All Stories

  1. 3D Biometrics: A Survey
  2. Identifying Fraudulent Users in E-commerce Applications through Spatiotemporal Fusion and Selective Aggregation
  3. HandID: Towards Unobtrusive Gesture-independent User Authentication on Smartphones Using Vibration-based Hand Biometrics
  4. Towards behavior-independent in-hand user authentication on smartphone using vibration
  5. Federated learning and protection of user privacy
  6. Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage
  7. Deep Gaussian Mixture-Hidden Markov Model for Classification of EEG Signals
  8. Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication
  9. Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection
  10. A target image-oriented dictionary learning-based method for fully automated latent fingerprint forensic
  11. Content-based multi-source encrypted image retrieval in clouds with privacy preservation
  12. A novel statistical technique for intrusion detection systems
  13. Continuous Authentication Using Eye Movement Response of Implicit Visual Stimuli
  14. A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems
  15. Securing Mobile Healthcare Data: A Smart Card Based Cancelable Finger-Vein Bio-Cryptosystem
  16. Motion Flow Clustering for Moving Vehicle Detection from Satellite High Definition Video
  17. State estimation for a TCP/IP network using terminal sliding-mode methodology
  18. Preserving transaction privacy in bitcoin
  19. A new binary hybrid particle swarm optimization with wavelet mutation
  20. Efficient object proposals extraction for target detection in VHR remote sensing images
  21. Preface: Security and privacy in big data clouds
  22. Privacy-preserving identity-based file sharing in smart city
  23. Design of Alignment-Free Cancelable Fingerprint Templates with Zoned Minutia Pairs
  24. New secure healthcare system using cloud of things
  25. Distributed Segment-Based Anomaly Detection With Kullback–Leibler Divergence in Wireless Sensor Networks
  26. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds
  27. BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications
  28. Enhanced Locality-Sensitive Hashing for Fingerprint Forensics over Large Multi-sensor Databases
  29. Key negotiation schemes for body sensor networks on the surface of the human body
  30. Security in Computing and Communications
  31. A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations
  32. Detecting Anomalous Behavior in Cloud Servers by Nested Arc Hidden SEMI-Markov Model with State Summarization
  33. Cloud-Based Approximate Constrained Shortest Distance Queries over Encrypted Graphs with Privacy Protection
  34. Vulnerability analysis of iPhone 6
  35. Continuous authentication using EEG and face images for trusted autonomous systems
  36. Using game theory with intrinsic motivation to examine anti-hacking policies for autonomous systems
  37. Direct Feature Point Correspondence Discovery for Multiview Images: An Alternative Solution When SIFT-Based Matching Fails
  38. Threshold attribute-based signcryption and its application to authenticated key agreement
  39. Secure searches in the cloud: A survey
  40. FE-SViT
  41. Privacy-Preserving Access to Big Data in the Cloud
  42. Energy Big Data Analytics and Security: Challenges and Opportunities
  43. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios
  44. Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks
  45. Security and privacy in Internet of things: methods, architectures, and solutions
  46. A blind system identification approach to cancelable fingerprint templates
  47. Contactless fingerprint enhancement via intrinsic image decomposition and guided image filtering
  48. A robust multi-constrained model for fingerprint orientation field construction
  49. Sliding-mode observers for real-time DDoS detection
  50. Physiological-signal-based key negotiation protocols for body sensor networks: A survey
  51. A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures
  52. Comparative studies of router-based observation schemes for anomaly detection in TCP/UDP networks
  53. A survey of network anomaly detection techniques
  54. Identity-Based Group Encryption
  55. A General Communication Cost Optimization Framework for Big Data Stream Processing in Geo-Distributed Data Centers
  56. Threshold Attribute-Based Signcryption in Standard Model
  57. Integer Data Zero-Watermark Assisted System Calls Abstraction and Normalization for Host Based Anomaly Detection Systems
  58. Superpixel-Based Graphical Model for Remote Sensing Image Mapping
  59. SOLS: A scheme for outsourced location based service
  60. Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
  61. Impact of trivial quantisation on discrimination power in biometric systems
  62. Partial fingerprint indexing: a combination of local and reconstructed global features
  63. A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion
  64. Emergency data gathering with buffer constraint in actuator-based wireless sensor networks
  65. Towards reliable data feature retrieval and decision engine in host-based anomaly detection systems
  66. Distributed power control with double-layer Stackelberg game and utility learning in cooperative relay networks
  67. A Voronoi neighbor structure-based fingerprint cryptosystem using minutiae descriptors and error-correcting codes
  68. HCSF: A hierarchical clustering algorithm based on swarm intelligence and fuzzy logic for ciphertext search
  69. Physiological-Signal-Based Key Negotiation Protocols for Body Sensor Networks: A Survey
  70. A Cloud Security Assessment System Based on Classifying and Grading
  71. A fast terminal sliding mode observer for TCP/IP network anomaly traffic detection
  72. A Trusted Mobile Payment Scheme Based on Body Area Networks
  73. Issues with Multimodal Biometric Systems
  74. Segment-Based Anomaly Detection with Approximated Sample Covariance Matrix in Wireless Sensor Networks
  75. An Active Cooperation-Aware Spectrum Allocation Mechanism for Body Sensor Networks
  76. Camera motion estimation through monocular normal flow vectors
  77. Securing Body Sensor Networks with Biometric Methods: A New Key Negotiation Method and a Key Sampling Method for Linear Interpolation Encryption
  78. Collaborative Wireless Sensor Networks and Applications
  79. Multi-objective Based Fuzzy Mathematical Programming Model for Green Logistics Network Design Under Uncertainty
  80. A Multistaged Automatic Restoration of Noisy Microscopy Cell Images
  81. Multi-constrained Orientation Field Modeling and Its Application for Fingerprint Indexing
  82. A Reputation Revision Method Based on the Credibility for Cloud Services
  83. A new Lagrange solution to the privacy-preserving general geometric intersection problem
  84. Special issue on “quality of service in wireless and mobile networking”
  85. Enhancing Big Data Security with Collaborative Intrusion Detection
  86. A statistical framework for intrusion detection system
  87. A benchmark 3D fingerprint database
  88. Reliable Bulk-Data Dissemination in Delay Tolerant Networks
  89. The effect of spurious and missing minutiae on delaunay triangulation based on its application to fingerprint authentication
  90. A survey: Error control methods used in bio-cryptography
  91. Evaluating host-based anomaly detection systems: Application of the one-class SVM algorithm to ADFA-LD
  92. Optional multi-biometric cryptosystem based on fuzzy extractor
  93. Security and privacy in internet of things: methods, architectures, and solutions
  94. Distributed collision control with the integration of packet size for congestion control in wireless sensor networks
  95. 3D Fingerprint
  96. A Delaunay Quadrangle-Based Fingerprint Authentication System With Template Protection Using Topology Code for Local Registration and Security Enhancement
  97. Taxonomy of Attacks for Agent-Based Smart Grids
  98. Computer Intrusion Detection Systems
  99. A hierarchical clustering method for big data oriented ciphertext search
  100. An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures
  101. Design of alignment-free cancelable fingerprint templates via curtailed circular convolution
  102. Fingerprint Indexing Based on Combination of Novel Minutiae Triplet Features
  103. Energy-Efficient Cooperative Communications for Multimedia Applications in Multi-Channel Wireless Networks
  104. Evaluating Host-Based Anomaly Detection Systems: Application of the Frequency-Based Algorithms to ADFA-LD
  105. A general transformation from KP-ABE to searchable encryption
  106. Outlier Detection
  107. A Delaunay triangle group based fuzzy vault with cancellability
  108. A Hadamard transform-based method for the design of cancellable fingerprint templates
  109. Evaluating host-based anomaly detection systems: A preliminary analysis of ADFA-LD
  110. Genetic Algorithm for distorted point set matching
  111. Top-k future system call prediction based multi-module anomaly detection system
  112. Performance evaluation of 2D to 3D fingerprint recognition
  113. Biometrics for securing mobile payments: Benefits, challenges and solutions
  114. A Key Management Scheme between Body Sensor Networks and the Base Station
  115. An Energy Efficient Key Management Scheme for Body Sensor Networks
  116. Scalable Hypergrid k-NN-Based Online Anomaly Detection in Wireless Sensor Networks
  117. A multi-module anomaly detection scheme based on system call prediction
  118. Attacks via record multiplicity on cancelable biometrics templates
  119. Cooperative multi-target tracking in passive sensor-based networks
  120. Generation of a new IDS test dataset: Time to retire the KDD collection
  121. A hierarchical pea-based anomaly detection model
  122. Partial Fingerprint Reconstruction with Improved Smooth Extension
  123. A Finger-Vein Based Cancellable Bio-cryptosystem
  124. Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures
  125. Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach
  126. Using incremental subspace and contour template for object tracking
  127. A New Dimensionality Reduction Algorithm for Hyperspectral Image Using Evolutionary Strategy
  128. NDTC: A novel topology-based fingerprint matching algorithm using N-layer Delaunay triangulation net check
  129. A Real-Time NetFlow-based Intrusion Detection System with Improved BBNN and High-Frequency Field Programmable Gate Arrays
  130. Histogram-Based Online Anomaly Detection in Hierarchical Wireless Sensor Networks
  131. Hashed Random Key Pre-distribution Scheme for Large Heterogeneous Sensor Networks
  132. A Delaunay Triangle-Based Fuzzy Extractor for Fingerprint Authentication
  133. Free Search with Adaptive Differential Evolution Exploitation and Quantum-Inspired Exploration
  134. Network Security
  135. Special section: Green computing
  136. Lifetime optimization for reliable broadcast and multicast in wirelessad hocnetworks
  137. Preface of the “Workshop on computational intelligence and cyber security”
  138. High-Order Terminal Sliding-Mode Observers for Anomaly Detection
  139. A Hash Chains Based Key Management Scheme for Wireless Sensor Networks
  140. A General Transformation from KP-ABE to Searchable Encryption
  141. On the Effectiveness of Relaxation Theory for Controlling High Traffic Volumes in Body Sensor Networks
  142. A Bio-inspired Host-Based Multi-engine Detection System with Sequential Pattern Recognition
  143. Terminal sliding mode observer for anomaly detection in TCP/IP networks
  144. Pair-polar coordinate-based cancelable fingerprint templates
  145. Guest Editorial
  146. Foreword from the Conference Chairs
  147. BIOMETRIC AUTHENTICATION FOR MOBILE COMPUTING APPLICATIONS
  148. Mobile device access control: an improved correlation based face authentication scheme and its Java ME application
  149. Bio-cryptographic Key Generation
  150. Editorial: Advances in network and system security
  151. Fingerprint Template Protection
  152. Compatibility of photographed images with touch-based fingerprint verification software
  153. Pseudo random data stream generation for data/images protection in ubiquitous computing environment
  154. An alignment free fingerprint fuzzy extractor using near-equivalent Dual Layer Structure Check (NeDLSC) algorithm
  155. Statistical analysis and security estimation of fingerprint minutia local structure in bio-cryptographic system
  156. Blind channel estimation for single-input multiple-output OFDM systems: zero padding based or cyclic prefix based?
  157. Biometric security for mobile computing
  158. Global Ridge Orientation Modeling for Partial Fingerprint Identification
  159. A frequency domain subspace blind channel estimation method for trailing zero OFDM systems
  160. A mutual-healing key distribution scheme in wireless sensor networks
  161. The Exploration of Network Coding in IEEE 802.15.4 Networks
  162. A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment
  163. Biomentric Fingerprint Template
  164. A pitfall in fingerprint features extraction
  165. A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations
  166. Performance Analysis of Optimal Packet Size for Congestion Control in Wireless Sensor Networks
  167. Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic
  168. A correlation based face verification scheme designed for mobile device access control: From algorithm to Java ME implementation
  169. Highly efficient one-time pad key generation for large volume medical data protection
  170. Biometrics Security and Cryptography
  171. ECG-Based Authentication
  172. Intranet Security via Firewalls
  173. Host-Based Anomaly Intrusion Detection
  174. Network Traffic Analysis and SCADA Security
  175. A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference
  176. A pixel-based scrambling scheme for digital medical images protection
  177. Dual Layer Structure Check (DLSC) fingerprint verification scheme designed for biometric mobile template protection
  178. Building a SCADA Security Testbed
  179. An Efficient Mobile Voting System Security Scheme Based on Elliptic Curve Cryptography
  180. A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection
  181. Rotation estimation of singular points using analytical models
  182. Security in Online Games
  183. Taxonomy and Framework for Integrating Dependability and Security
  184. On Multiscroll Chaotic Attractors in Hysteresis-Based Piecewise-Linear Systems
  185. Investigating Correlation-Based Fingerprint Authentication Schemes for Mobile Devices Using the J2ME technology
  186. A Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and Its Application to Singular-Point Detection and Fingerprint Indexing
  187. Chaotic Cryptography
  188. Enhanced gradient-based algorithm for the estimation of fingerprint orientation fields
  189. NXG03-3: Enhancements for RTT-Fair HighSpeed TCP
  190. A Biometric Encryption Approach Incorporating Fingerprint Indexing in Key Generation
  191. A Novel Hybrid Crypto-Biometric Authentication Scheme for ATM Based Banking Applications
  192. Modelling of SACK TCP and application to the HTTP file transfer environment
  193. Systematic H∞ weighting function selection and its application to the real-time control of a vertical take-off aircraft
  194. Mobile Ad Hoc Networks
  195. Mobile Ad Hoc Networks
  196. Simplifying discrete-time H/sup ∞/ control
  197. A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks
  198. A Gradient Based Weighted Averaging Method for Estimation of Fingerprint Orientation Fields
  199. Analytic models for highspeed TCP fairness analysis
  200. Simulation study of TCP performance under IPv4 within integrated wired and wireless networks
  201. Conjugation and H/sup ∞/ control of discrete-time systems
  202. Robust performance control and analysis of ill-conditioned plants
  203. DSP application in e-commerce security
  204. A note on an analytic model for slow start in TCP
  205. A multi-layer model for anomaly intrusion detection using program sequences of system calls
  206. PPN 2007 PC Co-chairs’ Message
  207. A statistics based design of MAC protocols with distributed collision resolution for ad hoc networks
  208. Wireless Interactive Teaching by Using Keypad-Based ARS
  209. Wireless Interactive Teaching by Using Keypad-Based ARS