


default search action
International Journal of Network Security, Volume 18
Volume 18, Number 1, January 2016
- Adarsh Kumar, Krishna Gopal, Alok Aggarwal:

Design and Analysis of Lightweight Trust Mechanism for Secret Data using Lightweight Cryptographic Primitives in MANETs. 1-18 - Dhekra Essaidani, Hassene Seddik, Ezzedine Ben Braiek:

Asynchronous Invariant Digital Image Watermarking in Radon Field for Resistant Encrypted Watermark. 19-32 - Ziba Eslami, Mahnaz Noroozi, Saideh Kabiri Rad:

Provably Secure Group Key Exchange Protocol in the Presence of Dishonest Insiders. 33-42 - Zhiyong Zhang, Lijun Yang, Hanman Li, Fei Xiang:

A Quantitative and Qualitative Analysis-based Security Risk Assessment for Multimedia Social Networks. 43-51 - Zhi-Hui Wang, Xu Zhuang, Chin-Chen Chang, Chuan Qin, Yan Zhu:

Reversible Data Hiding Based on Geometric Structure of Pixel Groups. 52-59 - Shuaiting Qiao, Wenbao Han, Yifa Li, Luyao Jiao:

Construction of Extended Multivariate Public Key Cryptosystems. 60-67 - Prabir Kumar Naskar, Hari Narayan Khan, Atal Chaudhuri:

A Key Based Secure Threshold Cryptography for Secret Image. 68-81 - Gaurav Sharma, Suman Bala, Anil K. Verma:

An Improved RSA-based Certificateless Signature Scheme for Wireless Sensor Networks. 82-89 - Feng Wang, Chin-Chen Chang, Changlu Lin, Shih-Chang Chang:

Secure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues. 90-98 - Suresh Kumar Balakrishnan, V. P. Jagathy Raj:

Practical Implementation of a Secure Email System Using Certificateless Cryptography and Domain Name System. 99-107 - Chao-Liang Liu, Gwoboa Horng, Du-Shiau Tsai:

Speeding up Pairing Computation Using Non-adjacent Form and ELM Method. 108-115 - Hongfeng Zhu, Yifeng Zhang, Yan Zhang, Haiyang Li:

A Novel and Provable Authenticated Key Agreement Protocol with Privacy Protection Based on Chaotic Maps towards Mobile Network. 116-123 - Seyyed Amin Seyyedi, Vasili Sadau, Nick Ivanov:

A Secure Steganography Method Based on Integer Lifting Wavelet Transform. 124-132 - Wei-Fu Hsien, Chou Chen Yang, Min-Shiang Hwang:

A Survey of Public Auditing for Secure Data Storage in Cloud Computing. 133-142 - Harini Narasimhan, T. R. Padmanabhan:

3CAuth - A Novel Multi-Factor Authentication Scheme Using QR-Code. 143-150 - Normahirah Nek Abd Rahman, Muhammad Rezal Kamel Ariffin:

The Development of Deniable Authentication Protocol Based on The Bivariate Function Hard Problem. 151-157 - Xuyun Nie, Chuanyong Hou, Zhaohu Xu, Gang Lu:

Analysis of Second Order Matrices Construction in MFE Public Key Cryptosystem. 158-164 - Yang Ming, Yumin Wang:

Cryptanalysis of an Identity Based Signcryption Scheme in the Standard Model. 165-171 - Ruhul Amin:

Cryptanalysis and Efficient Dynamic ID Based Remote User Authentication Scheme in Multi-server Environment Using Smart Card. 172-181 - Quan Qian, Jing Cai, Mengbo Xie, Rui Zhang:

Malicious Behavior Monitoring for Android Applications. 182-192 - Guangsong Li, Qi Jiang, Yanan Shi, Fushan Wei:

Anonymous Network Information Acquirement Protocol for Mobile Users in Heterogeneous Wireless Networks. 193-200
Volume 18, Number 2, March 2016
- Chin-Chen Chang, Chin-Yu Sun, Shih-Chang Chang:

A Strong RSA-based and Certificateless-based Signature Scheme. 201-208 - Hongfeng Zhu, Yan Zhang, Haiyang Li, Lin Lin:

A Novel Biometrics-based One-Time Commitment Authenticated Key Agreement Scheme with Privacy Protection for Mobile Network. 209-216 - Dianli Guo, Fengtong Wen:

A More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC. 217-223 - Samant Saurabh, Ashok Singh Sairam:

Increasing Accuracy and Reliability of IP Traceback for DDoS Attack Using Completion Condition. 224-234 - Hisham Abdalla, Hu Xiong, Abubaker Wahaballa, Philip Avornyo, Zhiguang Qin:

Anonymous Pairing-Free and Certificateless Key Exchange Protocol for DRM System. 235-243 - Xiao Ma, Tongjiang Yan, Daode Zhang, Yanyan Liu:

Linear Complexity of Some Binary Interleaved Sequences of Period 4N. 244-249 - Azz El Arab El Hossaini, Mohamed El Aroussi, Khadija Jamali, Samir Mbarki, Mohammed Wahbi:

A New Robust Blind Copyright Protection Scheme Based on Visual Cryptography and Steerable Pyramid. 250-262 - Abhimanyu Kumar, Sachin Tripathi:

Anonymous ID-based Group Key Agreement Protocol without Pairing. 263-273 - Da-Chun Wu, Ming-Yao Chen:

Information Hiding in Standard MIDI Files Based on Velocity Reference Values. 274-282 - Jun Ye, Haiyan Zhang, Changyou Fu:

Verifiable Delegation of Polynomials. 283-290 - Erukala Suresh Babu, C. Naga Raju, Munaga H. M. Krishna Prasad:

Inspired Pseudo Biotic DNA Based Cryptographic Mechanism Against Adaptive Cryptographic Attacks. 291-303 - Zheng Yang, Daigu Zhang:

Towards Modelling Perfect Forward Secrecy for One-round Group Key Exchange. 304-315 - Miroslav Stampar:

Inferential SQL Injection Attacks. 316-325 - Hongfeng Zhu, Yifeng Zhang, Yu Xia, Haiyang Li:

Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New Architecture in Standard Model. 326-334 - Hai-Duong Le, Ngoc-Tu Nguyen, Chin-Chen Chang:

Provably Secure and Efficient Three-Factor Authenticated Key Agreement Scheme with Untraceability. 335-344 - Said Bouchkaren, Saiida Lazaar:

A New Iterative Secret Key Cryptosystem Based on Reversible and Irreversible Cellular Automata. 345-353 - Quan Qian, Yan-Long Jia, Rui Zhang:

A Lightweight RFID Security Protocol Based on Elliptic Curve Crytography. 354-361 - Prasanth Kumar Thandra, J. Rajan, S. A. V. Satya Murty:

Cryptanalysis of an Efficient Passwortd Authentication Scheme. 362-368 - Nikolay Andreevich Moldovyan, Alexander Andreevich Moldovyan, Andrey Nikolaevich Berezin:

On Using Mersenne Primes in Designing Cryptoschemes. 369-373 - Yimin Wang, Hong Zhong, Yan Xu, Jie Cui:

ECPB: Efficient Conditional Privacy-Preserving Authentication Scheme Supporting Batch Verification for VANETs. 374-382 - Kailas Patil, Braun Frederik:

A Measurement Study of the Content Security Policy on Real-World Applications. 383-392 - Fushan Wei, Yun Wei, Chuangui Ma:

Attack on An ID-based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants. 393-396 - Chung-Huei Ling, Wei-Fu Hsien, Min-Shiang Hwang:

A Double Circular Chain Intrusion Detection for Cloud Computing Based on AdjointVM Approach. 397-400
Volume 18, Number 3, May 2016
- Hongfeng Zhu, Yan Zhang, Xiaodan Wang:

A Novel One-Time Identity-Password Authenticated Scheme Based on Biometrics for E-coupon System. 401-409 - Fan Li, Qian Mao, Chin-Chen Chang:

A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method. 410-419 - Mehdi Hosseinzadeh Aghdam, Peyman Kabiri:

Feature Selection for Intrusion Detection System Using Ant Colony Optimization. 420-432 - Suchart Khummanee, Kitt Tientanopajai:

The Policy Mapping Algorithm for High-speed Firewall Policy Verifying. 433-444 - Younes Asimi, Abdallah Amghar, Ahmed Asimi, Yassine Sadqi:

New Random Generator of a Safe Cryptographic Salt Per Session. 445-453 - Feng Wang, Chin-Chen Chang, Changlu Lin:

Security Analysis on Secure Untraceable Off-line Electronic Cash System. 454-458 - Anthéa Mayzaud, Remi Badonnel, Isabelle Chrisment:

A Taxonomy of Attacks in RPL-based Internet of Things. 459-473 - Arindom Ain, Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita:

Rank Correlation for Low-Rate DDoS Attack Detection: An Empirical Evaluation. 474-480 - Yilei Wang, Wenyi Bao, Yang Zhao, Hu Xiong, Zhiguang Qin:

An ElGamal Encryption with Fuzzy Keyword Search on Cloud Environment. 481-486 - Chenhuang Wu, Xiaoni Du, Zhengtao Jiang:

Linear Complexity of a Family of Pseudorandom Discrete Logarithm Threshold Sequences. 487-492 - Fangwei Wang, Fang Yang, Changguang Wang, Dongmei Zhao, Yunkai Zhang:

Stability Analysis of a Worm Propagation Model with Quarantine and Vaccination. 493-500 - Deris Stiawan, Mohd Yazid Idris, Abdul Hanan Abdullah, Mohammed AlQurashi, Rahmat Budiarto:

Penetration Testing and Mitigation of Vulnerabilities Windows Server. 501-513 - Alka Chaudhary, V. N. Tiwari, Anil Kumar:

A Novel Intrusion Detection System Based on Soft Computing Techniques Using Neuro- Fuzzy Classifier for Packet Dropping Attack in MANETs. 514-522 - Ali Kartit, Hamza Kamal Idrissi, Mohamed Belkhouraf:

Improved Methods and Principles for Designing and Analyzing Security Protocols. 523-528 - Mohamad Badra, Sherali Zeadally:

An Improved Privacy Solution for the Smart Grid. 529-537 - Zhengjun Cao, Lihua Liu, Zhenzhen Yan:

An Improved Lindell-Waisbard Private Web Search Scheme. 538-543 - Xing Zhang, Rongxing Lu, Hong Zhang, Chungen Xu:

A New Digital Signature Scheme from Layered Cellular Automata. 544-552 - Tanmoy Maitra, Ruhul Amin, Debasis Giri, P. D. Srivastava:

An Efficient and Robust User Authentication Scheme for Hierarchical Wireless Sensor Networks without Tamper-Proof Smart Card. 553-564 - Chien-Cheng Huang, Kwo-Jean Farn:

A Study on E-Taiwan Promotion Information Security Governance Programs with E-government Implementation of Information Security Management Standardization. 565-578 - Govand Kadir, Torben Kuseler, Ihsan Alshahib Lami:

SMPR: A Smartphone Based MANET Using Prime Numbers to Enhance the Network-nodes Reachability and Security of Routing Protocols. 579-589 - Chung-Huei Ling, Shih-Ming Chen, Min-Shiang Hwang:

Cryptanalysis of Tseng-Wu Group Key Exchange Protocol. 590-593 - Chin-Yu Sun, Ching-Chun Chang:

Cryptanalysis of a Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems. 594-596 - Fuh-Gwo Jeng, Shu-Yuan Lin, Bing-Jian Wang, Chih-Hung Wang, Tzung-Her Chen:

On the Security of Privacy-preserving Keyword Searching for Cloud Storage Services. 597-600
Volume 18, Number 4, July 2016
- Ahmed Asimi, Younes Asimi, Abdellah Amghar, Yassine Sadqi:

Strong Zero-knowledge Authentication Based on Virtual Passwords. 601-616 - Yanjun Liu, Chin-Chen Chang:

An Integratable Verifiable Secret Sharing Mechanism. 617-624 - Solomon Sarpong, Chunxiang Xu, Xiaojun Zhang:

PPAM: Privacy-preserving Attributes Matchmaking Protocol for Mobile Social Networks Secure against Malicious Users. 625-632 - Biswapati Jana, Debasis Giri, Shyamal Kumar Mondal:

Dual-Image Based Reversible Data Hiding Scheme Using Pixel Value Difference Expansion. 633-643 - Kai-Hao Chen, Xiaoming Tang, Peng Xu, Man Guo, Weidong Qiu, Zheng Gong:

An Improved Automatic Search Method for Differential Trails in TEA Cipher. 644-649 - Chi-Wei Liu, Wei-Fu Hsien, Chou Chen Yang, Min-Shiang Hwang:

A Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing. 650-666 - Christopher W. Badenhop, Benjamin W. P. Ramsey, Barry E. Mullins:

An Analytical Black Hole Attack Model Using a Stochastic Topology Approximation Technique for Reactive Ad-Hoc Routing Protocols. 667-677 - Annamalai Prakash, R. Dhanalakshmi:

Stride Towards Proposing Multi-Modal Biometric Authentication for Online Exam. 678-687 - Hongfeng Zhu, Yifeng Zhang, Yan Zhang:

A Provably Password Authenticated Key Exchange Scheme Based on Chaotic Maps in Different Realm. 688-698 - Dinesh Singh, Dhiren Patel, Bhavesh Borisaniya, Chirag Modi:

Collaborative IDS Framework for Cloud. 699-709 - Lein Harn, Feng Wang:

Threshold Signature Scheme without Using Polynomial Interpolation. 710-717 - Shun Zhang, Tiegang Gao, Liang Yang:

A Reversible Data Hiding Scheme Based on Histogram Modification in Integer DWT Domain for BTC Compressed Images. 718-727 - Fuh-Gwo Jeng, Jyun-Ci Huang, Tzung-Her Chen:

An Improved Anonymous Buyer-Reseller Watermarking Protocol. 728-735 - Bhawani Shanker Bhati, Pallapa Venkataram:

Performance Analysis of Location Privacy Preserving Scheme for MANETs. 736-749 - K. Bharanitharan, Chin-Chen Chang, Yang Hai Rui, Zhi-Hui Wang:

Efficient Pixel Prediction Algorithm for Reversible Data Hiding. 750-757 - Krishna Bhowal, Debasree Sarkar, Sushanta Biswas, Partha Pratim Sarkar:

Secured Genetic Algorithm Based Image Hiding Technique with Boolean Functions. 758-768 - Mohammed Ramadan, Fagen Li, Chunxiang Xu, Abdeldime Mohamed, Hisham Abdalla, Ahmed Abdalla Ali:

User-to-User Mutual Authentication and Key Agreement Scheme for LTE Cellular System. 769-781 - Jianghong Wei, Wenfen Liu, Xuexian Hu:

Secure and Efficient Smart Card Based Remote User Password Authentication Scheme. 782-792 - Chih-Cheng Chen, Hanmin Chien, Gwoboa Horng:

Cryptanalysis of a Compact Certificateless Aggregate Signature Scheme. 793-797 - Martin Stanek:

Weaknesses of Password Authentication Scheme Based on Geometric Hashing. 798-801
Volume 18, Number 5, September 2016
- Hongfeng Zhu, Yifeng Zhang, Yang Sun:

Provably Secure Multi-server Privacy-Protection System Based on Chebyshev Chaotic Maps without Using Symmetric Cryptography. 803-815 - Qing-Qing Xie, Shunrong Jiang, Liangmin Wang, Chin-Chen Chang:

Composable Secure Roaming Authentication Protocol for Cloud-assisted Body Sensor Networks. 816-831 - Yosra Ben Saied, Alexis Olivereau:

A Lightweight Threat Detection System for Industrial Wireless Sensor Networks. 842-854 - Amar Buchade, Rajesh Ingle:

Key Trees Combining Algorithm for Overlapping Resource Access Members. 855-860 - Anirban Goswami, Nabin Ghoshal:

Imperceptible Image Authentication Using Wavelets. 861-873 - Dileep Kumar Pattipati, Appala Naidu Tentu, V. Ch. Venkaiah, Allam Appa Rao:

Sequential Secret Sharing Scheme Based on Level Ordered Access Structure. 874-881 - Hui Xiao, Hongbin Wang, Meitong Lin:

The Research on File Encryption Method Based on File Content Partitioning Restructuring. 882-887 - Osman Wahballa, Abubaker Wahaballa, Fagen Li, Chunxiang Xu:

A Secure and Robust Certificateless Public Key Steganography Based on SVD-DDWT. 888-899 - Chi-Wei Liu, Wei-Fu Hsien, Chou Chen Yang, Min-Shiang Hwang:

A Survey of Attribute-based Access Control with User Revocation in Cloud Data Storage. 900-916 - Zhenhua Chen, Shundong Li, Qiong Huang, Jianhua Yan, Yong Ding:

A Joint Random Secret Sharing Scheme with Public Verifiability. 917-925 - Parimalla Subhash, S. Ramachandram:

Trust Based HWMP Protocol in High-Performance Wireless Mesh Networks. 926-937 - Mohammed Hassouna, Eihab Bashier, Bazara I. A. Barry:

A Strongly Secure Certificateless Digital Signature Scheme in the Random Oracle Model. 938-945 - Depeng Li, Srinivas Sampalli:

Group Rekeying Scheme for Dynamic Peer Group Security in Collaborative Networks. 946-959 - Rang Zhou, Chunxiang Xu, Wanpeng Li, Jining Zhao:

An ID-based Hierarchical Access Control Scheme with Constant Size Public Parameter. 960-968 - Murari Mandal, Gaurav Sharma, Anil K. Verma:

A Computational Review of Identity-based Signcryption Schemes. 969-977 - Amar Buchade, Rajesh Ingle:

Analysis of Algorithms for Overlapping Resource Access Members in Cloud Computing. 978-986 - Shaoquan Jiang, Zailiang Tang, Mingsheng Wang:

On the CLD Attack to a Statistical Model of a Key Stream Generator. 987-992 - Yan Xu, Liusheng Huang, Miaomiao Tian, Hong Zhong:

Insecurity of a Certificate-free Ad Hoc Anonymous Authentication. 993-996 - Yanjun Liu, Chin-Chen Chang, Chin-Yu Sun:

Notes on "An Anonymous Multi-server Authenticated Key Agreement Scheme Based on Trust Computing Using Smart Card and Biometrics". 997-1000
Volume 18, Number 6, November 2016
- Hongfeng Zhu:

Secure Chaotic Maps-based Group Key Agreement Scheme with Privacy Preserving. 1001-1009 - Chin-Chen Chang, Wei-Yuan Hsueh, Ting-Fang Cheng:

An Advanced Anonymous and Biometrics-based Multi-server Authentication Scheme Using Smart Cards. 1010-1021 - Ming-Ru Xie, Chia-Chun Wu, Jau-Ji Shen, Min-Shiang Hwang:

A Survey of Data Distortion Watermarking Relational Databases. 1022-1033 - Nurhashikin Mohd Salleh, Siti Rahayu Selamat, Robiah Yusof, Shahrin Sahib:

Discovering Cyber Terrorism Using Trace Pattern. 1034-1040 - Hiten Choudhury, Basav Roychoudhury, Dilip Kr. Saikia:

Security Extension for Relaxed Trust Requirement in Non3GPP Access to the EPS. 1041-1053 - Zhengjun Cao, Lihua Liu, Olivier Markowitch:

On Two Kinds of Flaws in Some Server-Aided Verification Schemes. 1054-1059 - Trung Ngo Thanh, Tae-Young Choe:

A Stubborn Security Model Based on Three-factor Authentication and Modified Public Key. 1060-1070 - Xiuxia Tian, Lisha Li, Jinguo Li, Hongjiao Li, Chunhua Gu:

Secret Share Based Program Access Authorization Protocol for Smart Metering. 1071-1079 - Ashraf Aboshosha, Kamal A. ElDahshan, Eman K. Elsayed, Ahmed A. Elngar:

Secure Authentication Protocol Based on Machine-metrics and RC4-EA Hashing. 1080-1088 - Maged Hamada Ibrahim:

Octopus: An Edge-fog Mutual Authentication Scheme. 1089-1101 - Jiaohua Qin, Ruxin Sun, Xuyu Xiang, Hao Li, Huajun Huang:

Anti-fake Digital Watermarking Algorithm Based on QR Codes and DWT. 1102-1108 - Zheng Yang, Chao Liu, Wanping Liu, Song Luo, Hua Long, Shuangqing Li:

A Lightweight Generic Compiler for Authenticated Key Exchange from Non-interactive Key Exchange with Auxiliary Input. 1109-1121 - Junlan Bai, Chin-Chen Chang:

A High Payload Steganographic Scheme for Compressed Images with Hamming Code. 1122-1129 - Warakorn Srichavengsup, Wimol San-Um:

Data Encryption Scheme Based on Rules of Cellular Automata and Chaotic Map Function for Information Security. 1130-1142 - Ya Gao, Peng Zeng, Kim-Kwang Raymond Choo, Fu Song:

An Improved Online/Offline Identity-Based Signature Scheme for WSNs. 1143-1151 - Lamri Laouamer, Omar Tayan:

An Efficient and Robust Hybrid Watermarking Scheme for Text-Images. 1152-1158 - Qais Qassim, Abdullah Mohd Zin, Mohd Juzaiddin Ab Aziz:

Anomalies Classification Approach for Network-based Intrusion Detection System. 1159-1172 - Peng-yu Cui:

An Improved Ownership Transfer and Mutual Authentication for Lightweight RFID Protocols. 1173-1179 - Ouissem Ben Fredj:

An Automatic Alert Unification Method for Heterogeneous Alert Signatures. 1180-1191 - Qiao Peng, Youliang Tian:

A Publicly Verifiable Secret Sharing Scheme Based on Multilinear Diffie-Hellman Assumption. 1192-1200

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














