Issue Information
No abstract is available for this article.
Extracting fuzzy attack patterns using an online fuzzy adaptive alert correlation framework
The tremendous numbers of alerts provided by intrusion detection systems have made the alert correlation a vital issue. Despite of the considerable number of proposed methods, the online alert correlation is still an open issue. In this paper we ...
Outsourcing secure two-party computation as a black box
Secure multiparty computation SMC offers a technique to preserve functionality and data privacy in mobile applications. Current protocols that make this costly cryptographic construction feasible on mobile devices securely outsource the bulk of the ...
A secure chaotic maps-based privacy-protection scheme for multi-server environments
A multi-server environment helps the users to register at the registration center once and can gain numerous network services and resources provided by remote application servers. In order to protect sensitive data from unauthorized disclosure, to ...
A universal method for realizing non-repudiable provable data possession in cloud storage
Provable data possession PDP and proofs of retrievability POR are techniques for a client to verify the integrity of outsourced data on an untrusted server, and numerous PDP/POR schemes with public or private verification have been proposed so far. ...
An escrow-free online/offline HIBS scheme for privacy protection of people-centric sensing
People-centric sensing PCS, which collects information closely related to human activity and interactions in societies, is stepping into a flourishing time. Along with its great benefits, PCS poses new security challenges such as data integrity and ...
Publishing histograms with outliers under data differential privacy
Histograms are important tools for data mining and analysis. Several differentially private publishing schemes for histograms have been proposed recently. Existing differentially private histogram publication schemes have shown that histogram ...
Identity-based access control for pro-active message's DTN
Pro-active message's delay tolerant networks DTNs are based on the usage of mobile code to obtain messages that contain their own routing code. This architecture allows applications to use the same network in different ways. The keystone of this type of ...
Detecting domain-flux botnet based on DNS traffic features in managed network
Modern botnets such as Zeus and Conficker commonly utilize a technique called domain fluxing or a domain generation algorithm to generate a large number of pseudo-random domain names PDNs dynamically for botnet operators to control their bots. These ...
Secure principal component analysis in multiple distributed nodes
Privacy preservation becomes an important issue in recent big data analysis, and many secure multiparty computations have been proposed for the purpose of privacy preservation in the environment of distributed nodes. As a secure multiparty computations ...
Design and analysis of the covert channel implemented by behaviors of network users
In this paper, a novel covert channel, called covert behavior channel, is proposed according to behaviors of network users to solve the security and efficiency problem of the traditional covert channel. In the proposed channel, operation sequences of ...
A recoverable chaos-based fragile watermarking with high PSNR preservation
The preservation of high peak signal-to-noise ratio of the watermarked image is required in some applications. The chaos-based fragile watermarking proposed by Rawat et al. in 2011 can meet this requirement, for only one LSB plane of the original image ...
CP-ABE with outsourced decryption and directionally hidden policy
Ciphertext-policy attribute-based encryption CP-ABE is a novel cryptographic primitive for access controlling. However, the existing CP-ABE schemes are very inefficient as the decryptions involve many expensive pairing operations. Another drawback is ...
Anonymous attribute-based proxy re-encryption for access control in cloud computing
As a public key cryptographic primitive, attribute-based encryption ABE is promising in implementing fine-grained access control in cloud computing. However, before ABE comes into practical applications, two challenging issues have to be addressed, that ...
Robust off-line e-cash scheme with recoverability and anonymity revocation
Recently, electronic cash has become a hot topic issue with the concurrent sustainable growth of electronic commerce. In practice, however, most current electronic cash schemes do not satisfy all necessary requirements. In this paper, we point out flaws ...
Revocable and strongly unforgeable identity-based signature scheme in the standard model
Revocation functionality is crucial for the practicality of the public key cryptosystems, especially for that of identity-based cryptosystems. When some users lose their private keys, the cryptosystems must support an efficient revocation method to ...
A refined filter for UHAD to improve anomaly detection
Filtering is used in intrusion detection to remove the insignificant events from a log to facilitate the analysis method to focus on the significant events and to minimize processing overhead. Generally, filtering is performed using filtering rules, ...
A comprehensive analysis for fair probability marking based traceback approach in WSNs
Currently, the analysis result of fair probability marking approach can only be got in the single-source linear and single-source tree network, which cannot meet the requirement of applications. This paper fills in this gap by providing an accurate ...
A highly efficient and secure electronic cash system based on secure sharing in cloud environment
Online electronic transactions have become more and more popular in recent years. Electronic cash e-cash has acted an important role, but e-cash is digital data that can be copied easily, resulting in double spending. To ensure the security and fairness ...
Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges
In recent years, Mobile Ad hoc NETworks MANETs have generated great interest among researchers in the development of theoretical and practical concepts, and their implementation under several computing environments. However, MANETs are highly ...
Traffic classification for managing Applications' networking profiles
Along with the growing number of applications and end-users, online network attacks and advanced generations of malware have continuously proliferated. Many studies have addressed the issue of intrusion detection by inspecting aggregated network traffic ...