


default search action
International Journal of Network Security, Volume 15
Volume 15, Number 1, January 2013
- Quan Qian, Chao-Jie Xiao, Rui Zhang:

Grid-based Data Stream Clustering for Intrusion Detection. 1-8 - Kakali Chatterjee, Asok De, Daya Gupta:

Mutual Authentication Protocol Using Hyperelliptic Curve Cryptosystem in Constrained Devices. 9-15 - Quan Qian, Tianhong Wang, Rui Zhang:

Relative Network Entropy based Clustering Algorithm for Intrusion Detection. 16-22 - G. A. V. Rama Chandra Rao, P. V. Lakshmi, N. Ravi Shankar:

A New Modular Multiplication Method in Public Key Cryptosystem. 23-27 - Xiuxia Tian, Xiaoling Wang, Aoying Zhou:

DSP Re-encryption Based Access Control Enforcement Management Mechanism in DaaS. 28-41 - Benamar Kadri, Djilalli Moussaoui, Mohammed Feham:

A PKI over Ant Colony based Routing Algorithms for MANETs -AntPKI-. 42-49 - Mehran Asadi, Christopher Zimmerman, Afrand Agah:

A Game-theoretic Approach to Security and Power Conservation in Wireless Sensor Networks. 50-58 - Jianqin Zhou, Wei Xiong:

An Algorithm for Computing m-Tight Error Linear Complexity of Sequences over GF(p^m) with Period p^m. 59-63 - Cheng-Chi Lee, Chia-Hsin Liu, Min-Shiang Hwang:

Guessing Attacks on Strong-Password Authentication Protocol. 64-67 - Abdel Alim Kamal:

Cryptanalysis of a Polynomial-based Key Management Scheme for Secure Group Communication. 68-70
Volume 15, Number 2, March 2013
- Shih-Ting Hsu, Chou Chen Yang, Min-Shiang Hwang:

A Study of Public Key Encryption with Keyword Search. 71-79 - Heba Kamal Aslan, Ghada F. ElKabbany:

Design of a High Performance Implementation of a Tree-Based Multicast Key Distribution Protocol. 80-96 - Mueen Uddin, Azizah Abdul Rahman, Naeem Uddin, Jamshed Memon, Raed A. Alsaqour, Suhail Kazi:

Signature-based Multi-Layer Distributed Intrusion Detection System using Mobile Agents. 97-105 - Manikandan Ganesan, Mari Kamarasan, N. Sairam:

A New Approach for Secure Data Transfer based on Wavelet Transform. 106-112 - Surekha Benguluri, G. N. Swamy:

Sensitive Digital Image Watermarking for Copyright Protection. 113-121 - Changsha Ma, Kaiping Xue, Peilin Hong:

A Proxy Signature Based Re-authentication Scheme for Secure Fast Handoff in Wireless Mesh Networks. 122-132 - Mingwu Zhang, Jintao Yao, Chunzhi Wang, Tsuyoshi Takagi:

Public Key Replacement and Universal Forgery of a SCLS Scheme. 133-138 - Chin-Chen Chang, Chia-Yin Lee:

A Smart Card-based Authentication Scheme Using User Identify Cryptography. 139-147 - Kitae Kim, Hyung-Don Kim, Seungho Kim, Ikkwon Yie:

Remarks on Zhang et al.'s Analysis on a Short Signature Scheme and Their Improvement. 148-150
Volume 15, Number 3, May 2013
- Sébastien Faye, Jean Frédéric Myoupo:

Secure and Energy-efficient Geocast Protocol for Wireless Sensor Networks based on a Hierarchical Clustered Structure. 151-160 - Qinyi Li, Hu Xiong, Fengli Zhang, Shengke Zeng:

An Expressive Decentralizing KP-ABE Scheme with Constant-Size Ciphertext. 161-170 - Fangwei Wang, Yunkai Zhang, Honggang Guo, Changguang Wang:

Combating Good Point Set Scanning-based Self-learning Worms by Using Predators. 171-178 - Jeng-Ping Lin, Jih-Ming Fu:

Authenticated Key Agreement Scheme with Privacy-Protection in the Three-party Setting. 179-189 - Mehdi Bateni, Ahmad Baraani, Ali A. Ghorbani:

Using Artificial Immune System and Fuzzy Logic for Alert Correlation. 190-204 - Qi Duan, Mohit Virendra:

On the Algorithms Related to Threshold Cryptography Based Network Protocols. 205-211 - Yanjun Liu, Chin-Chen Chang, Shih-Chang Chang:

An Efficient Oblivious Transfer Protocol Using Residue Number System. 212-218 - Monjur Alam, Santosh Ghosh, Dipanwita Roy Chowdhury, Indranil Sengupta:

First-order DPA Vulnerability of Rijndael: Security and Area-delay Optimization Trade-off. 219-230
Volume 15, Number 4, July 2013
- Cheng-Chi Lee, Pei-Shan Chung, Min-Shiang Hwang:

A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments. 231-240 - Ramasamy Murugan, Arumugam Shanmugam:

A Timer Based Acknowledgement Scheme for Node Misbehavior Detection and Isolation in MANET. 241-247 - Samir A. Elsagheer Mohamed:

Secure Position Verification Approach for Wireless Ad-hoc Networks. 248-255 - H. K. Pathak, Manju Sanghi:

Simple Three Party Key Exchange Protocol via Twin Diffie-Hellman Problem. 256-264 - R. Padmavathy, Chakravarthy Bhagvati:

Index Calculus Method based on Smooth Numbers of ±1 over Zp. 265-273 - Samaneh Mashhadi:

A Novel Non-repudiable Threshold Proxy Signature Scheme with Known Signers. 274-279 - Dulal C. Kar, Rashad Tatum, Keith Zejdlik:

MHIP: Effective Key Management for Mobile Heterogeneous Sensor Networks. 280-290 - Chang N. Zhang, Qian Yu, Xiao Wei Liu:

A Hybrid Fault Tolerant Approach for AES. 291-297 - Jaydeb Bhaumik, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:

Rain: Reversible Addition with Increased Nonlinearity. 298-306 - Lein Harn, Chin-Chen Chang, Hsiao-Ling Wu:

An Anonymous Multi-Receiver Encryption Based on RSA. 307-312 - Blazej Brzezniak, Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski:

Attack against Ibrahim's Distributed Key Generation for RSA. 313-316 - Hu Xiong, Jian-bin Hu, Zhong Chen:

Security Flaw of an ECC-based Signcryption Scheme with Anonymity. 317-320
Volume 15, Number 5, September 2013
- Cheng-Chi Lee, Shih-Ting Hsu, Min-Shiang Hwang:

A Study of Conjunctive Keyword Searchable Schemes. 321-330 - B. Sathish Babu, Jayashree N., Pallapa Venkataram:

Performance Analysis of Steiner Tree-based Decentralization Mechanism (STDM) for Privacy Protection in Wireless Sensor Networks. 331-340 - Dhruti Sharma, Devesh Jinwala:

Key Generation Protocol in IBC. 341-349 - Debiao He, Weijing Zhao, Shuhua Wu:

Security Analysis of a Dynamic ID-based Authentication Scheme for Multi-server Environment Using Smart Cards. 350-356 - Jayaprakash Kar:

ID-based Deniable Authentication Protocol based on Diffie-Hellman Problem on Elliptic Curve. 357-364 - P. D. Sheba Kezia Malarchelvi:

A Semi-Fragile Image Content Authentication Technique based on Secure Hash in Frequency Domain. 365-372 - Radhika Goel, Anjali Sardana, Ramesh C. Joshi:

Wireless Honeypot: Framework, Architectures and Tools. 373-383 - Haibo Tian, Xiaofeng Chen, Baodian Wei, Yi Liu:

Security Analysis of a Suite of Deniable Authentication Protocols. 384-389 - M. Uma, G. Padmavathi:

A Survey on Various Cyber Attacks and their Classification. 390-396 - Christos K. Dimitriadis:

Security for Mobile Operators in Practice. 397-404 - Jung-San Lee, Chin-Chen Chang, Kuo-Jui Wei:

Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy. 405-410
Volume 15, Number 6, November 2013
- Min-Yu Chen, Chou Chen Yang, Min-Shiang Hwang:

Privacy Protection Data Access Control. 411-419 - Günther Lackner:

A Comparison of Security in Wireless Network Standards with a Focus on Bluetooth, WiFi and WiMAX. 420-436 - Naila Shakeel, Ghulam Murtaza, Nassar Ikram:

MAYHAM - A New Hash Function. 437-445 - Hongbin Tang, Xinsong Liu, Lei Jiang:

A Robust and Efficient Timestamp-based Remote User Authentication Scheme with Smart Card Lost Attack Resistance. 446-454 - Atanu Basu, Indranil Sengupta, Jamuna Kanta Sing:

Cryptosystem for Secret Sharing Scheme with Hierarchical Groups. 455-464 - Monjur Alam, Sonai Ray:

Design of an Intelligent SHA-1 Based Cryptographic System: A CPSO Based Approach. 465-470 - Chin-Chen Chang, Jen-Ho Yang:

A Group-oriented Digital Right Management Scheme with Reliable and Flexible Access Policies. 471-477 - Manjot Bhatia, Sunil Kumar Muttoo, Mahinder Pal Singh Bhatia:

Secure Requirement Prioritized Grid Scheduling Model. 478-483 - Huiyan Chen, Yong Li, Jinping Ren:

A Practical Identity-based Signcryption Scheme. 484-489 - Neeraj Kumar, Manoj Kumar, R. B. Patel:

A Secure and Energy Efficient Data Dissemination Protocol for Wireless Sensor Networks. 490-500

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














