Security and Communication Networks

Cover image for Vol. 5 Issue 11

November 2012

Volume 5, Issue 11

Pages 1221–1276, i–i

  1. Editorial

    1. Top of page
    2. Editorial
    3. Special Issue Papers
    4. Call for Papers
    1. Special issue on security in ubiquitous computing (pages 1221–1222)

      Wenyu Qu, Yang Xiang and Yong Zhang

      Version of Record online: 29 AUG 2012 | DOI: 10.1002/sec.635

  2. Special Issue Papers

    1. Top of page
    2. Editorial
    3. Special Issue Papers
    4. Call for Papers
    1. Auction-based task allocation with trust management for shared sensor networks (pages 1223–1234)

      Neda Edalat, Wendong Xiao, Mehul Motani, Nirmalya Roy and Sajal K. Das

      Version of Record online: 3 OCT 2012 | DOI: 10.1002/sec.631

      Thumbnail image of graphical abstract

      In this paper, the distributed task allocation problem in sensor networks with multiple concurrent applications is modeled as a reverse combinatorial auction, in which the sensor nodes bid cost values according to their available resources for the subset of the applications' tasks. For the bidders and the auctioneer to estimate each other's trustworthiness, a real-time trust management module is introduced in the auction procedure to validate the reliable bid value and determine faulty nodes and malicious entities.

    2. Classifying different denial-of-service attacks in cloud computing using rule-based learning (pages 1235–1247)

      Md Tanzim Khorshed, A B M Shawkat Ali and Saleh A. Wasimi

      Version of Record online: 27 SEP 2012 | DOI: 10.1002/sec.621

      Thumbnail image of graphical abstract

      This research addresses the well-known denial-of-service attacks in cloud computing. The attack classification performances are ranked using statistical ranking-based methods, and it is found that the rule-based learning technique C4.5, from a set of popular learning algorithms, is an efficient tool to classify the various denial-of-service attacks in cloud platform.

    3. Enhanced authentication for commercial video services (pages 1248–1259)

      Xinyi Huang, Cheng-Kang Chu, Hung-Min Sun, Jianying Zhou and Robert H. Deng

      Version of Record online: 29 AUG 2012 | DOI: 10.1002/sec.620

      Thumbnail image of graphical abstract

      This paper investigates the authentication in commercial video services using a recently proposed protocol, the Sun–Leu protocol, as baseline. We provide a detailed analysis of the Sun–Leu protocol and present an enhanced authentication scheme.

    4. A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography (pages 1260–1266)

      Muhammad Khurram Khan and Debiao He

      Version of Record online: 5 JUL 2012 | DOI: 10.1002/sec.573

      Thumbnail image of graphical abstract

      We propose a new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography. Security analysis shows that our scheme could resist various attacks. Performance analysis shows our scheme is more suitable for practical applications.

    5. Reversible secret image sharing with steganography and dynamic embedding (pages 1267–1276)

      Wei-Tong Hu, Ming-Chu Li, Cheng Guo and Yi-Zhi Ren

      Version of Record online: 21 JUN 2012 | DOI: 10.1002/sec.567

      Thumbnail image of graphical abstract

      The key findings are the following: (i) least significant bit construction is proposed to do secret image sharing; (ii) no pixel expansion or extra storage is needed; and (iii) both the host image and the secret image can be revealed losslessly.

  3. Call for Papers

    1. Top of page
    2. Editorial
    3. Special Issue Papers
    4. Call for Papers

SEARCH

SEARCH BY CITATION