default search action
Security and Communication Networks, Volume 2017
Volume 2017, 2017
- Andronicus Ayobami Akinyelu
, Aderemi Oluyinka Adewumi
:
Improved Instance Selection Methods for Support Vector Machine Speed Optimization. 6790975:1-6790975:11 - Dapeng Man
, Wu Yang
, Shichang Xuan
, Xiaojiang Du:
Thwarting Nonintrusive Occupancy Detection Attacks from Smart Meters. 5350201:1-5350201:9 - Jiguo Li
, Fengjie Sha, Yichen Zhang, Xinyi Huang, Jian Shen
:
Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length. 3596205:1-3596205:11 - Ankit Kumar Jain
, Brij B. Gupta
:
Phishing Detection: Analysis of Visual Similarity Based Approaches. 5421046:1-5421046:20 - Ying-Hao Hung, Yuh-Min Tseng
, Sen-Shan Huang:
Revocable ID-Based Signature with Short Size over Lattices. 7571201:1-7571201:9 - Naveed Ahmed Azam
:
A Novel Fuzzy Encryption Technique Based on Multiple Right Translated AES Gray S-Boxes and Phase Embedding. 5790189:1-5790189:9 - Dhanalakshmi Krishnan Sadhasivan
, Kannapiran Balasubramanian
:
A Fusion of Multiagent Functionalities for Effective Intrusion Detection System. 6216078:1-6216078:15 - Hongyan Cui
, Xiaofei Liu, Tao Yu, Honggang Zhang, Yajun Fang, Zong-Guo Xia:
Cloud Service Scheduling Algorithm Research and Optimization. 2503153:1-2503153:7 - Je Sen Teh
, Azman Samsudin
:
A Chaos-Based Authenticated Cipher with Associated Data. 9040518:1-9040518:15 - Chalee Vorakulpipat
, Soontorn Sirapaisan, Ekkachan Rattanalerdnusorn, Visut Savangsuk:
A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives. 2057260:1-2057260:11 - Yuan-Yu Tsai
, Tsung-Chieh Cheng, Yao-Hsien Huang
:
A Low-Complexity Region-Based Authentication Algorithm for 3D Polygonal Models. 1096463:1-1096463:11 - Nishaal J. Parmar
, Pramode K. Verma:
A Comparative Evaluation of Algorithms in the Implementation of an Ultra-Secure Router-to-Router Key Exchange System. 1467614:1-1467614:7 - Jeyamala Chandrasekaran
, S. J. Thiruvengadam
:
A Hybrid Chaotic and Number Theoretic Approach for Securing DICOM Images. 6729896:1-6729896:12 - Gautam Kumar
, Hemraj Saini
:
Novel Noncommutative Cryptography Scheme Using Extra Special Group. 9036382:1-9036382:21 - Hector Santoyo-Garcia, Eduardo Fragoso-Navarro
, Rogelio Reyes-Reyes
, Clara Cruz-Ramos
, Mariko Nakano-Miyatake
:
Visible Watermarking Technique Based on Human Visual System for Single Sensor Digital Cameras. 7903198:1-7903198:18 - Murat Dener
, Ömer Faruk Bay:
Practical Implementation of an Adaptive Detection-Defense Unit against Link Layer DoS Attacks for Wireless Sensor Networks. 1531928:1-1531928:9 - Mahalakshmi Gunasekaran
, Subathra Periakaruppan:
GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack Detection in WSN. 9863032:1-9863032:10 - Probidita Roychoudhury
, Basav Roychoudhury
, Dilip Kumar Saikia:
Hierarchical Group Based Mutual Authentication and Key Agreement for Machine Type Communication in LTE and Future 5G Networks. 1701243:1-1701243:21 - Mervat Mikhail
, Yasmine Abouelseoud
, Galal A. Elkobrosy:
Two-Phase Image Encryption Scheme Based on FFCT and Fractals. 7367518:1-7367518:13 - Yiqin Lu
, Meng Wang
, Pengsen Huang:
An SDN-Based Authentication Mechanism for Securing Neighbor Discovery Protocol in IPv6. 5838657:1-5838657:9 - Xiaoming Hu
, WenAn Tan, Huajie Xu, Jian Wang, Chuang Ma:
Strong Designated Verifier Signature Schemes with Undeniable Property and Their Applications. 7921782:1-7921782:9 - Seunghwan Chang, Hyang-Sook Lee, Juhee Lee
, Seongan Lim
:
Security Analysis of a Certificateless Signature from Lattices. 3413567:1-3413567:7 - Emir Husni
:
Dynamic Rule Encryption for Mobile Payment. 4975302:1-4975302:11 - Dongmin Kim, Ik Rae Jeong
:
Certificateless Public Auditing Protocol with Constant Verification Time. 6758618:1-6758618:14 - Ahmad Samer Wazan
, Romain Laborde
, David W. Chadwick
, François Barrère, Abdelmalek Benzekri, Mustafa Kaiiali
, Adib Habbal
:
Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker. 6907146:1-6907146:23 - Mirko Köhler
, Ivica Lukic, Visnja Krizanovic Cik
:
Protecting Information with Subcodstanography. 9130683:1-9130683:13 - Trong-Minh Hoang
, Van-Kien Bui, Thanh-Tra Nguyen:
The Performance Evaluation of an IEEE 802.11 Network Containing Misbehavior Nodes under Different Backoff Algorithms. 2459780:1-2459780:8 - Asish Kumar Dalai
, Sanjay Kumar Jena:
Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications. 3825373:1-3825373:12 - Mohammad Ali Nematollahi
, Chalee Vorakulpipat
, Hamurabi Gamboa-Rosales
:
Optimization of a Blind Speech Watermarking Technique against Amplitude Scaling. 5454768:1-5454768:13 - Chien-Hua Tsai
, Pin-Chang Su:
An ECC-Based Blind Signcryption Scheme for Multiple Digital Documents. 8981606:1-8981606:14 - Zheng Zhao
, Fenlin Liu
, Daofu Gong
:
An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks. 1560594:1-1560594:12 - Anier Soria-Lorente
, Stefan Berres
:
A Secure Steganographic Algorithm Based on Frequency Domain for the Transmission of Hidden Information. 5397082:1-5397082:14 - Guoyong Han, Wenying Zhang
:
Improved Biclique Cryptanalysis of the Lightweight Block Cipher Piccolo. 7589306:1-7589306:12 - Xingchun Yang
, Chunxiang Xu, Chao Rong Li:
A Privacy Model for RFID Tag Ownership Transfer. 5084636:1-5084636:10 - Peng Li
, Xiaotian Yu
, He Xu
, Jiewei Qian, Lu Dong
, Huqing Nie
:
Research on Secure Localization Model Based on Trust Valuation in Wireless Sensor Networks. 6102780:1-6102780:12 - Xiaoye Li
, Jing Yang
, Zhenlong Sun
, Jianpei Zhang
:
Differential Privacy for Edge Weights in Social Networks. 4267921:1-4267921:10 - Qingqing Gan
, Xiaoming Wang
, Daini Wu
:
Revocable Key-Aggregate Cryptosystem for Data Sharing in Cloud. 2508693:1-2508693:11 - Vennila Ganesan
, M. S. K. Manikandan:
A Secured Load Mitigation and Distribution Scheme for Securing SIP Server. 7821487:1-7821487:14 - Jingyu Hua, An Tang, Qingyun Pan, Kim-Kwang Raymond Choo, Hong Ding
, Yizhi Ren
:
Practical m-k-Anonymization for Collaborative Data Publishing without Trusted Third Party. 9532163:1-9532163:10 - Khairan D. Rajab
:
New Hybrid Features Selection Method: A Case Study on Websites Phishing. 9838169:1-9838169:10 - Lan Liu
, Ryan K. L. Ko
, Guangming Ren, Xiaoping Xu:
Malware Propagation and Prevention Model for Time-Varying Community Networks within Software Defined Networks. 2910310:1-2910310:8 - Sang-Pil Kim, Myeong-Sun Gil, Hajin Kim, Mi-Jung Choi
, Yang-Sae Moon
, Hee-Sun Won:
Efficient Two-Step Protocol and Its Discriminative Feature Selections in Secure Similar Document Detection. 6841216:1-6841216:12 - Dina Shehada
, Chan Yeob Yeun
, M. Jamal Zemerly
, Mahmoud Al-Qutayri, Yousof Al-Hammadi
, Ernesto Damiani, Jiankun Hu
:
BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications. 3606424:1-3606424:18 - Mohammed Abdulridha Hussain
, Hai Jin
, Zaid Alaa Hussien
, Zaid Ameen Abduljabbar
, Salah H. Abbdal, Ayad Ibrahim:
Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing. 9479476:1-9479476:15 - Jianxin Xu
, Dongqin Feng
:
Identification of ICS Security Risks toward the Analysis of Packet Interaction Characteristics Using State Sequence Matching Based on SF-FSM. 2430835:1-2430835:17 - An Wang, Yu Zhang, Liehuang Zhu
, Weina Tian, Rixin Xu, Guoshuang Zhang:
RFA: R-Squared Fitting Analysis Model for Power Attack. 5098626:1-5098626:8 - Ju-Min Zhao
, Ding Feng, Deng-ao Li, Wei Gong, Haoxiang Liu, Shimin Huo:
Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems. 8356983:1-8356983:9 - Lichen Zhang
, Yingshu Li
, Liang Wang
, Junling Lu
, Peng Li
, Xiaoming Wang
:
An Efficient Context-Aware Privacy Preserving Approach for Smartphones. 4842694:1-4842694:11 - Pan Yang
, Xiaolin Gui
, Jian An, Feng Tian
:
An Efficient Secret Key Homomorphic Encryption Used in Image Processing Service. 7695751:1-7695751:11 - Yanping Xu
, Chunhua Wu
, Kangfeng Zheng, Xu Wang
, Xinxin Niu, Tianliang Lu:
Computing Adaptive Feature Weights with PSO to Improve Android Malware Detection. 3284080:1-3284080:14 - Shihong Zou
, Yanhong Xu, Honggang Wang
, Zhouzhou Li, Shanzhi Chen, Bo Hu:
A Survey on Secure Wireless Body Area Networks. 3721234:1-3721234:9 - Jiaye Pan
, Yi Zhuang
:
PMCAP: A Threat Model of Process Memory Data on the Windows Operating System. 4621587:1-4621587:15 - Mansour Alsaleh
, Noura Alomar
, Monirah Alshreef, Abdulrahman Alarifi, AbdulMalik S. Al-Salman
:
Performance-Based Comparative Assessment of Open Source Web Vulnerability Scanners. 6158107:1-6158107:14 - Xin Liu
, Shundong Li
, Xiubo Chen, Gang Xu, Xiaolin Zhang, Yong Zhou:
Efficient Solutions to Two-Party and Multiparty Millionaires' Problem. 5207386:1-5207386:11 - Pieter Robyns
, Bram Bonné
, Peter Quax
, Wim Lamotte
:
Noncooperative 802.11 MAC Layer Fingerprinting and Tracking of Mobile Devices. 6235484:1-6235484:21 - Hung-Yu Chien
:
Group Authentication with Multiple Trials and Multiple Authentications. 3109624:1-3109624:7 - Changsheng Wan
, Juan Zhang, Daoli Huang:
SCPR: Secure Crowdsourcing-Based Parking Reservation System. 1076419:1-1076419:9 - Zuochao Dou
, Issa Khalil
, Abdallah Khreishah
:
CLAS: A Novel Communications Latency Based Authentication Scheme. 4286903:1-4286903:20 - Huiting Fan
, Kai Xing
, Lei Tan, Weikang Rui, Zhonghu Xu
, Shuo Zhang, Jing Xu
:
Privacy Preserved Self-Awareness on the Community via Crowd Sensing. 8026787:1-8026787:8 - Waqas Ahmed Imtiaz
, Affaq Qamar
, Atiq ur Rehman, Haider Ali, Adnan Rashid Chaudhry
, Javed Iqbal
:
Design and Analysis of Self-Healing Tree-Based Hybrid Spectral Amplitude Coding OCDMA System. 2524513:1-2524513:12 - Juha Partala
:
Semantically Secure Symmetric Encryption with Error Correction for Distributed Storage. 4321296:1-4321296:10 - Hao Hu
, Hongqi Zhang, Yuling Liu, Yongwei Wang:
Quantitative Method for Network Security Situation Based on Attack Prediction. 3407642:1-3407642:19 - Bingxin Zhu, Puwen Wei
, Mingqiang Wang
:
Adaptive Security of Broadcast Encryption, Revisited. 1404279:1-1404279:16 - Ran Ji
, Jian Wang
, Chaojing Tang, Ruilin Li:
Automatic Reverse Engineering of Private Flight Control Protocols of UAVs. 1308045:1-1308045:9 - Miguel Seijo Simó
, Gregorio López López
, José Ignacio Moreno
:
Cybersecurity Vulnerability Analysis of the PLC PRIME Standard. 7369684:1-7369684:18 - Yuan Ping
, Baocang Wang
, Yuehua Yang, Shengli Tian:
Building Secure Public Key Encryption Scheme from Hidden Field Equations. 9289410:1-9289410:6 - Kai Fan
, Panfei Song, Zhao Du, Haojin Zhu
, Hui Li, Yintang Yang, Xinghua Li, Chao Yang:
NFC Secure Payment and Verification Scheme with CS E-Ticket. 4796373:1-4796373:9 - Xiangyang Zhu
, Hua Dai
, Xun Yi, Geng Yang
, Xiao Li:
MUSE: An Efficient and Accurate Verifiable Privacy-Preserving Multikeyword Text Search over Encrypted Cloud Data. 1923476:1-1923476:17 - Chenyu Wang
, Guoai Xu:
Cryptanalysis of Three Password-Based Remote User Authentication Schemes with Non-Tamper-Resistant Smart Card. 1619741:1-1619741:14 - Song Li, Jie Cui
, Hong Zhong, Yiwen Zhang, Qiang He:
LEPA: A Lightweight and Efficient Public Auditing Scheme for Cloud-Assisted Wireless Body Sensor Networks. 4364376:1-4364376:16 - Guomin Zhou, Peng Zeng, Xiaohui Yuan
, Siyuan Chen, Kim-Kwang Raymond Choo:
An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model. 1915239:1-1915239:7 - Caixue Zhou
, Zhiqiang Zhao
, Wan Zhou
, Yuan Mei
:
Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings. 8405879:1-8405879:17 - Anita Pradhan
, Kolla Raja Sekhar, Gandharba Swain
:
Adaptive PVD Steganography Using Horizontal, Vertical, and Diagonal Edges in Six-Pixel Blocks. 1924618:1-1924618:13 - Qinlong Huang
, Licheng Wang
, Yixian Yang:
Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities. 6426495:1-6426495:12 - Yi Liang, Zhipeng Cai
, Qilong Han
, Yingshu Li
:
Location Privacy Leakage through Sensory Data. 7576307:1-7576307:12 - Rameez Asif
, William J. Buchanan
:
Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment. 7616847:1-7616847:10 - Chun-Juan Ouyang
, Ming Leng, Jie-wu Xia, Huan Liu
:
Vague Sets Security Measure for Steganographic System Based on High-Order Markov Model. 1790268:1-1790268:13 - Jingxuan Wang
, Lucas C. K. Hui, Siu-Ming Yiu, Gang Zhou, Ruoqing Zhang:
F-DDIA: A Framework for Detecting Data Injection Attacks in Nonlinear Cyber-Physical Systems. 9602357:1-9602357:12 - Chao Yuan
, Mixue Xu, Xueming Si:
Research on a New Signature Scheme on Blockchain. 4746586:1-4746586:10 - Ruhul Amin
, SK Hafizul Islam
, Muhammad Khurram Khan
, Arijit Karati
, Debasis Giri
, Saru Kumari
:
A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments. 5989151:1-5989151:15 - Zhihua Li
, Ziyuan Li, Ning Yu, Steven Wen:
Locality-Based Visual Outlier Detection Algorithm for Time Series. 1869787:1-1869787:10 - Jiajun Shen
, Dongqin Feng
:
Stackelberg Interdependent Security Game in Distributed and Hierarchical Cyber-Physical Systems. 9017039:1-9017039:19 - Geovandro C. C. F. Pereira
, Renan C. A. Alves
, Felipe Leno da Silva
, Roberto M. Azevedo
, Bruno C. Albertini
, Cíntia B. Margi
:
Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems. 2046735:1-2046735:16 - Sufang Zhou, Shundong Li
, Jiawei Dou, Yaling Geng, Xin Liu
:
Efficient Secure Multiparty Subset Computation. 9717580:1-9717580:11 - Xin Wang
, Dafang Zhang
, Xin Su
, Wenjia Li:
Mlifdect: Android Malware Detection Based on Parallel Machine Learning and Information Fusion. 6451260:1-6451260:14 - Yiyuan Luo
, Xuejia Lai:
Improvements for Finding Impossible Differentials of Block Cipher Structures. 5980251:1-5980251:9 - Lein Harn, Ching-Fang Hsu
:
A Novel Design of Membership Authentication and Group Key Establishment Protocol. 8547876:1-8547876:7 - Yu Liu, Huicong Liang, Wei Wang
, Meiqin Wang
:
New Linear Cryptanalysis of Chinese Commercial Block Cipher Standard SM4. 1461520:1-1461520:10 - Rong Ma
, Zhenfu Cao
, Xingkai Wang:
Efficient Asymmetric Index Encapsulation Scheme for Anonymous Content Centric Networking. 9248654:1-9248654:9 - Gang Han, Yu Yu
, Xiangxue Li
, Qifeng Zhou, Dong Zheng
, Hui Li:
1-Resilient Boolean Functions on Even Variables with Almost Perfect Algebraic Immunity. 6268230:1-6268230:9 - Hongji Huang, Wanyou Sun, Jie Yang, Guan Gui
:
Relay Selections for Security and Reliability in Mobile Communication Networks over Nakagami-m Fading Channels. 2569239:1-2569239:8 - Jiankuo Dong
, Fangyu Zheng
, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, Yuan Zhao:
Utilizing the Double-Precision Floating-Point Computing Power of GPUs for RSA Acceleration. 3508786:1-3508786:15 - Donghui Hu
, Zhongjin Ma, Xiaotian Zhang, Peipei Li, Dengpan Ye, Baohong Ling:
The Concept Drift Problem in Android Malware Detection and Its Solution. 4956386:1-4956386:13 - Lukasz Krzywiecki
, Tomasz Wlislocki
:
Deniable Key Establishment Resistance against eKCI Attacks. 7810352:1-7810352:13 - Han Yan
, Xiang Cheng, Sen Su
, Siyao Zhang:
Authenticated Location-Aware Publish/Subscribe Services in Untrusted Outsourced Environments. 4215425:1-4215425:15 - Vitor Hugo Galhardo Moia
, Marco Aurélio Amaral Henriques
:
Similarity Digest Search: A Survey and Comparative Analysis of Strategies to Perform Known File Filtering Using Approximate Matching. 1306802:1-1306802:17 - Lein Harn, Ching-Fang Hsu
, Zhe Xia, Junwei Zhou
:
How to Share Secret Efficiently over Networks. 5437403:1-5437403:6 - Jongho Moon
, Youngsook Lee
, Jiye Kim, Dongho Won
:
Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User. 1378128:1-1378128:13 - Nurmamat Helil
, Kaysar Rahman:
CP-ABE Access Control Scheme for Sensitive Data Set Constraint with Hidden Access Policy and Constraint Policy. 2713595:1-2713595:13 - Xiaojuan Zhang
, Xiutao Feng, Dongdai Lin:
Fault Attack on the Authenticated Cipher ACORN v2. 3834685:1-3834685:16 - Lu Zhou
, Mingchao Liao
, Cao Yuan
, Haoyu Zhang
:
Low-Rate DDoS Attack Detection Using Expectation of Packet Size. 3691629:1-3691629:14 - Iván García-Magariño
, Raquel Lacuesta
:
ABS-TrustSDN: An Agent-Based Simulator of Trust Strategies in Software-Defined Networks. 8575842:1-8575842:9 - Yanli Ren
, Min Dong, Zhihua Niu, Xiaoni Du:
Noninteractive Verifiable Outsourcing Algorithm for Bilinear Pairing with Improved Checkability. 4892814:1-4892814:9 - Peipei Wang
, Yun Cao, Xianfeng Zhao
:
Segmentation Based Video Steganalysis to Detect Motion Vector Modification. 8051389:1-8051389:12 - Yuan Shi
, Huanguo Zhang, Juan Wang
, Feng Xiao, Jianwei Huang, Daochen Zha, Hongxin Hu, Fei Yan, Bo Zhao:
CHAOS: An SDN-Based Moving Target Defense System. 3659167:1-3659167:11 - Guomin Zhou, Peng Zeng, Xiaohui Yuan
, Siyuan Chen, Kim-Kwang Raymond Choo:
Erratum to "An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model". 2041842:1 - Rafal Kozik
, Michal Choras:
Pattern Extraction Algorithm for NetFlow-Based Botnet Activities Detection. 6047053:1-6047053:10 - Jie Zhang
, Jie Chen, Aijun Ge
, Chuangui Ma:
Shorter Decentralized Attribute-Based Encryption via Extended Dual System Groups. 7323158:1-7323158:19 - Fusheng Wu
, Huanguo Zhang
, Wengqing Wang, Jianwei Jia, Shi Yuan
:
A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace. 7042835:1-7042835:15 - Mahmoud Khasawneh
, Anjali Agarwal:
A Collaborative Approach for Monitoring Nodes Behavior during Spectrum Sensing to Mitigate Multiple Attacks in Cognitive Radio Networks. 3261058:1-3261058:16 - Elena Pagnin
, Aikaterini Mitrokotsa
:
Privacy-Preserving Biometric Authentication: Challenges and Directions. 7129505:1-7129505:9 - Tomasz Andrysiak
, Lukasz Saganowski
, Piotr Kiedrowski
:
Predictive Abuse Detection for a PLC Smart Lighting Network Based on Automatically Created Models of Exponential Smoothing. 7892182:1-7892182:19 - Long Nguyen-Vu
, Ngoc-Tu Chau
, Seongeun Kang, Souhwan Jung
:
Android Rooting: An Arms Race between Evasion and Detection. 4121765:1-4121765:13 - Guoyin Zhang, Liang Kou, Liguo Zhang, Chao Liu, Qingan Da, Jianguo Sun
:
A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT. 3126010:1-3126010:12 - Jian Mao, Wenqian Tian
, Yan Zhang, Jian Cui, Hanjun Ma
, Jingdong Bian, Jianwei Liu, Jianhong Zhang
:
Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment. 2948025:1-2948025:13 - Ivan Vaccari
, Enrico Cambiaso
, Maurizio Aiello
:
Remotely Exploiting AT Command Attacks on ZigBee Networks. 1723658:1-1723658:9 - Mohamed Amine Ferrag
, Leandros A. Maglaras
, Helge Janicke
, Jianmin Jiang, Lei Shu
:
Authentication Protocols for Internet of Things: A Comprehensive Survey. 6562953:1-6562953:41 - Chao Yuan
, Mixue Xu, Xueming Si:
Corrigendum to "Research on a New Signature Scheme on Blockchain". 8295275:1 - Rabia Riaz
, Tae-Sun Chung
, Sanam Shahla Rizvi
, Nazish Yaqub:
BAS: The Biphase Authentication Scheme for Wireless Sensor Networks. 7041381:1-7041381:10 - Muhammad Hilmi Kamarudin
, Carsten Maple, Tim Watson, Nader Sohrabi Safa
:
A New Unified Intrusion Anomaly Detection in Identifying Unseen Web Attacks. 2539034:1-2539034:18 - Li Kuang
, Yin Wang
, Pengju Ma, Long Yu, Chuanbin Li, Lan Huang, Mengyao Zhu
:
An Improved Privacy-Preserving Framework for Location-Based Services Based on Double Cloaking Regions with Supplementary Information Constraints. 7495974:1-7495974:15 - Xiaolong Xu
, Xuan Zhao, Feng Ruan, Jie Zhang, Wei Tian, Wanchun Dou
, Alex X. Liu:
Data Placement for Privacy-Aware Applications over Big Data in Hybrid Clouds. 2376484:1-2376484:15 - Shuo Li, Zhanjie Song, Wenhuan Lu
, Daniel Sun, Jianguo Wei
:
Parameterization of LSB in Self-Recovery Speech Watermarking Framework in Big Data Mining. 3847092:1-3847092:12 - Donghui Hu
, Qiang Shen, Shengnan Zhou, Xueliang Liu, Yuqi Fan, Lina Wang:
Adaptive Steganalysis Based on Selection Region and Combined Convolutional Neural Networks. 2314860:1-2314860:9 - Hong Rong
, Huimei Wang, Jian Liu, Jialu Hao, Ming Xian:
Privacy-Preserving k-Means Clustering under Multiowner Setting in Distributed Cloud Environments. 3910126:1-3910126:19 - Xiancui Xiao, Xiangwei Zheng
, Yuang Zhang:
A Multidomain Survivable Virtual Network Mapping Algorithm. 5258010:1-5258010:12 - Ming-Hung Wang
, Hanchi Wang, You-Ru Chen, Chin-Laung Lei
:
Automatic Test Pattern Generator for Fuzzing Based on Finite State Machine. 7819590:1-7819590:11 - Junling Lu
, Zhipeng Cai
, Xiaoming Wang
, Lichen Zhang
, Zhuojun Duan:
An Edge Correlation Based Differentially Private Network Data Release Method. 8408253:1-8408253:14 - Vishal Sharma
, Kyungroul Lee, Soonhyun Kwon, Jiyoon Kim
, Hyungjoon Park, Kangbin Yim, Sun-Young Lee
:
A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT. 4749085:1-4749085:24 - Yujia Liu
, Weiming Zhang
, Nenghai Yu
:
Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth. 1897438:1-1897438:15 - Yang Yu
, Jun Long
, Zhiping Cai
:
Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders. 4184196:1-4184196:10 - Qing Yang
, Rongxing Lu
, Yacine Challal
, Maryline Laurent
:
Security and Privacy in Emerging Wireless Networks. 5618742:1-5618742:2 - Wenjie Yang, Jian Weng
, Weiqi Luo
, Anjia Yang:
Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC. 5704865:1-5704865:8 - Abdul Razaq
, Awais Yousaf
, Umer Shuaib, Nasir Siddiqui, Atta Ullah, Adil Waheed:
A Novel Construction of Substitution Box Involving Coset Diagram and a Bijective Map. 5101934:1-5101934:16 - Wei Yin
, Jadwiga Indulska
, Hongjian Zhou:
Protecting Private Data by Honey Encryption. 6760532:1-6760532:9 - Tong Li
, Yuhui Zheng, Ti Zhou
:
Efficient Anonymous Authenticated Key Agreement Scheme for Wireless Body Area Networks. 4167549:1-4167549:8 - Mikel Iturbe
, Iñaki Garitano
, Urko Zurutuza
, Roberto Uribeetxeberria:
Towards Large-Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends. 9150965:1-9150965:17 - Dhruti Sharma
, Devesh C. Jinwala
:
Multiuser Searchable Encryption with Token Freshness Verification. 6435138:1-6435138:16 - Feng Li, Yali Si, Ning Lu
, Zhen Chen, Limin Shen:
A Security and Efficient Routing Scheme with Misbehavior Detection in Delay-Tolerant Networks. 2761486:1-2761486:16 - Mahdi Madani
, Ilyas Benkhaddra
, Camel Tanougast
, Salim Chitroub, Loïc Siéler:
Digital Implementation of an Improved LTE Stream Cipher Snow-3G Based on Hyperchaotic PRNG. 5746976:1-5746976:15 - Tengfei Tu
, Lu Rao, Hua Zhang
, Qiaoyan Wen, Jia Xiao:
Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud. 4603237:1-4603237:17 - Fu-Hau Hsu, Chih-Wen Ou
, Yanling Hwang, Ya-Ching Chang, Po-Ching Lin:
Detecting Web-Based Botnets Using Bot Communication Traffic Features. 5960307:1-5960307:11 - Xiaona Xia
, Jiguo Yu, Shanshan Zhang, Shu Wu
:
Trusted Service Scheduling and Optimization Strategy Design of Service Recommendation. 9192084:1-9192084:9 - Keyang Liu
, Weiming Zhang
, Xiaojuan Dong
:
A Cloud-User Protocol Based on Ciphertext Watermarking Technology. 4376282:1-4376282:14 - Shuai Han
, Shengli Liu
, Lin Lyu
:
Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption. 2148534:1-2148534:27 - Ji Li
, Jianghong Wei
, Wenfen Liu
, Xuexian Hu
:
PMDP: A Framework for Preserving Multiparty Data Privacy in Cloud Computing. 6097253:1-6097253:14 - Ke Yin
:
Research on the Effectiveness Evaluation Model of the Prison Physical Protection System Based on Grey Analytic Hierarchy Process. 6207437:1-6207437:9 - Yi Liu
, Hongqi Zhang, Jiang Liu
, Yingjie Yang:
A New Approach for Delivering Customized Security Everywhere: Security Service Chain. 9534754:1-9534754:17 - Xing Guo
, Shanshan Chen
, Yiwen Zhang
, Wei Li:
Service Composition Optimization Method Based on Parallel Particle Swarm Algorithm on Spark. 9097616:1-9097616:8 - Hao Chen, Tao Wang, Fan Zhang
, Xinjie Zhao, Wei He, Lumin Xu, Yunfei Ma:
Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher. 8051728:1-8051728:15 - Jun Chen
, Xiangyang Luo
, Yanqing Guo, Yi Zhang
, Daofu Gong
:
A Survey on Breaking Technique of Text-Based CAPTCHA. 6898617:1-6898617:15 - Shin-Yan Chiou
, Tsung-Ju Wang, Jiun-Ming Chen:
Design and Implementation of a Mobile Voting System Using a Novel Oblivious and Proxy Signature. 3075210:1-3075210:16 - Yang Zhou
, Wei Ni
, Kangfeng Zheng, Ren Ping Liu, Yixian Yang:
Scalable Node-Centric Route Mutation for Defense of Large-Scale Software-Defined Networks. 4651395:1-4651395:13 - Qian Meng, Jianfeng Ma
, Kefei Chen, Yinbin Miao, Tengfei Yang:
Comparable Encryption Scheme over Encrypted Cloud Data in Internet of Everything. 6430850:1-6430850:11 - Ru Zhang
, Yanyu Huo, Jianyi Liu
, Fangyu Weng:
Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering. 7536381:1-7536381:9 - Zhen Liu, Huanyu Meng
, Shuang Ren, Feng Liu:
Reliable Collaborative Filtering on Spatio-Temporal Privacy Data. 9127612:1-9127612:11
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.