Found: 86
Select item for more details and to access through your institution.
DLLMiner: structural mining for malware detection.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3311, doi. 10.1002/sec.1255
- By:
- Publication type:
- Article
Performance evaluation of twisted Edwards-form elliptic curve cryptography for wireless sensor nodes.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3311, doi. 10.1002/sec.1254
- By:
- Publication type:
- Article
Achieving CCA security from DCCA security more efficiently by using the KEM+DEM hybrid paradigm.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3323, doi. 10.1002/sec.1256
- By:
- Publication type:
- Article
Triple chaotic image scrambling on RGB - a random image encryption approach.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3335, doi. 10.1002/sec.1257
- By:
- Publication type:
- Article
Leakage-resilient certificate-based encryption.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3346, doi. 10.1002/sec.1258
- By:
- Publication type:
- Article
Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3356, doi. 10.1002/sec.1263
- By:
- Publication type:
- Article
A dynamic identity-based user authentication scheme for remote login systems.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3372, doi. 10.1002/sec.1264
- By:
- Publication type:
- Article
An anonymous and secure biometric-based enterprise digital rights management system for mobile environment.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3383, doi. 10.1002/sec.1266
- By:
- Publication type:
- Article
Biometric key-binding using lattice masking.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3405, doi. 10.1002/sec.1267
- By:
- Publication type:
- Article
Sealed-bid auction: a cryptographic solution to bid-rigging attack in the collusive environment.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3415, doi. 10.1002/sec.1268
- By:
- Publication type:
- Article
Intraclass and interclass correlation coefficient-based feature selection in NIDS dataset.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3441, doi. 10.1002/sec.1269
- By:
- Publication type:
- Article
LAWRA: a layered wrapper feature selection approach for network attack detection.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3459, doi. 10.1002/sec.1270
- By:
- Publication type:
- Article
An optimization process to identify outliers generated by intrusion detection systems.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3469, doi. 10.1002/sec.1271
- By:
- Publication type:
- Article
First step towards preserving the privacy of cloud-based IDS security policies.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3481, doi. 10.1002/sec.1272
- By:
- Publication type:
- Article
An adaptable and scalable membership management for the iTrust information search and retrieval system.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3492, doi. 10.1002/sec.1273
- By:
- Publication type:
- Article
Efficient revocable identity-based encryption from multilinear maps.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3511, doi. 10.1002/sec.1274
- By:
- Publication type:
- Article
Auditing overhead, auditing adaptation, and benchmark evaluation in Linux.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3523, doi. 10.1002/sec.1277
- By:
- Publication type:
- Article
FFT-based multidimensional linear attack on PRESENT using the 2-bit-fixed characteristic.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3535, doi. 10.1002/sec.1278
- By:
- Publication type:
- Article
Optimized Karatsuba squaring on 8-bit AVR processors.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3546, doi. 10.1002/sec.1279
- By:
- Publication type:
- Article
Detecting spam through their Sender Policy Framework records.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3555, doi. 10.1002/sec.1280
- By:
- Publication type:
- Article
Survey and benchmark of lightweight block ciphers for MSP430 16-bit microcontroller.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3564, doi. 10.1002/sec.1281
- By:
- Publication type:
- Article
MOSKG: countering kernel rootkits with a secure paging mechanism.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3580, doi. 10.1002/sec.1282
- By:
- Publication type:
- Article
A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3592, doi. 10.1002/sec.1283
- By:
- Publication type:
- Article
Identity-based proxy signatures: a generic construction and a concrete scheme from RSA.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3602, doi. 10.1002/sec.1284
- By:
- Publication type:
- Article
Universally composable issuer-free adaptive oblivious transfer with access policy.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3615, doi. 10.1002/sec.1285
- By:
- Publication type:
- Article
Use of Tsallis entropy in detection of SYN flood DoS attacks.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3634, doi. 10.1002/sec.1286
- By:
- Publication type:
- Article
A DCT-based privacy-preserving approach for efficient data mining.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3641, doi. 10.1002/sec.1287
- By:
- Publication type:
- Article
Dynamic threshold changeable multi-policy secret sharing scheme.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3653, doi. 10.1002/sec.1288
- By:
- Publication type:
- Article
Compression and encryption for remote sensing image using chaotic system.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3659, doi. 10.1002/sec.1289
- By:
- Publication type:
- Article
An empirical investigation into path divergences for concolic execution using CREST.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3667, doi. 10.1002/sec.1290
- By:
- Publication type:
- Article
New methods for public key cryptosystems based on XTR.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3682, doi. 10.1002/sec.1291
- By:
- Publication type:
- Article
Achieving fairness by sequential equilibrium in rational two-party computation under incomplete information.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3690, doi. 10.1002/sec.1292
- By:
- Publication type:
- Article
A variant of Baptista's encryption scheme.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3701, doi. 10.1002/sec.1293
- By:
- Publication type:
- Article
Efficient revocable certificateless public key encryption with a delegated revocation authority.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3713, doi. 10.1002/sec.1294
- By:
- Publication type:
- Article
A key management technique based on elliptic curves for static wireless sensor networks.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3726, doi. 10.1002/sec.1295
- By:
- Publication type:
- Article
Secure broadcast in distributed networks with strong adversaries.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3739, doi. 10.1002/sec.1296
- By:
- Publication type:
- Article
Identity-based signcryption from lattices.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3751, doi. 10.1002/sec.1297
- By:
- Publication type:
- Article
Achieving data privacy on hybrid cloud.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3771, doi. 10.1002/sec.1298
- By:
- Publication type:
- Article
An enhanced privacy preserving remote user authentication scheme with provable security.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3782, doi. 10.1002/sec.1299
- By:
- Publication type:
- Article
Lattice-based multi-use unidirectional proxy re-encryption.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3796, doi. 10.1002/sec.1300
- By:
- Publication type:
- Article
On the undetectability of transcoding steganography.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3804, doi. 10.1002/sec.1301
- By:
- Publication type:
- Article
A new metric for flow-level filtering of low-rate DDoS attacks.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3815, doi. 10.1002/sec.1302
- By:
- Publication type:
- Article
Risk adaptive hybrid RFID access control system.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3826, doi. 10.1002/sec.1303
- By:
- Publication type:
- Article
Attribute-based credentials with cryptographic collusion prevention.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3836, doi. 10.1002/sec.1304
- By:
- Publication type:
- Article
A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3847, doi. 10.1002/sec.1305
- By:
- Publication type:
- Article
K-anonymity against neighborhood attacks in weighted social networks.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3864, doi. 10.1002/sec.1306
- By:
- Publication type:
- Article
Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detection.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3883, doi. 10.1002/sec.1307
- By:
- Publication type:
- Article
A novel bit scalable leakage model based on genetic algorithm.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3896, doi. 10.1002/sec.1308
- By:
- Publication type:
- Article
A novel one-to-many and many-to-one asymmetric encryption model and its algorithms.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3906, doi. 10.1002/sec.1309
- By:
- Publication type:
- Article
A pragmatic approach towards secure sharing of digital objects.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3914, doi. 10.1002/sec.1310
- By:
- Publication type:
- Article