[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 9, Issue 14September 2016
Publisher:
  • John Wiley & Sons, Inc.
  • 605 Third Ave. New York, NY
  • United States
ISSN:1939-0114
EISSN:1939-0122
Reflects downloads up to 19 Dec 2024Bibliometrics
Skip Table Of Content Section
article
Issue Information

No abstract is available for this article.

article
Extracting fuzzy attack patterns using an online fuzzy adaptive alert correlation framework

The tremendous numbers of alerts provided by intrusion detection systems have made the alert correlation a vital issue. Despite of the considerable number of proposed methods, the online alert correlation is still an open issue. In this paper we ...

article
Outsourcing secure two-party computation as a black box

Secure multiparty computation SMC offers a technique to preserve functionality and data privacy in mobile applications. Current protocols that make this costly cryptographic construction feasible on mobile devices securely outsource the bulk of the ...

article
A secure chaotic maps-based privacy-protection scheme for multi-server environments

A multi-server environment helps the users to register at the registration center once and can gain numerous network services and resources provided by remote application servers. In order to protect sensitive data from unauthorized disclosure, to ...

article
A universal method for realizing non-repudiable provable data possession in cloud storage

Provable data possession PDP and proofs of retrievability POR are techniques for a client to verify the integrity of outsourced data on an untrusted server, and numerous PDP/POR schemes with public or private verification have been proposed so far. ...

article
An escrow-free online/offline HIBS scheme for privacy protection of people-centric sensing

People-centric sensing PCS, which collects information closely related to human activity and interactions in societies, is stepping into a flourishing time. Along with its great benefits, PCS poses new security challenges such as data integrity and ...

article
Publishing histograms with outliers under data differential privacy

Histograms are important tools for data mining and analysis. Several differentially private publishing schemes for histograms have been proposed recently. Existing differentially private histogram publication schemes have shown that histogram ...

article
Identity-based access control for pro-active message's DTN

Pro-active message's delay tolerant networks DTNs are based on the usage of mobile code to obtain messages that contain their own routing code. This architecture allows applications to use the same network in different ways. The keystone of this type of ...

article
Detecting domain-flux botnet based on DNS traffic features in managed network

Modern botnets such as Zeus and Conficker commonly utilize a technique called domain fluxing or a domain generation algorithm to generate a large number of pseudo-random domain names PDNs dynamically for botnet operators to control their bots. These ...

article
Secure principal component analysis in multiple distributed nodes

Privacy preservation becomes an important issue in recent big data analysis, and many secure multiparty computations have been proposed for the purpose of privacy preservation in the environment of distributed nodes. As a secure multiparty computations ...

article
Design and analysis of the covert channel implemented by behaviors of network users

In this paper, a novel covert channel, called covert behavior channel, is proposed according to behaviors of network users to solve the security and efficiency problem of the traditional covert channel. In the proposed channel, operation sequences of ...

article
A recoverable chaos-based fragile watermarking with high PSNR preservation

The preservation of high peak signal-to-noise ratio of the watermarked image is required in some applications. The chaos-based fragile watermarking proposed by Rawat et al. in 2011 can meet this requirement, for only one LSB plane of the original image ...

article
CP-ABE with outsourced decryption and directionally hidden policy

Ciphertext-policy attribute-based encryption CP-ABE is a novel cryptographic primitive for access controlling. However, the existing CP-ABE schemes are very inefficient as the decryptions involve many expensive pairing operations. Another drawback is ...

article
Anonymous attribute-based proxy re-encryption for access control in cloud computing

As a public key cryptographic primitive, attribute-based encryption ABE is promising in implementing fine-grained access control in cloud computing. However, before ABE comes into practical applications, two challenging issues have to be addressed, that ...

article
Robust off-line e-cash scheme with recoverability and anonymity revocation

Recently, electronic cash has become a hot topic issue with the concurrent sustainable growth of electronic commerce. In practice, however, most current electronic cash schemes do not satisfy all necessary requirements. In this paper, we point out flaws ...

article
Revocable and strongly unforgeable identity-based signature scheme in the standard model

Revocation functionality is crucial for the practicality of the public key cryptosystems, especially for that of identity-based cryptosystems. When some users lose their private keys, the cryptosystems must support an efficient revocation method to ...

article
A refined filter for UHAD to improve anomaly detection

Filtering is used in intrusion detection to remove the insignificant events from a log to facilitate the analysis method to focus on the significant events and to minimize processing overhead. Generally, filtering is performed using filtering rules, ...

article
A comprehensive analysis for fair probability marking based traceback approach in WSNs

Currently, the analysis result of fair probability marking approach can only be got in the single-source linear and single-source tree network, which cannot meet the requirement of applications. This paper fills in this gap by providing an accurate ...

article
A highly efficient and secure electronic cash system based on secure sharing in cloud environment

Online electronic transactions have become more and more popular in recent years. Electronic cash e-cash has acted an important role, but e-cash is digital data that can be copied easily, resulting in double spending. To ensure the security and fairness ...

article
Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

In recent years, Mobile Ad hoc NETworks MANETs have generated great interest among researchers in the development of theoretical and practical concepts, and their implementation under several computing environments. However, MANETs are highly ...

article
Traffic classification for managing Applications' networking profiles

Along with the growing number of applications and end-users, online network attacks and advanced generations of malware have continuously proliferated. Many studies have addressed the issue of intrusion detection by inspecting aggregated network traffic ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.