All Stories

  1. Security Analysis of Visual based Share Authentication and Algorithms for Invalid Shares Generation in Malicious Model
  2. Enhancing Robustness of Malware Detection Model Against White Box Adversarial Attacks
  3. Multi-Keyword Searchable Encryption for E-Health System With Multiple Data Writers and Readers
  4. Multi-Keyword Searchable Encryption for E-Health System With Multiple Data Writers and Readers
  5. A Trust-Integrated RPL Protocol to Detect Blackhole Attack in Internet of Things
  6. Privacy preserving secure expansive aggregation with malicious node identification in linear wireless sensor networks
  7. Detecting Intra-Conflicts in Non-Functional Requirements
  8. 6MID:Mircochain based Intrusion Detection for 6LoWPAN based IoT networks
  9. Multi-writer multi-reader conjunctive keyword searchable encryption
  10. Simple index based symmetric searchable encryption with result verifiability
  11. Multi-writer Multi-reader Boolean Keyword Searchable Encryption
  12. R-OO-KASE: Revocable Online/Offline Key Aggregate Searchable Encryption
  13. P2 KASE A2 - Privacy Preserving Key Aggregate Searchable Encryption supporting Authentication and Access Control on Multi-Delegation
  14. CRSQ-KASE: Key Aggregate Searchable Encryption Supporting Conjunctive Range and Sort Query on Multi-owner Encrypted Data
  15. A Semi-automated Approach to Generate an Adaptive Quality Attribute Relationship Matrix
  16. Constructing a Knowledge-Based Quality Attributes Relationship Matrix to Identify Conflicts in Non-Functional Requirements
  17. Decentralized Context Aware Access Control Model for Internet of Things
  18. MULKASE: a novel approach for key-aggregate searchable encryption for multi-owner data
  19. Blackhole Detection in 6LoWPAN Based Internet of Things: An Anomaly Based Approach
  20. Novel Approach of Key Predistribution for Grid Based Sensor Networks
  21. An Ontological Approach to Specify Conflicts among Non-Functional Requirements
  22. BMMI-tree: A Peer-to-Peer m-ary tree using 1-m node splitting for an efficient multidimensional complex query search
  23. BTG-RKASE: Privacy Preserving Revocable Key Aggregate Searchable Encryption with Fine-grained Multi-delegation & Break-The-Glass Access Control
  24. Improving multidimensional point query search using multi-way peer-to-peer tree network
  25. LPM: A lightweight authenticated packet marking approach for IP traceback
  26. Encrypted data ordering with functional encryption
  27. Privacy Preserving, Verifiable and Resilient Data Aggregation in Grid-Based Networks
  28. A survey of simulators for P2P overlay networks with a case study of the P2P tree overlay using an event-driven simulator
  29. Novel Approach for Pre-distributing Keys in WSNs for Linear Infrastructure
  30. Multiuser Searchable Encryption with Token Freshness Verification
  31. Baseline Intrusion Detection Framework for 6LoWPAN Devices
  32. Preface
  33. A novel approach for privacy homomorphism using attribute-based encryption
  34. Optimizing test case generation in glass box testing using Bio-inspired Algorithms
  35. Concealed data aggregation in wireless sensor networks: A comprehensive survey
  36. A secure expansive aggregation in Wireless Sensor Networks for linear infrasturcture
  37. An Excursion to Software Development Life Cycle Models
  38. A Clustering Approach Using Fractional Calculus-Bacterial Foraging Optimization Algorithm for k-Anonymization in Privacy Preserving Data Mining
  39. A novel privacy-preserving scheme for collaborative frequent itemset mining across vertically partitioned data
  40. Malleability Resilient Concealed Data Aggregation in Wireless Sensor Networks
  41. A Novel Way to Relate Ontology Classes
  42. Evaluating the impact of fanout and dimension on the performance of a hybrid model for multidimensional indexing in peer-to-peer m-ary tree network
  43. Functional Encryption in IoT E-Health Care System
  44. Hybrid Secure Data Aggregation in Wireless Sensor Networks
  45. A secure data aggregation protocol for outlier detection in wireless sensor networks using aggregate Message Authentication Code
  46. E-LEACH: Improving the LEACH protocol for privacy preservation in secure data aggregation in Wireless Sensor Networks
  47. A Hybrid Dynamic Load Balancing Algorithm for Distributed Systems Using Genetic Algorithms
  48. Analysis and Evaluation of Novel Privacy Preserving Techniques for Collaborative Temporal Association Rule Mining Using Secret Sharing
  49. Integrity and Privacy Preserving Secure Data Aggregation in Wireless Sensor Networks
  50. A Peer-to-Peer multiway tree network with efficient range query search using multidimensional indexing
  51. Privacy Preserving Distributed K-Means Clustering in Malicious Model Using Verifiable Secret Sharing Scheme
  52. A Novel Approach for Searchable CP-ABE with Hidden Ciphertext-Policy
  53. A Novel Bloom Filter Based Variant of Elliptic Curve Digital Signature Algorithm for Wireless Sensor Networks
  54. Aggregate MAC Based Authentication for Secure Data Aggregation in Wireless Sensor Networks
  55. Analysis and Evaluation of Schemes for Secure Sum in Collaborative Frequent Itemset Mining across Horizontally Partitioned Data
  56. Malleability Resilient Concealed Data Aggregation
  57. Privacy and Integrity Preserving Secure Data Aggregation in Wireless Sensor Networks
  58. Fully secure CP-ABE with constant ciphertext length
  59. Modeling and analysis of internet key exchange protocolv2 and a proposal for its variant
  60. AB-OR: Improving the Efficiency in Onion Routing Using Attribute Based Cryptography
  61. Privacy Preserving Distributed K-Means Clustering in Malicious Model Using Zero Knowledge Proof
  62. Novel algorithms for load balancing using hybrid approach in distributed systems
  63. Analysis of Significant Components for Designing an Effective Dynamic Load Balancing Algorithm in Distributed Systems
  64. DoS Attacks in Mobile Ad Hoc Networks: A Survey
  65. A Novel Approach for GrayHole and BlackHole Attacks in Mobile Ad Hoc Networks
  66. A Novel Solution for Grayhole Attack in AODV Based MANETs
  67. A Novel Approach for Web Services Discovery Using Rough Sets
  68. A Sensitive Attribute Based Clustering Method for k-Anonymization
  69. An Efficient Approach for Privacy Preserving Distributed K-Means Clustering Based on Shamir’s Secret Sharing Scheme
  70. Anonymity in Attribute-Based Group Signatures
  71. Hidden Access Structure Ciphertext Policy Attribute Based Encryption with Constant Length Ciphertext
  72. Constant ciphertext length in multi-authority Ciphertext Policy Attribute Based Encryption
  73. ID-based secure key generation protocol
  74. Evaluating Homomorphic Encryption Algorithms for Privacy in Wireless Sensor Networks
  75. Analytical Parametric Evaluation of Dynamic Load Balancing Algorithms in Distributed Systems
  76. Detection of wormhole attacks in wireless sensor network
  77. Exploring Homomorphic Encryption in Wireless Sensor Networks
  78. Optimizing the Hybrid Approach for Time Synchronization in Wireless Sensor Networks
  79. A taxonomy of security attacks on the advanced encryption standard
  80. Analysis of Time Synchronization Protocols in Wireless Sensor Networks
  81. Replay Protection at the Link Layer Security in Wireless Sensor Networks
  82. Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks