Journal cover image

Browse issues

Vol. 29
Vol. 28
Vol. 27
Vol. 26
Vol. 25
Vol. 24
Vol. 23
Vol. 22
Vol. 21
Vol. 20
Vol. 19
Vol. 18
Vol. 17
Vol. 16
Vol. 15
Vol. 14
Vol. 13
Vol. 12
Vol. 11
Vol. 10
Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Ad Hoc and Ubiquitous Computing

2015 Vol. 18 No. 1/2

Special Issue on Security Aspects in Pervasive and Ubiquitous Computing

Guest Editors: Professor Muhammad Khurram Khan, Professor Neeraj Kumar and Professor Shi-Jinn Horng


PagesTitle and authors
3-22Key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue
Dieynaba Mall; Karim Konaté; Al-Sakib Khan Pathan
DOI: 10.1504/IJAHUC.2015.067789

23-36Reconfigurable content-based image retrieval on peer-to-peer networks
Chun-Rong Su; Jiann-Jone Chen
DOI: 10.1504/IJAHUC.2015.067785

37-44Security analysis and improvement of a mutual authentication scheme under trusted computing
Fahad T. Bin Muhaya
DOI: 10.1504/IJAHUC.2015.067775

45-53A quantitative and knowledge-based approach to choosing security architectural tactics
Suntae Kim
DOI: 10.1504/IJAHUC.2015.067780

54-66Anti-forensic steganography using multi-bit MER with flexible bit location
Rong-Jian Chen; Shi-Jinn Horng; Po-Hsian Huang
DOI: 10.1504/IJAHUC.2015.067788

67-74A new handover authentication protocol based on bilinear pairing functions for wireless networks
Debiao He; Muhammad Khurram Khan; Neeraj Kumar
DOI: 10.1504/IJAHUC.2015.067774

75-84An improved biometric-based remote user authentication scheme for connected healthcare
Dheerendra Mishra; Ankita Chaturvedi; Sourav Mukhopadhyay
DOI: 10.1504/IJAHUC.2015.067794

Additional Papers

85-101Principal component analysis-based data reduction model for wireless sensor networks
Murad A. Rassam; Anazida Zainal; Mohd. Aizaini Maarof
DOI: 10.1504/IJAHUC.2015.067756

102-119Designing for privacy in ubiquitous social networking
Antonio Sapuppo; João Figueiras
DOI: 10.1504/IJAHUC.2015.067758