Zeitschrift Mobile Networks and Applications Ausgabe 4/2021 Special Issue: Security and Privacy Challenges in Real World Situations share TEILEN Suchen insite SUCHEN Inhaltsverzeichnis (36 Artikel) 11.11.2020 Editorial: Security and Privacy in Computing and Communications Zheli Liu, Jin Li, Ilsun You, Siu-Ming Yiu 09.01.2020 A Revocable Group Signatures Scheme to Provide Privacy-Preserving Authentications Xiaohan Yue, Mengzhe Xi, Bing Chen, Mingchao Gao, Yuan He, Jian Xu 26.12.2019 Privacy-Preserving Top-k Location-based Services Retrieval in Mobile Internet Na Wang, Jian Li, Junsong Fu, Yan Zheng 21.12.2019 Throughput Analysis of Smart Buildings-oriented Wireless Networks under Jamming Attacks Xianglin Wei, Tongxiang Wang, Chaogang Tang 17.01.2020 Cognitive Radio Based System for Best Effort Communications in Sound-based Covert Channel for IoT Environments Jorge E. Coyac-Torres, Mario E. Rivero-Angeles, Eleazar Aguirre-Anaya 15.01.2020 Intrusion Detection System for IoT Heterogeneous Perceptual Network Man Zhou, Lansheng Han, Hongwei Lu, Cai Fu 11.01.2020 Role-Based Access Control Model for Cloud Storage Using Identity-Based Cryptosystem Jian Xu, Yanbo Yu, Qingyu Meng, Qiyu Wu, Fucai Zhou 21.12.2019 A Timestamp-Regulating VoLTE Covert Channel against Statistical Analysis Zhang Quanxin, Zhu Mengyan, Liang Chen, Wang Kunqing, Yang Kai, Li Yuanzhang 18.01.2020 An Efficient Bounded Model Checking Approach for Web Service Composition Yuanzhang Li, Dongyan Ma, Chen Liu, Wencong Han, Hongwei Jiang, Jingjing Hu 06.01.2020 PRIA: a Multi-source Recognition Method Based on Partial Observation in SIR Model Yong Ding, Xiaoqing Cui, Huiyong Wang, Kun Zhang 01.02.2020 A Privacy-sensitive Service Selection Method Based on Artificial Fish Swarm Algorithm in the Internet of Things Bing Jia, Lifei Hao, Chuxuan Zhang, Baoqi Huang 16.12.2019 Security Assessment for Interdependent Heterogeneous Cyber Physical Systems Hao Peng, Zhe Kan, Dandan Zhao, Jianmin Han 19.12.2019 Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT Jing Li, Xiangyan Tang, Zhijun Wei, Yu Wang, Wenbin Chen, Yu-an Tan 20.01.2020 | Correction Correction to: Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT Jing Li, Xiangyan Tang, Zhijun Wei, Yu Wang, Wenbin Chen, Yu-an Tan 21.12.2019 A Graded Reversible Watermarking Scheme for Relational Data Ruitao Hou, Hequn Xian 06.01.2020 A Novel Algorithm for Improving Malicious Node Detection Effect in Wireless Sensor Networks Hongyu Yang, Xugao Zhang, Fang Cheng 04.01.2020 A Privacy-preserving Fuzzy Search Scheme Supporting Logic Query over Encrypted Cloud Data Shaojing Fu, Qi Zhang, Nan Jia, Ming Xu 02.01.2020 Quadratic Poly Certificateless Inductive Signcryption for Network Security A. Sumithra Open Access 06.01.2020 An Efficient Scheme of Cloud Data Assured Deletion Yuechi Tian, Tong Shao, Zhen Li PDF-Version jetzt herunterladen Zum Volltext 27.01.2020 Cryptanalysis of a Public Key Cryptosystem Based on Data Complexity under Quantum Environment Zhengjun Jing, Chunsheng Gu, Chunpeng Ge, Peizhong Shi 20.01.2020 An Evolutionary-Based Black-Box Attack to Deep Neural Network Classifiers Yutian Zhou, Yu-an Tan, Quanxin Zhang, Xiaohui Kuang, Yahong Han, Jingjing Hu Open Access 06.02.2020 Network Risk Assessment Based on Baum Welch Algorithm and HMM Chundong Wang, Kongbo Li, Xiaonan He PDF-Version jetzt herunterladen Zum Volltext 14.01.2020 A Confidence-Guided Evaluation for Log Parsers Inner Quality Xueshuo Xie, Zhi Wang, Xuhang Xiao, Ye Lu, Shenwei Huang, Tao Li 20.01.2020 A Fault Tolerant Mechanism for UE Authentication in 5G Networks Fang-Yie Leu, Kun-Lin Tsai, Heru Susanto, Cheng-Yan Gu, Ilsun You 08.01.2020 Malware Detection Based on Multi-level and Dynamic Multi-feature Using Ensemble Learning at Hypervisor Jian Zhang, Cheng Gao, Liangyi Gong, Zhaojun Gu, Dapeng Man, Wu Yang, Wenzhen Li 07.01.2020 Secure Encrypted Data Deduplication Based on Data Popularity Yunlong He, Hequn Xian, Liming Wang, Shuguang Zhang 02.01.2020 Accurate and Cognitive Intrusion Detection System (ACIDS): a Novel Black Hole Detection Mechanism in Mobile Ad Hoc Networks S. Sivanesh, V. R. Sarma Dhulipala 11.01.2020 MF-CNN: a New Approach for LDoS Attack Detection Based on Multi-feature Fusion and CNN Dan Tang, Liu Tang, Wei Shi, Sijia Zhan, Qiuwei Yang 06.01.2020 Research on Intelligent Detection of Command Level Stack Pollution for Binary Program Analysis Hui Lu, Chengjie Jin, Xiaohan Helu, Man Zhang, Yanbin Sun, Yi Han, Zhihong Tian 22.02.2020 ShadowFPE: New Encrypted Web Application Solution Based on Shadow DOM Xiaojie Guo, Yanyu Huang, Jinhui Ye, Sijie Yin, Min Li, Zhaohui Li, Siu-Ming Yiu, Xiaochun Cheng 11.05.2021 Convergence of 5G Technologies, Artificial Intelligence and Cybersecurity of Networked Societies for the Cities of Tomorrow Trung Q. Duong, Van-Phuc Hoang, Cong-Kha Pham 28.04.2021 Energy efficiency of full-duplex cognitive radio in low-power regimes under imperfect spectrum sensing M. Ranjbar, H. L. Nguyen, N. H. Tran, T. Karacolak, S. Sastry, L. D. Nguyen 30.04.2021 ClusTi: Clustering Method for Table Structure Recognition in Scanned Images Arthur Zucker, Younes Belkada, Hanh Vu, Van Nam Nguyen 01.05.2021 Evaluating the Performance of Full-Duplex Energy Harvesting Vehicle-to-Vehicle Communication System over Double Rayleigh Fading Channels Ba Cao Nguyen, Tran Manh Hoang, Xuan Nam Tran, Xuan Nghia Pham, Le The Dung 17.05.2021 Meteorological and Hydrological Drought Assessment for Dong Nai River Basin, Vietnam under Climate Change Vu Thuy Linh, Vo Ngoc Quynh Tram, Ho Minh Dung, Dang Nguyen Dong Phuong, Nguyen Duy Liem, Long D. Nguyen, Cheng Yin, Ayse Kortun, Nguyen Kim Loi 29.05.2021 A Reliable Link-Adaptive Position-Based Routing Protocol for Flying ad hoc Network Qamar Usman, Omer Chughtai, Nadia Nawaz, Zeeshan Kaleem, Kishwer Abdul Khaliq, Long D. Nguyen