You are on page 1of 1

1 Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts

2 Building an intrusion detection system using a filter-based feature selection algorithm


Secure Routing in Multihop Wireless Ad-Hoc Networks With Decode-and-Forward
3
Relaying
4 Secure Beamforming in Wireless-Powered Cooperative Cognitive Radio Networks
5 Novel Design of Secure End-to-End Routing Protocol in Wireless Sensor Networks
6 Secure Transmission Against Pilot Spoofing Attack: A Two-Way Training-Based Scheme
Multiantenna Secure Cognitive Radio Networks With Finite-Alphabet Inputs: A Global
7
Optimization Approach for Precoder Design
Secure Data Aggregation with Homomorphic Primitives in Wireless Sensor Networks: A
8
Critical Survey and Open Research Issues
Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over
9
Encrypted Image Data
A Secure-Efficient Data Collection Algorithm Based on Self-Adaptive Sensing Model in
10
Mobile Internet of Vehicles
A Clean Slate Approach to Secure Ad Hoc Wireless Networking - Open Unsynchronized
11
Networks
12 A Stable Approach for Routing Queries in Unstructured P2P Networks
13 iPath: Path Inference in Wireless Sensor Networks
14 Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks
15 Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks
16 STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
17 Data Lineage in Malicious Environments
18 Detecting Malicious Facebook Applications
Carrier Aggregation Between Operators in Next Generation Cellular Networks: A Stable
19
Roommate Market
20 Secure Routing Based on Social Similarity in Opportunistic Networks
Impact of mobile nodes for few mobility models on delay-tolerant network routing
21
protocols
Biosec: a biometric based approach for securing communication in wireless networks of
22
biosensors implanted in the human body
23 Interference-aware relay in hybrid wireless networks
Edu-firewall device: An advanced firewall hardware device for information security
24
education
Privacy and security problems of national health data warehouse: a convenient solution
25
for developing countries

You might also like