A detection method of WLAN security mechanisms based on MAC frame resolution June LiKai YuanWenbin Huang Security of Network and Trust Computation 11 March 2017 Pages: 93 - 102
BotGuard: Lightweight real-time botnet detection in software defined networks Jing ChenXi ChengChiheng Wang Security of Network and Trust Computation 11 March 2017 Pages: 103 - 113
A forensic method for efficient file extraction in HDFS based on three-level mapping Yuanzhao GaoBinglong Li Security of Network and Trust Computation 11 March 2017 Pages: 114 - 126
Security enhancement of arbiter-based physical unclonable function on FPGA Jun WangShubo LiuCai Liang Security of Network and Trust Computation 11 March 2017 Pages: 127 - 133
A defense model against mobile phone malicious codes based on social computing Leyi ShiXiaotong LiuYao Wang Security of Network and Trust Computation 11 March 2017 Pages: 134 - 140
Image forgery detection using segmentation and swarm intelligent algorithm Fei ZhaoWenchang ShiBin Liang Security of Network and Trust Computation 11 March 2017 Pages: 141 - 148
Trust-based context-aware mobile social network service recommendation Jun XuYuansheng ZhongFeifei Sun Security of Network and Trust Computation 11 March 2017 Pages: 149 - 156
Delay-distance correlation study for IP geolocation Shichang DingXiangyang LuoFenlin Liu Security of Network and Trust Computation 11 March 2017 Pages: 157 - 164
An efficient certificateless aggregate signature scheme Baoyuan KangMu WangDongya Jing Cryptology 11 March 2017 Pages: 165 - 170
Ciphertext-policy attribute-based encryption for general circuits from bilinear maps Peng HuHaiying Gao Cryptology 11 March 2017 Pages: 171 - 177
Multi-pattern matching algorithm with wildcards based on bit-parallelism Ahmed A. F. SaifLiang HuJianfeng Chu Algorithm 11 March 2017 Pages: 178 - 184