1 Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
2 Building an intrusion detection system using a filter-based feature selection algorithm
Secure Routing in Multihop Wireless Ad-Hoc Networks With Decode-and-Forward 3 Relaying 4 Secure Beamforming in Wireless-Powered Cooperative Cognitive Radio Networks 5 Novel Design of Secure End-to-End Routing Protocol in Wireless Sensor Networks 6 Secure Transmission Against Pilot Spoofing Attack: A Two-Way Training-Based Scheme Multiantenna Secure Cognitive Radio Networks With Finite-Alphabet Inputs: A Global 7 Optimization Approach for Precoder Design Secure Data Aggregation with Homomorphic Primitives in Wireless Sensor Networks: A 8 Critical Survey and Open Research Issues Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over 9 Encrypted Image Data A Secure-Efficient Data Collection Algorithm Based on Self-Adaptive Sensing Model in 10 Mobile Internet of Vehicles A Clean Slate Approach to Secure Ad Hoc Wireless Networking - Open Unsynchronized 11 Networks 12 A Stable Approach for Routing Queries in Unstructured P2P Networks 13 iPath: Path Inference in Wireless Sensor Networks 14 Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks 15 Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks 16 STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users 17 Data Lineage in Malicious Environments 18 Detecting Malicious Facebook Applications Carrier Aggregation Between Operators in Next Generation Cellular Networks: A Stable 19 Roommate Market 20 Secure Routing Based on Social Similarity in Opportunistic Networks Impact of mobile nodes for few mobility models on delay-tolerant network routing 21 protocols Biosec: a biometric based approach for securing communication in wireless networks of 22 biosensors implanted in the human body 23 Interference-aware relay in hybrid wireless networks Edu-firewall device: An advanced firewall hardware device for information security 24 education Privacy and security problems of national health data warehouse: a convenient solution 25 for developing countries