


default search action
International Journal of Network Security, Volume 16
Volume 16, Number 1, January 2014
- Pei-Shan Chung, Chi-Wei Liu, Min-Shiang Hwang:

A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments. 1-13 - Karthikeyan Balasubramanian, S. Ramakrishnan, V. Vaithiyanathan, S. Sruti, M. Gomathymeenakshi:

An Improved Steganographic Technique Using LSB Replacement on a Scanned Path Image. 14-18 - Yang Cui, Kirill Morozov, Kazukuni Kobara, Hideki Imai:

Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE. 19-28 - Jayaprakash Kar:

Provably Secure Online/Off-line Identity-Based Signature Scheme for Wireless Sensor Network. 29-39 - Jian-Guo Sun, Guo-Yin Zhang, Ai-Hong Yao, Jun-Peng Wu:

A Reversible Digital Watermarking Algorithm for Vector Maps. 40-45 - Soniya Balram, M. Wilscy:

User Traffic Profile for Traffic Reduction and Effective Bot C&C Detection. 46-52 - Navaneet Ojha, Sahadeo Padhye:

Cryptanalysis of Multi Prime RSA with Secret Key Greater than Public Key. 53-57 - Yanjun Liu, Chin-Chen Chang, Shih-Chang Chang:

An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem. 58-64 - Annamalai Prakash, Rajeswari Mukesh:

A Biometric Approach for Continuous User Authentication by Fusing Hard and Soft Traits. 65-70 - Yunqi Dou, Jiang Weng, Chuangui Ma:

Improved Fault Attack Against Eta Pairing. 71-77 - Debiao He, Muhammad Khurram Khan, Shuhua Wu:

On the Security of a RSA-based Certificateless Signature Scheme. 78-80
Volume 16, Number 2, March 2014
- Tarek M. I. El-Sakka, Mohammed Zaki:

Using Predicate-based Model Checker for Verifying E-Commerce Protocols. 90-101 - Poonam Gera, Kumkum Garg, Manoj Misra:

Trust-based Multi-Path Routing for Enhancing Data Security in MANETs. 102-111 - Abderrahmane Nitaj:

Cryptanalysis of NTRU with two Public Keys. 112-117 - Mohammad Esmaeildoust, Keivan Navi, Shirin Rezaei, Marzieh Gerami:

On the Design of RNS Bases for Modular Multiplication. 118-128 - Yuan Wang, Duncan S. Wong, Liusheng Huang:

One-Pass Key Establishment Protocol for Wireless Roaming with User Anonymity. 129-142 - Mohammad Sabzinejad Farash, Mahmoud Ahmadian-Attari:

A Pairing-free ID-based Key Agreement Protocol with Different PKGs. 143-148 - Benamar Kadri, Mohammed Feham, Abdellah Mhammed:

Efficient and Secured Ant Routing Algorithm for Wireless Sensor Networks. 149-156 - Min Zhou, Mingwu Zhang, Chunzhi Wang, Bo Yang:

CCLAS: A Practical and Compact Certificateless Aggregate Signature with Share Extraction. 157-164
Volume 16, Number 3, May 2014
- Rakesh Matam, Somanath Tripathy:

Provably Secure Routing Protocol for Wireless Mesh Networks. 168-178 - Satyajit Das, Jaydeb Bhaumik:

A Fault Based Attack on MDS-AES. 179-184 - Yunqi Dou, Jiang Weng, Yun Wei, Chuangui Ma:

Fault Attack Against Miller's Algorithm for Even Embedding Degree. 185-193 - Y. V. Subba Rao, Chakravarthy Bhagvati:

CRT based Threshold Multi Secret Sharing scheme. 194-200 - Chin-Chen Chang, Thai Son Nguyen, Chia-Chen Lin:

Reversible Image Hiding for High Image Quality Based on Histogram Shifting and Local Complexity. 201-213 - Mohamed Amin, Hatem M. Abdullkader, Hani M. Ibrahem, Ahmed S. Sakr:

A Steganographic Method Based on DCT and New Quantization Technique. 214-219 - Xi Chen, Yun Liu, Chin-Chen Chang, Cheng Guo:

Generalized Secret Sharing with Linear Hierarchical Secrets. 220-228 - Boqing Zhou, Sujun Li, Jianxin Wang, Siqing Yang, Jingguo Dai:

A Pairwise Key Establishment Scheme for Multiple Deployment Sensor Networks. 229-236
Volume 16, Number 4, July 2014
- Chien-Cheng Huang, Kwo-Jean Farn, Frank Yeong-Sung Lin:

A Study on Implementations of Information Security Risk Assessment: Application to Chlorine Processing System of Water Treatment. 241-248 - Y. V. Subba Rao, Chakravarthy Bhagvati:

CRT Based Threshold Multi Secret Sharing Scheme. 249-255 - Yanli Ren, Zhihua Niu, Xinpeng Zhang:

Fully Anonymous Identity-based Broadcast Encryption without Random Oracles. 256-264 - Mohamed Amin, Hatem M. Abdullkader, Hani M. Ibrahem, Ahmed S. Sakr:

A Steganographic Method Based on DCT, New Quantization Technique. 265-270 - Xu Zhuang, Chin-Chen Chang, Zhi-Hui Wang, Yan Zhu:

A Simple Password Authentication Scheme Based on Geometric Hashing Function. 271-277 - Zhiguang Qin, Hu Xiong, Fagen Li:

A Provably Secure Certificate Based Ring Signature Without Pairing. 278-285 - Keying Li, Hua Ma:

Outsourcing Decryption of Multi-Authority ABE Ciphertexts. 286-294 - Qian Mao, Chin-Chen Chang, Ting-Feng Chung:

A Reversible Steganography Suitable for Embedding Small Amounts of Data. 295-303 - Boris Mihajlov, Mitko Bogdanoski:

Analysis of the WSN MAC Protocols under Jamming DoS Attack. 304-312 - Chi-Shiang Chan, Yi-Hui Chen, Yuan-Yu Tsai:

An Improvement of Square Matrix Encoding by Adjusting Digits in a Matrix. 313-317 - Tung-Huang Feng, Chung-Huei Ling, Min-Shiang Hwang:

Cryptanalysis of Tan's Improvement on a Password Authentication Scheme for Multi-server Environments. 318-321
Volume 16, Number 5, September 2014
- Wei Teng Li, Tung-Huang Feng, Min-Shiang Hwang:

Distributed Detecting Node Replication Attacks in Wireless Sensor Networks: A Survey. 323-330 - Shengke Zeng, Hu Xiong:

Privacy-enhanced Designated Confirmer Signature without Random Oracles. 331-339 - Safwan Mahmud Khan, Kevin W. Hamlen:

Penny: Secure, Decentralized Data Management. 340-354 - Jianhong Zhang, Min Xu, Liying Liu:

On the Security of a Secure Batch Verification with Group Testing for VANET. 355-362 - Yuan-Yu Tsai, Jian-Ting Chen, Chi-Shiang Chan:

Exploring LSB Substitution and Pixel-value Differencing for Block-based Adaptive Data Hiding. 363-368 - Walid I. Khedr:

On the Security of Moessner's and Khan's Authentication Scheme for Passive EPCglobal C1G2 RFID Tags. 369-375 - Maha S. Abdelhaq, Raed A. Alsaqour, Mohammed Al-Hubaishi, Tariq Alahdal, Mueen Uddin:

The Impact of Resource Consumption Attack on Mobile Ad-hoc Network Routing. 376-381 - Jie Wang, Yanshuo Yu, Kuanjiu Zhou:

A Regular Expression Matching Approach to Distributed Wireless Network Security System. 382-388 - Chi-Hsien Lin, K. Bharanitharan, Chin-Chen Chang:

Comments and Proofs to Published Paper - A Novel Reversible Robust Watermarking Algorithm Based on a Chaotic System. 389-392 - Debiao He, Yuanyuan Zhang, Jianhua Chen:

Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol. 393-396 - Zhenhua Chen, Shundong Li, Chunzhi Wang, Mingwu Zhang:

Comments on FHH Anonymous Multireceiver Encryption. 397-400
Volume 16, Number 6, November 2014
- Wei Teng Li, Chung-Huei Ling, Min-Shiang Hwang:

Group Rekeying in Wireless Sensor Networks: A Survey. 400-410 - Xi Chen, Yun Liu, Chin-Chen Chang, Cheng Guo:

Generalized Secret Sharing with Linear Hierarchical Secrets. 411-419 - Lein Harn, Fuyou Miao:

Weighted Secret Sharing Based on the Chinese Remainder Theorem. 420-425 - Yesem Kurt-Peker:

A New Key Agreement Scheme Based on the Triple Decomposition Problem. 426-436 - Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Guangjun Liu:

Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data. 437-443 - Yongtao Wang:

Lattice Ciphertext Policy Attribute-based Encryption in the Standard Model. 444-451 - Mamta Juneja, Parvinder Singh Sandhu:

Improved LSB based Steganography Techniques for Color Images in Spatial Domain. 452-462 - Hui-Feng Huang, Hong-Wei Chang, Po-Kai Yu:

Enhancement of Timestamp-based User Authentication Scheme with Smart Card. 463-467 - CaLynna Sorrells, Lijun Qian:

Quickest Detection of Denial-of-Service Attacks in Cognitive Wireless Networks. 468-476 - Ying-Dar Lin, Yi-Ta Chiang, Yu-Sung Wu, Yuan-Cheng Lai:

Automatic Analysis and Classification of Obfuscated Bot Binaries. 477-486 - Zhi-Hui Wang, Haibo Jin, Xuebo Wang, Chin-Chen Chang:

An Adaptable (n, n) Secret Image Sharing Mechanism Based on Boolean Operation. 487-493 - Qingfeng Cheng:

Cryptanalysis of a New Efficient Authenticated Multiple-Key Exchange Protocol from Bilinear Pairings. 494-497 - Miaomiao Tian, Youwen Zhu, Zhili Chen:

Two Simple Attacks on a Blind Signature Scheme. 498-500

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














