default search action
International Journal of Network Security, Volume 17
Volume 17, Number 1, January 2015
- Cheng-Chi Lee, Shih-Ting Chiu, Chun-Ta Li:
Improving Security of A Communication-efficient Three-party Password Authentication Key Exchange Protocol. 1-6 - Hoseb Dermanilian, Farah Saab, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
Energy-Efficient Security for Voice over IP. 7-22 - Changlu Lin, Yong Li, Kewei Lv, Chin-Chen Chang:
Ciphertext-Auditable Identity-Based Encryption. 23-28 - Chunhua Pan, Shunpeng Li, Qihui Zhu, Chunzhi Wang, Mingwu Zhang:
Notes on Proxy Signcryption and Multi-proxy Signature Schemes. 29-33 - Mikio Fujiwara, Tomoyasu Domeki, Shiho Moriai, Masahide Sasaki:
Highly Secure Network Switches with Quantum Key Distribution Systems. 34-39 - Hui-Feng Huang, Pin-Han Lin, Min-Hsuan Tsai:
Convertible Multi-authenticated Encryption Scheme for Data Communication. 40-48 - Nashrul Hakiem, Mohammad Umar Siddiqi, Hashum Mohamed Rafiq:
Simulation Study of a Many-to-One Mapping for IPv6 Address Owner Identification in an Enterprise Local Area Network. 49-56 - Amitava Nag, Sushanta Biswas, Debasree Sarkar, Partha Pratim Sarkar:
Semi Random Position Based Steganography for Resisting Statistical Steganalysis. 57-65 - Hasmukh Patel, Devesh C. Jinwala:
Automated Analysis of Internet Key Exchange Protocol v2 for Denial of Service Attacks. 66-71 - Felipe dos Anjos Lima, Edward David Moreno, Dellano Oliveira D. dos Santos, Wanderson Roger Azevedo Dias:
Energy Characterization of a Security Module in ARM Processor. 72-78 - Yuan-Yu Tsai, Wen-Ching Huang, Bo-Feng Peng:
An Efficient and Distortion-controllable Information Hiding Algorithm for 3D Polygonal Models with Adaptation. 79-84 - Boqing Xu, Qun Xiao, Zhenxing Qian, Chuan Qin:
Unequal Protection Mechanism for Digital Speech Transmission Based on Turbo Codes. 85-93 - Yongtao Wang, Xiaonan Liu, Lulu Liang, Weiduan Feng, Guang Yang:
Mitigating Key Escrow in Attribute-Based Encryption. 94-102
Volume 17, Number 2, March 2015
- Zhengjun Cao, Hanyue Cao:
Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme. 103-109 - Xiangsong Zhang, Zhenhua Liu, Yupu Hu, Tsuyoshi Takagi:
Revocable Identity-based Signcryption Scheme Without Random Oracles. 110-122 - Bin Feng, Cheng Guo, Mingchu Li, Zhi-Hui Wang:
A Novel Proactive Multi-secret Sharing Scheme. 123-128 - Ji Geng, Hu Xiong, Zhiguang Qin, Fagen Li:
On the Security of a Provably Secure Certificate Based Ring Signature Without Pairing. 129-134 - Yuan Huang, Shengke Zeng, Xingwei Liu:
Privacy-preserving Communication for VANETs with Conditionally Anonymous Ring Signature. 135-141 - Xingbing Fu:
Unidirectional Proxy Re-Encryption for Access Structure Transformation in Attribute-based Encryption Schemes. 142-149 - Patrick G. Clark, Arvin Agah:
Firewall Policy Diagram: Structures for Firewall Behavior Comprehension. 150-159 - Heri Wijayanto, Min-Shiang Hwang:
Improvement on Timestamp-based User Authentication Scheme with Smart Card Lost Attack Resistance. 160-164 - Cheng Guo, Chin-Chen Chang:
A Novel Threshold Conference-Key Agreement Protocol Based on Generalized Chinese Remainder Theorem. 165-173 - Shengyi Pan, Thomas H. Morris, Uttam Adhikari:
A Specification-based Intrusion Detection Framework for Cyber-physical Environment in Electric Power System. 174-188 - Jan-Min Chen:
An Auto-tuning Sanitizing System for Mitigating Injection Flaws. 189-198 - Feng Wang, Chin-Chen Chang, Yeh-Chieh Chou:
Group Authentication and Group Key Distribution for Ad Hoc Networks. 199-207 - Degang Xu, Zhao Wu, Zhongbo Wu, Qilin Zhang, Leihua Qin, Jingli Zhou:
Internet of Things: Hotspot-based Discovery Service Architecture with Security Mechanism. 208-216 - Yi Zhao, Qiliang Yang, Bo Yang:
Provably Secure Partially Blind Signature Scheme Based on Quadratic Residue. 217-223 - Hu Xiong, Ji Geng, Zhiguang Qin, Guobin Zhu:
Cryptanalysis of Attribute-based Ring Signcryption Scheme. 224-228
Volume 17, Number 3, May 2015
- Lin Cheng, Qiaoyan Wen:
An Improved Certificateless Signcryption in the Standard Model. 229-237 - Yi-Hui Chen, Panyaporn Prangjarote, Chih-Yang Lin:
Self-verifiable Secret Sharing Scheme with Locatability for Halftone Images. 238-242 - R. Padmavathy, Chakravarthy Bhagvati:
A New Method for Computing DLP Based on Extending Smooth Numbers to Finite Field for Ephemeral Key Recovery. 243-254 - Qinyi Li, Fengli Zhang:
A Fully Secure Attribute Based Broadcast Encryption Scheme. 255-263 - Muhammad Mahmoud, Manjinder Nir, Ashraf Matrawy:
A Survey on Botnet Architectures, Detection and Defences. 264-281 - Ci-Lin Li, Chih-Yang Lin, Tzung-Her Chen:
Efficient Compression-Jointed Quality Controllable Scrambling Method for H.264/SVC. 282-289
Volume 17, Number 4, July 2015
- Maryam Tanha, Fazirulhisyam Hashim, Shamala Subramaniam:
Secure and Self-healing Control Centers of Critical Infrastructures using Intrusion Tolerance. 365-382 - Rattikorn Hewett, Phongphun Kijsanayothin:
Ranking Intrusion Likelihoods with Exploitability of Network Vulnerabilities in a Large-Scale Attack Model. 383-394 - Hai-Duong Le, Chin-Chen Chang, Yeh-Chieh Chou:
A Novel Untraceable Authentication Scheme for Mobile Roaming in GLOMONET. 395-404 - Ashraf Aboshosha, Kamal A. ElDahshan, Eman K. Elsayed, Ahmed A. Elngar:
EA Based Dynamic Key Generation in RC4 Ciphering Applied to CMS. 405-412 - Noureddine Chikouche, Cherif Foudil, Pierre-Louis Cayrel, Mohamed Benmohammed:
Improved RFID Authentication Protocol Based on Randomized McEliece Cryptosystem. 413-422 - Fangwei Wang, Yunkai Zhang, Yong Yang, Jianfang Ma:
Global Analysis of a SEIQV Epidemic Model for Scanning Worms with Quarantine Strategy. 423-430 - Yi-Lun Chi, Cheng Hao Chen, Iuon-Chang Lin, Min-Shiang Hwang:
The Secure Transaction Protocol in NFC Card Emulation Mode. 431-438 - Yi-Hui Chen, Chih-Yang Lin, Wanutchaporn Sirakriengkrai, I-Chun Weng:
Repairable Image Authentication Scheme. 439-444 - Chenglian Liu, Chin-Chen Chang, Zhi-Pan Wu, Shi-Lin Ye:
A Study of Relationship between RSA Public Key Cryptosystem and Goldbach's Conjecture Properties. 445-453 - Zhengjun Cao, Lihua Liu:
Improvement of Green-Hohenberger Adaptive Oblivious Transfer: A Review. 454-462 - Yanli Ren, Shuozhong Wang, Xinpeng Zhang, Min-Shiang Hwang:
An Efficient Batch Verifying Scheme for Detecting Illegal Signatures. 463-470 - Jie Wang, Xiao Yu, Ming Zhao:
Fault-tolerant Verifiable Keyword Symmetric Searchable Encryption in Hybrid Cloud. 471-483 - Arindam Sarkar, Jyotsna Kumar Mandal:
Cryptanalysis of Key Exchange method in Wireless Communication. 484-493 - Qingfeng Cheng:
Security Analysis of a Pairing-free Identity-based Authenticated Group Key Agreement Protocol for Imbalanced Mobile Networks. 494-496
Volume 17, Number 5, September 2015
- Jia-Rong Sun, Mao-Lin Shih, Min-Shiang Hwang:
A Survey of Digital Evidences Forensic and Cybercrime Investigation Procedure. 497-509 - Reddi Siva Ranjani, Dhavala Lalitha Bhaskari, Peri S. Avadhani:
An Extended Identity Based Authenticated Asymmetric Group Key Agreement Protocol. 510-516 - Tianwei Che, Jianfeng Ma, Na Li, Chao Wang:
A Security Quantitative Analysis Method For Access Control Based on Security Entropy. 517-521 - Pijush Barthakur, Manoj Dahal, Mrinal Kanti Ghose:
Adoption of a Fuzzy Based Classification Model for P2P Botnet Detection. 522-534 - Sana Qadir, Mohammad Umar Siddiqi, Wajdi F. M. Al-Khateeb:
Analysing and Improving Performance and Security of Cryptographically Generated Address Algorithm for Mobile IPv6 Networks. 535-547 - Huixian Shi, Rui Guo:
Provably-Secure Certificateless Key Encapsulation Mechanism for e-Healthcare System. 548-557 - Natarajan Mohananthini, Govindarajan Yamuna:
A Study of DWT-SVD Based Multiple Watermarking Scheme for Medical Images. 558-568 - Erald Troja, Spiridon Bakiras:
Leveraging P2P Interactions for Efficient Location Privacy in Database-driven Dynamic Spectrum Access. 569-579 - Jayaprakash Kar:
Provably Secure Identity-based Aggregate Signcryption Scheme in Random Oracles. 580-587 - Vankamamidi Srinivasa Naresh, Nistala V. E. S. Murthy:
Elliptic Curve Based Dynamic Contributory Group Key Agreement Protocol for Secure Group Communication over Ad-hoc Networks. 588-596 - Lin Cheng, Qiaoyan Wen:
An Improved Certificateless Signcryption in the Standard Model. 597-606 - Chin-Feng Lee, Chin-Chen Chang, Pei-Yan Pai, Chia-Ming Liu:
Adjustment Hiding Method Based on Exploiting Modification Direction. 607-618 - Xiujie Zhang, Chunxiang Xu:
A Practical Forward-Secure Public-Key Encryption Scheme with Untrusted Update. 619-628 - Mohsen Toorani:
Cryptanalysis of Two PAKE Protocols for Body Area Networks and Smart Environments. 629-636 - Huajun Huang, Shuang Pang, Qiong Deng, Jiaohua Qin:
A Component Histogram Map Based Text Similarity Detection Algorithm. 637-642 - Shengyun Zhai, Fan Li, Chin-Chen Chang, Qian Mao:
A Meaningful Scheme for Sharing Secret Images Using Mosaic Images. 643-649
Volume 17, Number 6, November 2015
- Manivannan Doraipandian, P. Neelamegam:
An Efficient Key Management Scheme in Multi-Tier and Multi-Cluster Wireless Sensor Networks. 651-660 - Xingbing Fu, Shengke Zeng, Fagen Li:
Blind Expressive Ciphertext Policy Attribute Based Encryption for Fine Grained Access Control on the Encrypted Data. 661-671 - Chris Scheper, William J. J. Roberts:
Anomaly Detection Using an MMPP-based GLRT. 672-677 - Qingfeng Cheng, Chunming Tang:
Cryptanalysis of an ID-based Authenticated Dynamic Group Key Agreement with Optimal Round. 678-682 - Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita:
Towards Generating Real-life Datasets for Network Intrusion Detection. 683-701 - Chin-Chen Chang, Jen-Ho Yang, Yu-Ching Wu:
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks. 702-707 - Yalin Chen, Jue-Sam Chou:
On the Privacy of "User Efficient Recoverable Off-Line E-Cash Scheme with Fast Anonymity Revoking". 708-711 - Tung-Huang Feng, Neng-Yih Shih, Min-Shiang Hwang:
A Safety Review on Fuzzy-based Relay Selection in Wireless Sensor Networks. 712-721 - S. Maria Celestin Vigila, K. Muneeswaran:
Hiding of Confidential Data in Spatial Domain Images using Image Interpolation. 722-727 - Ying Wang, Xinguang Peng:
Cryptanalysis of Two Efficient Password-based Authentication Schemes Using Smart Cards. 728-735 - Namita Tiwari, Sahadeo Padhye:
Provable Secure Multi-Proxy Signature Scheme without Bilinear Maps. 736-742 - Xu Ma, Jin Li, Fangguo Zhang:
Refereed Computation Delegation of Private Sequence Comparison in Cloud Computing. 743-753 - Ghazaleh Javadzadeh, Reza Azmi:
IDuFG: Introducing an Intrusion Detection using Hybrid Fuzzy Genetic Approach. 754-770 - Brian King:
A Dynamic Threshold Decryption Scheme Using Bilinear Pairings. 771-778 - Yang Zhao, Feng Yue, Songyang Wu, Hu Xiong, Zhiguang Qin:
Analysis and Improvement of Patient Self-controllable Multi-level Privacy-preserving Cooperative Authentication Scheme. 779-786 - Jie Ling, Guangqiang Zhao:
An Improved Anonymous Password Authentication Scheme Using Nonce and Bilinear Pairings. 787-794 - Yang Ming, Yumin Wang:
On the Security of Three Public Auditing Schemes in Cloud Computing. 795-802
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.