International Journal of Network Security, Volume 16
Volume 16, Number 1, January 2014
Jayaprakash Kar:
Provably Secure Online/Off-line Identity-Based Signature Scheme for Wireless Sensor Network. 29-39
Volume 16, Number 2, March 2014
Volume 16, Number 3, May 2014
Volume 16, Number 4, July 2014
Keying Li,
Hua Ma:
Outsourcing Decryption of Multi-Authority ABE Ciphertexts. 286-294
Volume 16, Number 5, September 2014
Shengke Zeng,
Hu Xiong:
Privacy-enhanced Designated Confirmer Signature without Random Oracles. 331-339 Walid I. Khedr:
On the Security of Moessner's and Khan's Authentication Scheme for Passive EPCglobal C1G2 RFID Tags. 369-375
Volume 16, Number 6, November 2014
Yesem Kurt-Peker:
A New Key Agreement Scheme Based on the Triple Decomposition Problem. 426-436 Yongtao Wang:
Lattice Ciphertext Policy Attribute-based Encryption in the Standard Model. 444-451 Qingfeng Cheng:
Cryptanalysis of a New Efficient Authenticated Multiple-Key Exchange Protocol from Bilinear Pairings. 494-497
maintained by

, founded at
