All Stories

  1. Towards behavior-independent in-hand user authentication on smartphone using vibration
  2. Federated learning and protection of user privacy
  3. Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage
  4. Deep Gaussian Mixture-Hidden Markov Model for Classification of EEG Signals
  5. Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication
  6. Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection
  7. A target image-oriented dictionary learning-based method for fully automated latent fingerprint forensic
  8. Content-based multi-source encrypted image retrieval in clouds with privacy preservation
  9. A novel statistical technique for intrusion detection systems
  10. Continuous Authentication Using Eye Movement Response of Implicit Visual Stimuli
  11. A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems
  12. Securing Mobile Healthcare Data: A Smart Card Based Cancelable Finger-Vein Bio-Cryptosystem
  13. Motion Flow Clustering for Moving Vehicle Detection from Satellite High Definition Video
  14. State estimation for a TCP/IP network using terminal sliding-mode methodology
  15. Preserving transaction privacy in bitcoin
  16. A new binary hybrid particle swarm optimization with wavelet mutation
  17. Efficient object proposals extraction for target detection in VHR remote sensing images
  18. Preface: Security and privacy in big data clouds
  19. Privacy-preserving identity-based file sharing in smart city
  20. Design of Alignment-Free Cancelable Fingerprint Templates with Zoned Minutia Pairs
  21. New secure healthcare system using cloud of things
  22. Distributed Segment-Based Anomaly Detection With Kullback–Leibler Divergence in Wireless Sensor Networks
  23. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds
  24. BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications
  25. Enhanced Locality-Sensitive Hashing for Fingerprint Forensics over Large Multi-sensor Databases
  26. Key negotiation schemes for body sensor networks on the surface of the human body
  27. Security in Computing and Communications
  28. A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations
  29. Detecting Anomalous Behavior in Cloud Servers by Nested Arc Hidden SEMI-Markov Model with State Summarization
  30. Cloud-Based Approximate Constrained Shortest Distance Queries over Encrypted Graphs with Privacy Protection
  31. Vulnerability analysis of iPhone 6
  32. Continuous authentication using EEG and face images for trusted autonomous systems
  33. Using game theory with intrinsic motivation to examine anti-hacking policies for autonomous systems
  34. Direct Feature Point Correspondence Discovery for Multiview Images: An Alternative Solution When SIFT-Based Matching Fails
  35. Threshold attribute-based signcryption and its application to authenticated key agreement
  36. Secure searches in the cloud: A survey
  37. FE-SViT
  38. Privacy-Preserving Access to Big Data in the Cloud
  39. Energy Big Data Analytics and Security: Challenges and Opportunities
  40. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios
  41. Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks
  42. Security and privacy in Internet of things: methods, architectures, and solutions
  43. A blind system identification approach to cancelable fingerprint templates
  44. Contactless fingerprint enhancement via intrinsic image decomposition and guided image filtering
  45. A robust multi-constrained model for fingerprint orientation field construction
  46. Sliding-mode observers for real-time DDoS detection
  47. Physiological-signal-based key negotiation protocols for body sensor networks: A survey
  48. A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures
  49. Comparative studies of router-based observation schemes for anomaly detection in TCP/UDP networks
  50. A survey of network anomaly detection techniques
  51. Identity-Based Group Encryption
  52. A General Communication Cost Optimization Framework for Big Data Stream Processing in Geo-Distributed Data Centers
  53. Threshold Attribute-Based Signcryption in Standard Model
  54. Integer Data Zero-Watermark Assisted System Calls Abstraction and Normalization for Host Based Anomaly Detection Systems
  55. Superpixel-Based Graphical Model for Remote Sensing Image Mapping
  56. SOLS: A scheme for outsourced location based service
  57. Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
  58. Impact of trivial quantisation on discrimination power in biometric systems
  59. Partial fingerprint indexing: a combination of local and reconstructed global features
  60. A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion
  61. Emergency data gathering with buffer constraint in actuator-based wireless sensor networks
  62. Towards reliable data feature retrieval and decision engine in host-based anomaly detection systems
  63. Distributed power control with double-layer Stackelberg game and utility learning in cooperative relay networks
  64. A Voronoi neighbor structure-based fingerprint cryptosystem using minutiae descriptors and error-correcting codes
  65. HCSF: A hierarchical clustering algorithm based on swarm intelligence and fuzzy logic for ciphertext search
  66. Physiological-Signal-Based Key Negotiation Protocols for Body Sensor Networks: A Survey
  67. A Cloud Security Assessment System Based on Classifying and Grading
  68. A fast terminal sliding mode observer for TCP/IP network anomaly traffic detection
  69. A Trusted Mobile Payment Scheme Based on Body Area Networks
  70. Issues with Multimodal Biometric Systems
  71. Segment-Based Anomaly Detection with Approximated Sample Covariance Matrix in Wireless Sensor Networks
  72. An Active Cooperation-Aware Spectrum Allocation Mechanism for Body Sensor Networks
  73. Camera motion estimation through monocular normal flow vectors
  74. Securing Body Sensor Networks with Biometric Methods: A New Key Negotiation Method and a Key Sampling Method for Linear Interpolation Encryption
  75. Collaborative Wireless Sensor Networks and Applications
  76. Multi-objective Based Fuzzy Mathematical Programming Model for Green Logistics Network Design Under Uncertainty
  77. A Multistaged Automatic Restoration of Noisy Microscopy Cell Images
  78. Multi-constrained Orientation Field Modeling and Its Application for Fingerprint Indexing
  79. A Reputation Revision Method Based on the Credibility for Cloud Services
  80. A new Lagrange solution to the privacy-preserving general geometric intersection problem
  81. Special issue on “quality of service in wireless and mobile networking”
  82. Enhancing Big Data Security with Collaborative Intrusion Detection
  83. A statistical framework for intrusion detection system
  84. A benchmark 3D fingerprint database
  85. Reliable Bulk-Data Dissemination in Delay Tolerant Networks
  86. The effect of spurious and missing minutiae on delaunay triangulation based on its application to fingerprint authentication
  87. A survey: Error control methods used in bio-cryptography
  88. Evaluating host-based anomaly detection systems: Application of the one-class SVM algorithm to ADFA-LD
  89. Optional multi-biometric cryptosystem based on fuzzy extractor
  90. Security and privacy in internet of things: methods, architectures, and solutions
  91. Distributed collision control with the integration of packet size for congestion control in wireless sensor networks
  92. 3D Fingerprint
  93. A Delaunay Quadrangle-Based Fingerprint Authentication System With Template Protection Using Topology Code for Local Registration and Security Enhancement
  94. Taxonomy of Attacks for Agent-Based Smart Grids
  95. Computer Intrusion Detection Systems
  96. A hierarchical clustering method for big data oriented ciphertext search
  97. An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures
  98. Design of alignment-free cancelable fingerprint templates via curtailed circular convolution
  99. Fingerprint Indexing Based on Combination of Novel Minutiae Triplet Features
  100. Energy-Efficient Cooperative Communications for Multimedia Applications in Multi-Channel Wireless Networks
  101. Evaluating Host-Based Anomaly Detection Systems: Application of the Frequency-Based Algorithms to ADFA-LD
  102. A general transformation from KP-ABE to searchable encryption
  103. Outlier Detection
  104. A Delaunay triangle group based fuzzy vault with cancellability
  105. A Hadamard transform-based method for the design of cancellable fingerprint templates
  106. Evaluating host-based anomaly detection systems: A preliminary analysis of ADFA-LD
  107. Genetic Algorithm for distorted point set matching
  108. Top-k future system call prediction based multi-module anomaly detection system
  109. Performance evaluation of 2D to 3D fingerprint recognition
  110. Biometrics for securing mobile payments: Benefits, challenges and solutions
  111. A Key Management Scheme between Body Sensor Networks and the Base Station
  112. An Energy Efficient Key Management Scheme for Body Sensor Networks
  113. Scalable Hypergrid k-NN-Based Online Anomaly Detection in Wireless Sensor Networks
  114. A multi-module anomaly detection scheme based on system call prediction
  115. Attacks via record multiplicity on cancelable biometrics templates
  116. Cooperative multi-target tracking in passive sensor-based networks
  117. Generation of a new IDS test dataset: Time to retire the KDD collection
  118. A hierarchical pea-based anomaly detection model
  119. Partial Fingerprint Reconstruction with Improved Smooth Extension
  120. A Finger-Vein Based Cancellable Bio-cryptosystem
  121. Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures
  122. Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach
  123. Using incremental subspace and contour template for object tracking
  124. A New Dimensionality Reduction Algorithm for Hyperspectral Image Using Evolutionary Strategy
  125. NDTC: A novel topology-based fingerprint matching algorithm using N-layer Delaunay triangulation net check
  126. A Real-Time NetFlow-based Intrusion Detection System with Improved BBNN and High-Frequency Field Programmable Gate Arrays
  127. Histogram-Based Online Anomaly Detection in Hierarchical Wireless Sensor Networks
  128. Hashed Random Key Pre-distribution Scheme for Large Heterogeneous Sensor Networks
  129. A Delaunay Triangle-Based Fuzzy Extractor for Fingerprint Authentication
  130. Free Search with Adaptive Differential Evolution Exploitation and Quantum-Inspired Exploration
  131. Network Security
  132. Special section: Green computing
  133. Lifetime optimization for reliable broadcast and multicast in wirelessad hocnetworks
  134. Preface of the “Workshop on computational intelligence and cyber security”
  135. High-Order Terminal Sliding-Mode Observers for Anomaly Detection
  136. A Hash Chains Based Key Management Scheme for Wireless Sensor Networks
  137. A General Transformation from KP-ABE to Searchable Encryption
  138. On the Effectiveness of Relaxation Theory for Controlling High Traffic Volumes in Body Sensor Networks
  139. A Bio-inspired Host-Based Multi-engine Detection System with Sequential Pattern Recognition
  140. Terminal sliding mode observer for anomaly detection in TCP/IP networks
  141. Pair-polar coordinate-based cancelable fingerprint templates
  142. Guest Editorial
  143. Foreword from the Conference Chairs
  144. BIOMETRIC AUTHENTICATION FOR MOBILE COMPUTING APPLICATIONS
  145. Mobile device access control: an improved correlation based face authentication scheme and its Java ME application
  146. Bio-cryptographic Key Generation
  147. Editorial: Advances in network and system security
  148. Fingerprint Template Protection
  149. Compatibility of photographed images with touch-based fingerprint verification software
  150. Pseudo random data stream generation for data/images protection in ubiquitous computing environment
  151. An alignment free fingerprint fuzzy extractor using near-equivalent Dual Layer Structure Check (NeDLSC) algorithm
  152. Statistical analysis and security estimation of fingerprint minutia local structure in bio-cryptographic system
  153. Blind channel estimation for single-input multiple-output OFDM systems: zero padding based or cyclic prefix based?
  154. Biometric security for mobile computing
  155. Global Ridge Orientation Modeling for Partial Fingerprint Identification
  156. A frequency domain subspace blind channel estimation method for trailing zero OFDM systems
  157. A mutual-healing key distribution scheme in wireless sensor networks
  158. The Exploration of Network Coding in IEEE 802.15.4 Networks
  159. A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment
  160. Biomentric Fingerprint Template
  161. A pitfall in fingerprint features extraction
  162. A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations
  163. Performance Analysis of Optimal Packet Size for Congestion Control in Wireless Sensor Networks
  164. Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic
  165. A correlation based face verification scheme designed for mobile device access control: From algorithm to Java ME implementation
  166. Highly efficient one-time pad key generation for large volume medical data protection
  167. Biometrics Security and Cryptography
  168. ECG-Based Authentication
  169. Intranet Security via Firewalls
  170. Host-Based Anomaly Intrusion Detection
  171. Network Traffic Analysis and SCADA Security
  172. A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference
  173. A pixel-based scrambling scheme for digital medical images protection
  174. Dual Layer Structure Check (DLSC) fingerprint verification scheme designed for biometric mobile template protection
  175. Building a SCADA Security Testbed
  176. An Efficient Mobile Voting System Security Scheme Based on Elliptic Curve Cryptography
  177. A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection
  178. Rotation estimation of singular points using analytical models
  179. Security in Online Games
  180. Taxonomy and Framework for Integrating Dependability and Security
  181. On Multiscroll Chaotic Attractors in Hysteresis-Based Piecewise-Linear Systems
  182. Investigating Correlation-Based Fingerprint Authentication Schemes for Mobile Devices Using the J2ME technology
  183. A Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and Its Application to Singular-Point Detection and Fingerprint Indexing
  184. Chaotic Cryptography
  185. Enhanced gradient-based algorithm for the estimation of fingerprint orientation fields
  186. NXG03-3: Enhancements for RTT-Fair HighSpeed TCP
  187. A Biometric Encryption Approach Incorporating Fingerprint Indexing in Key Generation
  188. A Novel Hybrid Crypto-Biometric Authentication Scheme for ATM Based Banking Applications
  189. Modelling of SACK TCP and application to the HTTP file transfer environment
  190. Systematic H∞ weighting function selection and its application to the real-time control of a vertical take-off aircraft
  191. Mobile Ad Hoc Networks
  192. Mobile Ad Hoc Networks
  193. Simplifying discrete-time H/sup ∞/ control
  194. A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks
  195. A Gradient Based Weighted Averaging Method for Estimation of Fingerprint Orientation Fields
  196. Analytic models for highspeed TCP fairness analysis
  197. Simulation study of TCP performance under IPv4 within integrated wired and wireless networks
  198. Conjugation and H/sup ∞/ control of discrete-time systems
  199. Robust performance control and analysis of ill-conditioned plants
  200. DSP application in e-commerce security
  201. A note on an analytic model for slow start in TCP
  202. A multi-layer model for anomaly intrusion detection using program sequences of system calls
  203. PPN 2007 PC Co-chairs’ Message
  204. A statistics based design of MAC protocols with distributed collision resolution for ad hoc networks
  205. Wireless Interactive Teaching by Using Keypad-Based ARS
  206. Wireless Interactive Teaching by Using Keypad-Based ARS