1. A finite equivalence of multisecret sharing based on Lagrange interpolating polynomial. Issue 9 (24th January 2013) Authors: Zhao, Hui; Sun, Jonathan Z.; Wang, Fengying; Zhao, Lei Journal: Security and communication networks Issue: Volume 6:Issue 9(2013:Sep.) Page Start: 1169 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Defending return‐oriented programming based on virtualization techniques. Issue 10 (30th January 2013) Authors: Jia, Xiaoqi; Wang, Rui; Jiang, Jun; Zhang, Shengzhi; Liu, Peng Journal: Security and communication networks Issue: Volume 6:Issue 10(2013:Oct.) Page Start: 1236 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Commutative reversible data hiding and encryption. Issue 11 (21st March 2013) Authors: Zhang, Xinpeng Journal: Security and communication networks Issue: Volume 6:Issue 11(2013:Nov.) Page Start: 1396 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. User authentication scheme with anonymity, unlinkability and untrackability for global mobility networks. Issue 11 (11th March 2013) Authors: Lee, Tian‐Fu Journal: Security and communication networks Issue: Volume 6:Issue 11(2013:Nov.) Page Start: 1404 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. A jamming‐attack‐defending data forwarding scheme based on channel surfing in wireless sensor networks. Issue 11 (3rd April 2013) Authors: Ghosal, Amrita; Bit, Sipra Das Journal: Security and communication networks Issue: Volume 6:Issue 11(2013:Nov.) Page Start: 1367 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Server‐aided batch verification signature schemes in the multiple‐signer setting. Issue 11 (15th April 2013) Authors: Wang, Bin; Zhao, Qing Journal: Security and communication networks Issue: Volume 6:Issue 11(2013:Nov.) Page Start: 1359 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Trends in modern information hiding: techniques, applications and detection. Issue 11 (24th October 2013) Authors: Mazurczyk, Wojciech; Szczypiorski, Krzysztof; Tian, Hui; Liu, Yali Journal: Security and communication networks Issue: Volume 6:Issue 11(2013:Nov.) Page Start: 1414 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Argument on biometrics identity‐based encryption schemes. Issue 11 (12th February 2013) Authors: Tan, Syh‐Yuan; Jin, Zhe; Teoh, Andrew Beng Jin Journal: Security and communication networks Issue: Volume 6:Issue 11(2013:Nov.) Page Start: 1344 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Efficient three‐party encrypted key exchange using trapdoor functions. Issue 11 (28th February 2013) Authors: Lee, Tian‐Fu; Chang, I‐Pin; Wang, Ching‐Cheng Journal: Security and communication networks Issue: Volume 6:Issue 11(2013:Nov.) Page Start: 1353 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. A probabilistic quantum key transfer protocol. Issue 11 (13th March 2013) Authors: Parakh, Abhishek Journal: Security and communication networks Issue: Volume 6:Issue 11(2013:Nov.) Page Start: 1389 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗