


default search action
International Journal of Network Security, Volume 14
Volume 14, Number 1, January 2012
- Ashok Kumar Das:

Improving Identity-based Random Key Establishment Scheme for Large-Scale Hierarchical Wireless Sensor Networks. 1-21 - Samaneh Mashhadi:

A Novel Secure Self Proxy Signature Scheme. 22-26 - Addepalli V. N. Krishna:

A New Non Linear Model Based Encryption Mechanism with Time Stamp and Acknowledgement Support. 27-32 - Zhiwei Wang, Licheng Wang, Shihui Zheng, Yixian Yang, Zhengming Hu:

Provably Secure and Efficient Identity-based Signature Scheme Based on Cubic Residues. 33-38 - Sandeep K. Sood:

An Improved and Secure Smart Card Based Dynamic Identity Authentication Protocol. 39-46 - Mustapha Hedabou:

Efficient Countermeasure for Securing the Eta Pairing Computation over Binary Fields. 47-52 - Shuhua Wu, Qiong Pu:

Comments on a Buyer-Seller Watermarking Protocol for Large Scale Networks. 53-58 - Martin Stanek:

A Note on Security Protocol for Multicast Communications. 59-60
Volume 14, Number 2, March 2012
- Brij B. Gupta, Ramesh C. Joshi, Manoj Misra:

ANN Based Scheme to Predict Number of Zombies in a DDoS Attack. 61-70 - Behzad Malek, Ali Miri:

Adaptively Secure Broadcast Encryption with Short Ciphertexts. 71-79 - Navaneet Ojha, Sahadeo Padhye:

Weak Keys in RSA over The Work of Blomer & May. 80-85 - Feng Zhu, Matt W. Mutka, Lionel M. Ni:

Private Entity Authentication for Pervasive Computing Environments. 86-100 - Saikat Basu:

A New Parallel Window-Based Implementation of the Elliptic Curve Point Multiplication in Multi-Core Architectures. 101-108 - Ping Dong, Huanyan Qian, Zhongjun Lu, Shaohua Lan:

A Network Covert Channel Based on Packet Classification. 109-116 - Razi Arshad, Nassar Ikram:

Cryptanalysis of a Non-interactive Deniable Authentication Protocol Based on Factoring. 117-120
Volume 14, Number 3, May 2012
- Kavitha Ammayappan, V. N. Sastry, Atul Negi:

A New Secure Route Discovery Protocol for MANETs to Prevent Hidden Channel Attacks. 121-141 - Youliang Tian, Changgen Peng, Jianfeng Ma:

Publicly Verifiable Secret Sharing Schemes Using Bilinear Pairings. 142-148 - Bimal Kumar Mishra, Gholam Mursalin Ansari:

Differential Epidemic Model of Virus and Worms in Computer Network. 149-155 - Li Yang, Jianfeng Ma, Qi Jiang:

Mutual Authentication Scheme with Smart Cards and Password under Trusted Computing. 156-163 - Kalpana Singh, Shefalika Ghosh Samaddar:

Enhancing Koyama Scheme Using Selective Encryption Technique in RSA-based Singular Cubic Curve with AVK. 164-172 - Rajaram Ramasamy, Amutha Prabakar Muniyandi:

An Efficient Password Authentication Scheme for Smart Card. 180-186
Volume 14, Number 4, July 2012
- Arun Velagapalli, Mahalingam Ramkumar:

Trustworthy TCB for DNS Servers. 187-205 - Behzad Malek, Ali Miri:

Securing Harari's Authentication Scheme. 206-210 - Radhika Goel, Anjali Sardana, Ramesh C. Joshi:

Parallel Misuse and Anomaly Detection Model. 211-222 - S. S. Sujatha, M. Mohamed Sathik:

A Novel DWT Based Blind Watermarking for Image Authentication. 223-228 - Tzu-Chang Yeh, Jian-Ren Peng, Sheng-Shih Wang, Jun-Ping Hsu:

Securing Bluetooth Communications. 229-235 - S. Maria Celestin Vigila, K. Muneeswaran:

Nonce Based Elliptic Curve Cryptosystem for Text and Image Applications. 236-242
Volume 14, Number 5, September 2012
- I-Wei Chen, Po-Ching Lin, Tsung-Huan Cheng, Chi-Chung Luo, Ying-Dar Lin, Yuan-Cheng Lai, Frank C. Lin:

Extracting Ambiguous Sessions from Real Traffic with Intrusion Prevention Systems. 243-250 - Xingwen Zhao:

Amendment to Trace and Revoke Systems with Short Ciphertexts. 251-256 - N. Jeyanthi, N. Ch. Sriman Narayana Iyengar:

An Entropy Based Approach to Detect and Distinguish DDoS Attacks from Flash Crowds in VoIP Networks. 257-269 - Zhenhua Chen, Shundong Li, Chunzhi Wang, Yanping Shen:

Two Constructions of Multireceiver Encryption Supporting Constant Keys, Short Ciphertexts, and Identity Privacy. 270-279 - Ayman Mousa, Elsayed Nigm, El-Sayed El-Rabaie, Osama S. Faragallah:

Query Processing Performance on Encrypted Databases by Using the REA Algorithm. 280-288 - Ashraf El-Sisi, Hamdy M. Mousa:

Evaluation of Encryption Algorithms for Privacy Preserving Association Rules Mining. 289-296 - Jian-bin Hu, Hu Xiong, Zhong Chen:

Further Improvement of An Authentication Scheme with User Anonymity for Wireless Communications. 297-300
Volume 14, Number 6, November 2012
- Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang:

The Study of Data Hiding in Medical Images. 301-309 - Miaomiao Tian, Liusheng Huang, Wei Yang:

A New Hierarchical Identity-based Signature Scheme From Lattices In The Standard Model. 310-315 - Kalyan Chakraborty, Jay Mehta:

A Stamped Blind Signature Scheme based on Elliptic Curve Discrete Logarithm Problem. 316-319 - Miaomiao Tian, Liusheng Huang:

Breaking A Proxy Signature Scheme From Lattices. 320-323 - Mishari Al Mishari, Emiliano De Cristofaro, Karim M. El Defrawy, Gene Tsudik:

Harvesting SSL Certificate Data to Identify Web-Fraud. 324-338 - Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita:

AOCD: An Adaptive Outlier Based Coordinated Scan Detection Approach. 339-351 - Farzaneh Geramiraz, Amir Saman Memaripour, Maghsoud Abbaspour:

Adaptive Anomaly-Based Intrusion Detection System Using Fuzzy Controller. 352-361 - Miaomiao Tian, Wei Yang, Liusheng Huang:

Security of a Biometric Identity-based Encryption Scheme. 362-365

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














