6 March 2015

Special issue published: "Security Aspects in Pervasive and Ubiquitous Computing"

International Journal of Ad Hoc and Ubiquitous Computing 18(1/2) 2015
  • Key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue
  • Reconfigurable content-based image retrieval on peer-to-peer networks
  • Security analysis and improvement of a mutual authentication scheme under trusted computing
  • A quantitative and knowledge-based approach to choosing security architectural tactics
  • Anti-forensic steganography using multi-bit MER with flexible bit location
  • A new handover authentication protocol based on bilinear pairing functions for wireless networks
  • An improved biometric-based remote user authentication scheme for connected healthcare
  • Principal component analysis-based data reduction model for wireless sensor networks
  • Designing for privacy in ubiquitous social networking

No comments: