International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC)

International Journal of Ad Hoc and Ubiquitous Computing

2015 Vol.18 No.1/2

Special Issue on Security Aspects in Pervasive and Ubiquitous Computing

Guest Editors: Professor Muhammad Khurram Khan, Professor Neeraj Kumar and Professor Shi-Jinn Horng


Pages Title and author(s)
3-22Key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue
Dieynaba Mall; Karim Konaté; Al-Sakib Khan Pathan
DOI: 10.1504/IJAHUC.2015.067789
23-36Reconfigurable content-based image retrieval on peer-to-peer networks
Chun-Rong Su; Jiann-Jone Chen
DOI: 10.1504/IJAHUC.2015.067785
37-44Security analysis and improvement of a mutual authentication scheme under trusted computing
Fahad T. Bin Muhaya
DOI: 10.1504/IJAHUC.2015.067775
45-53A quantitative and knowledge-based approach to choosing security architectural tactics
Suntae Kim
DOI: 10.1504/IJAHUC.2015.067780
54-66Anti-forensic steganography using multi-bit MER with flexible bit location
Rong-Jian Chen; Shi-Jinn Horng; Po-Hsian Huang
DOI: 10.1504/IJAHUC.2015.067788
67-74A new handover authentication protocol based on bilinear pairing functions for wireless networks
Debiao He; Muhammad Khurram Khan; Neeraj Kumar
DOI: 10.1504/IJAHUC.2015.067774
75-84An improved biometric-based remote user authentication scheme for connected healthcare
Dheerendra Mishra; Ankita Chaturvedi; Sourav Mukhopadhyay
DOI: 10.1504/IJAHUC.2015.067794

Additional Papers

85-101Principal component analysis-based data reduction model for wireless sensor networks
Murad A. Rassam; Anazida Zainal; Mohd. Aizaini Maarof
DOI: 10.1504/IJAHUC.2015.067756
102-119Designing for privacy in ubiquitous social networking
Antonio Sapuppo; João Figueiras
DOI: 10.1504/IJAHUC.2015.067758