D investment on information security for mechanical and electronics industry. 1633-1640
Volume 7, Number 11, November 2014
- Hongbing Wang, Peng Zeng, Kim-Kwang Raymond Choo
:
MDMR-IBE: efficient multiple domain multi-receiver identity-based encryption. 1641-1651 - Riaz Ahmed Shaikh
, Ahmed Saeed Alzahrani
:
Intrusion-aware trust model for vehicular ad hoc networks. 1652-1669