Skip to main content

Mobile Networks and Applications

Ausgabe 4/2021

Special Issue: Security and Privacy Challenges in Real World Situations

Inhalt (36 Artikel)

Editorial: Security and Privacy in Computing and Communications

Zheli Liu, Jin Li, Ilsun You, Siu-Ming Yiu

A Revocable Group Signatures Scheme to Provide Privacy-Preserving Authentications

Xiaohan Yue, Mengzhe Xi, Bing Chen, Mingchao Gao, Yuan He, Jian Xu

Intrusion Detection System for IoT Heterogeneous Perceptual Network

Man Zhou, Lansheng Han, Hongwei Lu, Cai Fu

A Timestamp-Regulating VoLTE Covert Channel against Statistical Analysis

Zhang Quanxin, Zhu Mengyan, Liang Chen, Wang Kunqing, Yang Kai, Li Yuanzhang

An Efficient Bounded Model Checking Approach for Web Service Composition

Yuanzhang Li, Dongyan Ma, Chen Liu, Wencong Han, Hongwei Jiang, Jingjing Hu

Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT

Jing Li, Xiangyan Tang, Zhijun Wei, Yu Wang, Wenbin Chen, Yu-an Tan

Correction

Correction to: Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT

Jing Li, Xiangyan Tang, Zhijun Wei, Yu Wang, Wenbin Chen, Yu-an Tan

Open Access

An Efficient Scheme of Cloud Data Assured Deletion

Yuechi Tian, Tong Shao, Zhen Li

An Evolutionary-Based Black-Box Attack to Deep Neural Network Classifiers

Yutian Zhou, Yu-an Tan, Quanxin Zhang, Xiaohui Kuang, Yahong Han, Jingjing Hu

Open Access

Network Risk Assessment Based on Baum Welch Algorithm and HMM

Chundong Wang, Kongbo Li, Xiaonan He

A Confidence-Guided Evaluation for Log Parsers Inner Quality

Xueshuo Xie, Zhi Wang, Xuhang Xiao, Ye Lu, Shenwei Huang, Tao Li

A Fault Tolerant Mechanism for UE Authentication in 5G Networks

Fang-Yie Leu, Kun-Lin Tsai, Heru Susanto, Cheng-Yan Gu, Ilsun You

Malware Detection Based on Multi-level and Dynamic Multi-feature Using Ensemble Learning at Hypervisor

Jian Zhang, Cheng Gao, Liangyi Gong, Zhaojun Gu, Dapeng Man, Wu Yang, Wenzhen Li

Secure Encrypted Data Deduplication Based on Data Popularity

Yunlong He, Hequn Xian, Liming Wang, Shuguang Zhang

Research on Intelligent Detection of Command Level Stack Pollution for Binary Program Analysis

Hui Lu, Chengjie Jin, Xiaohan Helu, Man Zhang, Yanbin Sun, Yi Han, Zhihong Tian

ShadowFPE: New Encrypted Web Application Solution Based on Shadow DOM

Xiaojie Guo, Yanyu Huang, Jinhui Ye, Sijie Yin, Min Li, Zhaohui Li, Siu-Ming Yiu, Xiaochun Cheng

Energy efficiency of full-duplex cognitive radio in low-power regimes under imperfect spectrum sensing

M. Ranjbar, H. L. Nguyen, N. H. Tran, T. Karacolak, S. Sastry, L. D. Nguyen

ClusTi: Clustering Method for Table Structure Recognition in Scanned Images

Arthur Zucker, Younes Belkada, Hanh Vu, Van Nam Nguyen

Meteorological and Hydrological Drought Assessment for Dong Nai River Basin, Vietnam under Climate Change

Vu Thuy Linh, Vo Ngoc Quynh Tram, Ho Minh Dung, Dang Nguyen Dong Phuong, Nguyen Duy Liem, Long D. Nguyen, Cheng Yin, Ayse Kortun, Nguyen Kim Loi

A Reliable Link-Adaptive Position-Based Routing Protocol for Flying ad hoc Network

Qamar Usman, Omer Chughtai, Nadia Nawaz, Zeeshan Kaleem, Kishwer Abdul Khaliq, Long D. Nguyen

Aktuelle Ausgaben

Scrollen für mehr

Benutzen Sie die Pfeiltasten für mehr

Scrollen oder Pfeiltasten für mehr

Neuer Inhalt