


default search action
Computers & Electrical Engineering, Volume 59
Volume 59, April 2017
- Zehua Lyu, Xuping Tu, Xiaobing Pei, Hu Liang, Mudar Sarem:
Netlet: A simple and versatile network middleware for peer-to-peer application program. 1-14 - Tallha Akram
, Syed Rameez Naqvi, Sajjad Ali Haider, Muhammad Kamran:
Towards real-time crops surveillance for disease classification: exploiting parallelism in computer vision. 15-26 - R. Muthumeenakshi, T. R. Reshmi, Krishnan Murugan
:
Extended 3PAKE authentication scheme for value-added services in VANETs. 27-38 - A. Karthikeyan
, P. Senthil Kumar:
Randomly prioritized buffer-less routing architecture for 3D Network on Chip. 39-50 - Bander A. Alzahrani:
Secure and scalable control plane for intra-domain publish-subscribe communication. 51-62 - Fatih Basçiftçi
, Ayse Eldem
:
A third eye with human-computer interaction for the visually impaired. 63-72
- Joaquín García
, Gregorio Martínez Pérez:
Introduction to the Special Section on Critical Systems Modelling and Security. 73-75 - Fu-Hau Hsu, Chuan-Sheng Wang, Yu-Liang Hsu, Yung-Pin Cheng, Yu-Hsiang Hsneh:
A client-side detection mechanism for evil twins. 76-85 - Giuseppe Bernieri
, Estefanía Etchevés Miciolino
, Federica Pascucci
, Roberto Setola:
Monitoring system reaction in cyber-physical testbed under cyber-attacks. 86-98 - Saiful Azad
, Musfiq Rahman
, M. S. A. Noman Ranak, B. M. F. Kamal Ruhee, N. Nourin Nisa, Nazrul Kabir, Arafatur Rahman
, Jasni Mohamad Zain
:
VAP code: A secure graphical password for smart devices. 99-109 - P. Varalakshmi, T. Judgi:
Multifaceted trust management framework based on a trust level agreement in a collaborative cloud. 110-125 - Luigi Coppolino
, Salvatore D'Antonio, Giovanni Mazzeo
, Luigi Romano:
Cloud security: Emerging threats and current solutions. 126-140 - Carlos André Batista de Carvalho, Rossana Maria de Castro Andrade
, Miguel Franklin de Castro
, Emanuel Ferreira Coutinho, Nazim Agoulmine:
State of the art and challenges of security SLA for cloud computing. 141-152 - Qin Liu, Guojun Wang, Xuhui Liu, Tao Peng, Jie Wu:
Achieving reliable and secure services in cloud computing environments. 153-164 - Gaurav Somani
, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Muttukrishnan Rajarajan:
DDoS victim service containment to minimize the internal collateral damages in cloud computing. 165-179 - Ming-Yang Su:
Applying episode mining and pruning to identify malicious online attacks. 180-188 - M. R. Gauthama Raman
, Kirthivasan Kannan, V. S. Shankar Sriram
:
Development of Rough Set - Hypergraph Technique for Key Feature Identification in Intrusion Detection Systems. 189-200
- Abhishek Parakh, Zhiwei Wang:
Introduction to the Special Section on Challenges and Solutions in Mobile Systems Security. 201-203 - Yu-Yi Chen, Meng-Lin Tsai
, Fong-Jia Chang:
The design of secure mobile coupon mechanism with the implementation for NFC smartphones. 204-217 - Qi Xie
, Zhixiong Tang, Kefei Chen:
Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks. 218-230 - G. Usha, M. Rajesh Babu, S. Saravana Kumar:
Dynamic anomaly detection using cross layer security in MANET. 231-241 - Shyamala Ramachandran
, Valli Shanmugam:
A two way authentication using bilinear mapping function for wireless sensor networks. 242-249 - Chia-Hui Liu
, Yu-Fang Chung
:
Secure user authentication scheme for wireless healthcare sensor networks. 250-261 - Xianji Jin, Jianquan Liang, Weiming Tong, Lei Lu, Zhongwei Li:
Multi-agent trust-based intrusion detection scheme for wireless sensor networks. 262-273 - Selva Reegan A., E. Baburaj:
Polynomial and multivariate mapping-based triple-key approach for secure key distribution in wireless sensor networks. 274-290 - Yousheng Zhou
, Feng Wang, Fei Tang, Xiaojun Wang
:
Cellular automata based secure distributed storage scheme with integrity proof. 291-304 - Trupil Limbasiya
, Nishant Doshi
:
An analytical study of biometric based remote user authentication schemes using smart cards. 305-321

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.