


default search action
International Journal of Network Security, Volume 17
Volume 17, Number 1, January 2015
- Cheng-Chi Lee, Shih-Ting Chiu, Chun-Ta Li:

Improving Security of A Communication-efficient Three-party Password Authentication Key Exchange Protocol. 1-6 - Hoseb Dermanilian, Farah Saab, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:

Energy-Efficient Security for Voice over IP. 7-22 - Changlu Lin, Yong Li, Kewei Lv, Chin-Chen Chang:

Ciphertext-Auditable Identity-Based Encryption. 23-28 - Chunhua Pan, Shunpeng Li, Qihui Zhu, Chunzhi Wang, Mingwu Zhang:

Notes on Proxy Signcryption and Multi-proxy Signature Schemes. 29-33 - Mikio Fujiwara, Tomoyasu Domeki, Shiho Moriai, Masahide Sasaki:

Highly Secure Network Switches with Quantum Key Distribution Systems. 34-39 - Hui-Feng Huang, Pin-Han Lin, Min-Hsuan Tsai:

Convertible Multi-authenticated Encryption Scheme for Data Communication. 40-48 - Nashrul Hakiem, Mohammad Umar Siddiqi, Hashum Mohamed Rafiq:

Simulation Study of a Many-to-One Mapping for IPv6 Address Owner Identification in an Enterprise Local Area Network. 49-56 - Amitava Nag, Sushanta Biswas, Debasree Sarkar, Partha Pratim Sarkar:

Semi Random Position Based Steganography for Resisting Statistical Steganalysis. 57-65 - Hasmukh Patel, Devesh C. Jinwala:

Automated Analysis of Internet Key Exchange Protocol v2 for Denial of Service Attacks. 66-71 - Felipe dos Anjos Lima, Edward David Moreno, Dellano Oliveira D. dos Santos, Wanderson Roger Azevedo Dias:

Energy Characterization of a Security Module in ARM Processor. 72-78 - Yuan-Yu Tsai, Wen-Ching Huang, Bo-Feng Peng:

An Efficient and Distortion-controllable Information Hiding Algorithm for 3D Polygonal Models with Adaptation. 79-84 - Boqing Xu, Qun Xiao, Zhenxing Qian, Chuan Qin:

Unequal Protection Mechanism for Digital Speech Transmission Based on Turbo Codes. 85-93 - Yongtao Wang, Xiaonan Liu, Lulu Liang, Weiduan Feng, Guang Yang:

Mitigating Key Escrow in Attribute-Based Encryption. 94-102
Volume 17, Number 2, March 2015
- Zhengjun Cao, Hanyue Cao:

Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme. 103-109 - Xiangsong Zhang, Zhenhua Liu, Yupu Hu, Tsuyoshi Takagi:

Revocable Identity-based Signcryption Scheme Without Random Oracles. 110-122 - Bin Feng, Cheng Guo, Mingchu Li, Zhi-Hui Wang:

A Novel Proactive Multi-secret Sharing Scheme. 123-128 - Ji Geng, Hu Xiong, Zhiguang Qin, Fagen Li:

On the Security of a Provably Secure Certificate Based Ring Signature Without Pairing. 129-134 - Yuan Huang, Shengke Zeng, Xingwei Liu:

Privacy-preserving Communication for VANETs with Conditionally Anonymous Ring Signature. 135-141 - Xingbing Fu:

Unidirectional Proxy Re-Encryption for Access Structure Transformation in Attribute-based Encryption Schemes. 142-149 - Patrick G. Clark, Arvin Agah:

Firewall Policy Diagram: Structures for Firewall Behavior Comprehension. 150-159 - Heri Wijayanto, Min-Shiang Hwang:

Improvement on Timestamp-based User Authentication Scheme with Smart Card Lost Attack Resistance. 160-164 - Cheng Guo, Chin-Chen Chang:

A Novel Threshold Conference-Key Agreement Protocol Based on Generalized Chinese Remainder Theorem. 165-173 - Shengyi Pan, Thomas H. Morris, Uttam Adhikari:

A Specification-based Intrusion Detection Framework for Cyber-physical Environment in Electric Power System. 174-188 - Jan-Min Chen:

An Auto-tuning Sanitizing System for Mitigating Injection Flaws. 189-198 - Feng Wang, Chin-Chen Chang, Yeh-Chieh Chou:

Group Authentication and Group Key Distribution for Ad Hoc Networks. 199-207 - Degang Xu, Zhao Wu, Zhongbo Wu, Qilin Zhang, Leihua Qin, Jingli Zhou:

Internet of Things: Hotspot-based Discovery Service Architecture with Security Mechanism. 208-216 - Yi Zhao, Qiliang Yang, Bo Yang:

Provably Secure Partially Blind Signature Scheme Based on Quadratic Residue. 217-223 - Hu Xiong, Ji Geng, Zhiguang Qin, Guobin Zhu:

Cryptanalysis of Attribute-based Ring Signcryption Scheme. 224-228
Volume 17, Number 3, May 2015
- Lin Cheng, Qiaoyan Wen:

An Improved Certificateless Signcryption in the Standard Model. 229-237 - Yi-Hui Chen, Panyaporn Prangjarote, Chih-Yang Lin:

Self-verifiable Secret Sharing Scheme with Locatability for Halftone Images. 238-242 - R. Padmavathy, Chakravarthy Bhagvati:

A New Method for Computing DLP Based on Extending Smooth Numbers to Finite Field for Ephemeral Key Recovery. 243-254 - Qinyi Li, Fengli Zhang:

A Fully Secure Attribute Based Broadcast Encryption Scheme. 255-263 - Muhammad Mahmoud, Manjinder Nir, Ashraf Matrawy:

A Survey on Botnet Architectures, Detection and Defences. 264-281 - Ci-Lin Li, Chih-Yang Lin, Tzung-Her Chen:

Efficient Compression-Jointed Quality Controllable Scrambling Method for H.264/SVC. 282-289
Volume 17, Number 4, July 2015
- Maryam Tanha, Fazirulhisyam Hashim, Shamala Subramaniam:

Secure and Self-healing Control Centers of Critical Infrastructures using Intrusion Tolerance. 365-382 - Rattikorn Hewett, Phongphun Kijsanayothin:

Ranking Intrusion Likelihoods with Exploitability of Network Vulnerabilities in a Large-Scale Attack Model. 383-394 - Hai-Duong Le, Chin-Chen Chang, Yeh-Chieh Chou:

A Novel Untraceable Authentication Scheme for Mobile Roaming in GLOMONET. 395-404 - Ashraf Aboshosha, Kamal A. ElDahshan, Eman K. Elsayed, Ahmed A. Elngar:

EA Based Dynamic Key Generation in RC4 Ciphering Applied to CMS. 405-412 - Noureddine Chikouche, Cherif Foudil, Pierre-Louis Cayrel, Mohamed Benmohammed:

Improved RFID Authentication Protocol Based on Randomized McEliece Cryptosystem. 413-422 - Fangwei Wang, Yunkai Zhang, Yong Yang, Jianfang Ma:

Global Analysis of a SEIQV Epidemic Model for Scanning Worms with Quarantine Strategy. 423-430 - Yi-Lun Chi, Cheng Hao Chen, Iuon-Chang Lin, Min-Shiang Hwang:

The Secure Transaction Protocol in NFC Card Emulation Mode. 431-438 - Yi-Hui Chen, Chih-Yang Lin, Wanutchaporn Sirakriengkrai, I-Chun Weng:

Repairable Image Authentication Scheme. 439-444 - Chenglian Liu, Chin-Chen Chang, Zhi-Pan Wu, Shi-Lin Ye:

A Study of Relationship between RSA Public Key Cryptosystem and Goldbach's Conjecture Properties. 445-453 - Zhengjun Cao, Lihua Liu:

Improvement of Green-Hohenberger Adaptive Oblivious Transfer: A Review. 454-462 - Yanli Ren, Shuozhong Wang, Xinpeng Zhang, Min-Shiang Hwang:

An Efficient Batch Verifying Scheme for Detecting Illegal Signatures. 463-470 - Jie Wang, Xiao Yu, Ming Zhao:

Fault-tolerant Verifiable Keyword Symmetric Searchable Encryption in Hybrid Cloud. 471-483 - Arindam Sarkar, Jyotsna Kumar Mandal:

Cryptanalysis of Key Exchange method in Wireless Communication. 484-493 - Qingfeng Cheng:

Security Analysis of a Pairing-free Identity-based Authenticated Group Key Agreement Protocol for Imbalanced Mobile Networks. 494-496
Volume 17, Number 5, September 2015
- Jia-Rong Sun, Mao-Lin Shih, Min-Shiang Hwang:

A Survey of Digital Evidences Forensic and Cybercrime Investigation Procedure. 497-509 - Reddi Siva Ranjani, Dhavala Lalitha Bhaskari, Peri S. Avadhani:

An Extended Identity Based Authenticated Asymmetric Group Key Agreement Protocol. 510-516 - Tianwei Che, Jianfeng Ma, Na Li, Chao Wang:

A Security Quantitative Analysis Method For Access Control Based on Security Entropy. 517-521 - Pijush Barthakur, Manoj Dahal, Mrinal Kanti Ghose:

Adoption of a Fuzzy Based Classification Model for P2P Botnet Detection. 522-534 - Sana Qadir, Mohammad Umar Siddiqi, Wajdi F. M. Al-Khateeb:

Analysing and Improving Performance and Security of Cryptographically Generated Address Algorithm for Mobile IPv6 Networks. 535-547 - Huixian Shi, Rui Guo:

Provably-Secure Certificateless Key Encapsulation Mechanism for e-Healthcare System. 548-557 - Natarajan Mohananthini, Govindarajan Yamuna:

A Study of DWT-SVD Based Multiple Watermarking Scheme for Medical Images. 558-568 - Erald Troja, Spiridon Bakiras:

Leveraging P2P Interactions for Efficient Location Privacy in Database-driven Dynamic Spectrum Access. 569-579 - Jayaprakash Kar:

Provably Secure Identity-based Aggregate Signcryption Scheme in Random Oracles. 580-587 - Vankamamidi Srinivasa Naresh, Nistala V. E. S. Murthy:

Elliptic Curve Based Dynamic Contributory Group Key Agreement Protocol for Secure Group Communication over Ad-hoc Networks. 588-596 - Lin Cheng, Qiaoyan Wen:

An Improved Certificateless Signcryption in the Standard Model. 597-606 - Chin-Feng Lee, Chin-Chen Chang, Pei-Yan Pai, Chia-Ming Liu:

Adjustment Hiding Method Based on Exploiting Modification Direction. 607-618 - Xiujie Zhang, Chunxiang Xu:

A Practical Forward-Secure Public-Key Encryption Scheme with Untrusted Update. 619-628 - Mohsen Toorani:

Cryptanalysis of Two PAKE Protocols for Body Area Networks and Smart Environments. 629-636 - Huajun Huang, Shuang Pang, Qiong Deng, Jiaohua Qin:

A Component Histogram Map Based Text Similarity Detection Algorithm. 637-642 - Shengyun Zhai, Fan Li, Chin-Chen Chang, Qian Mao:

A Meaningful Scheme for Sharing Secret Images Using Mosaic Images. 643-649
Volume 17, Number 6, November 2015
- Manivannan Doraipandian, P. Neelamegam:

An Efficient Key Management Scheme in Multi-Tier and Multi-Cluster Wireless Sensor Networks. 651-660 - Xingbing Fu, Shengke Zeng, Fagen Li:

Blind Expressive Ciphertext Policy Attribute Based Encryption for Fine Grained Access Control on the Encrypted Data. 661-671 - Chris Scheper, William J. J. Roberts:

Anomaly Detection Using an MMPP-based GLRT. 672-677 - Qingfeng Cheng, Chunming Tang:

Cryptanalysis of an ID-based Authenticated Dynamic Group Key Agreement with Optimal Round. 678-682 - Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita:

Towards Generating Real-life Datasets for Network Intrusion Detection. 683-701 - Chin-Chen Chang, Jen-Ho Yang, Yu-Ching Wu:

An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks. 702-707 - Yalin Chen, Jue-Sam Chou:

On the Privacy of "User Efficient Recoverable Off-Line E-Cash Scheme with Fast Anonymity Revoking". 708-711 - Tung-Huang Feng, Neng-Yih Shih, Min-Shiang Hwang:

A Safety Review on Fuzzy-based Relay Selection in Wireless Sensor Networks. 712-721 - S. Maria Celestin Vigila, K. Muneeswaran:

Hiding of Confidential Data in Spatial Domain Images using Image Interpolation. 722-727 - Ying Wang, Xinguang Peng:

Cryptanalysis of Two Efficient Password-based Authentication Schemes Using Smart Cards. 728-735 - Namita Tiwari, Sahadeo Padhye:

Provable Secure Multi-Proxy Signature Scheme without Bilinear Maps. 736-742 - Xu Ma, Jin Li, Fangguo Zhang:

Refereed Computation Delegation of Private Sequence Comparison in Cloud Computing. 743-753 - Ghazaleh Javadzadeh, Reza Azmi:

IDuFG: Introducing an Intrusion Detection using Hybrid Fuzzy Genetic Approach. 754-770 - Brian King:

A Dynamic Threshold Decryption Scheme Using Bilinear Pairings. 771-778 - Yang Zhao, Feng Yue, Songyang Wu, Hu Xiong, Zhiguang Qin:

Analysis and Improvement of Patient Self-controllable Multi-level Privacy-preserving Cooperative Authentication Scheme. 779-786 - Jie Ling, Guangqiang Zhao:

An Improved Anonymous Password Authentication Scheme Using Nonce and Bilinear Pairings. 787-794 - Yang Ming, Yumin Wang:

On the Security of Three Public Auditing Schemes in Cloud Computing. 795-802

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














