


default search action
International Journal of Network Security, Volume 19
Volume 19, Number 1, January 2017
- Yanjun Liu, Chin-Chen Chang, Shih-Chang Chang:

An Efficient and Secure Smart Card Based Password Authentication Scheme. 1-10 - Liang Liu, Jun Ye:

A Homomorphic Universal Re-encryptor for Identity-based Encryption. 11-19 - Fangwei Wang, Hongfeng Gao, Yong Yang, Changguang Wang:

An SVEIR Defending Model with Partial Immunization for Worms. 20-26 - Hisham Abdalla, Hu Xiong, Abubaker Wahaballa, Ahmed Abdalla Ali, Mohammed Ramadan, Zhiguang Qin:

Integrating the Functional Encryption and Proxy Re-cryptography to Secure DRM Scheme. 27-38 - Jie Ling, Ying Wang, Weifeng Chen:

An Improved Privacy Protection Security Protocol Based on NFC. 39-46 - Padmapriya Praveenkumar, Karuppuswamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan:

Mojette (d) Secret Image "SEDIH" in an Encrypted Double Image - A Histo Approach. 47-59 - Kuo-Jui Wei, Jung-San Lee, Bo Li:

SMP: Scalable Multicast Protocol for Granting Authority in Heterogeneous Networks. 60-71 - Suchart Khummanee, Kitt Tientanopajai:

High-speed Firewall Rule Verification with O(1) Worst-case Access Time. 72-84 - Quanyu Zhao, Yining Liu, Gao Liu, Chin-Chen Chang:

A Novel Micropayment Scheme with Variable Denomination. 85-90 - Zhengjun Cao, Lihua Liu:

The Paillier's Cryptosystem and Some Variants Revisited. 91-98 - Kritsanapong Somsuk, Kitt Tientanopajai:

An Improvement of Fermat's Factorization by Considering the Last m Digits of Modulus to Decrease Computation Time. 99-111 - Shih-Ming Chen, Ching-Rong Yang, Min-Shiang Hwang:

Using a New Structure in Group Key Management for Pay-TV. 112-117 - Feng Jiang, Paul Salama, Brian King:

A Public-Key Approach of Selective Encryption for Images. 118-126 - Dan Liu, Shun Zhang, Hong Zhong, Runhua Shi, Yimin Wang:

An Efficient ID-based Online/Offline Signature Scheme without Key Escrow. 127-137 - Bo Meng, Chin-Tser Huang, Yitong Yang, Leyuan Niu, Dejun Wang:

Automatic Generation of Security Protocol Implementations Written in Java from Abstract Specifications Proved in the Computational Model. 138-153 - Qiang Jin, Zhihong Li, Chin-Chen Chang, Anhong Wang, Li Liu:

Minimizing Turtle-Shell Matrix Based Stego Image Distortion Using Particle Swarm Optimization. 154-162 - Binlin Cheng, Jianming Fu:

Social Bots Detection on Mobile Social Networks. 163-166
Volume 19, Number 2, March 2017
- Omprakash Kaiwartya, Mukesh Prasad, Shiv Prakash, Durgesh Samadhiya, Abdul Hanan Abdullah, Syed Othmawi Abd Rahman:

An Investigation on Biometric Internet Security. 167-176 - Chung-Huei Ling, Cheng-Chi Lee, Chou Chen Yang, Min-Shiang Hwang:

A Secure and Efficient One-time Password Authentication Scheme for WSN. 177-181 - Vrushank M. Shah, A. K. Agarwal:

Reliable Alert Fusion of Multiple Intrusion Detection Systems. 182-192 - Jayam Modi, Manav Prajapati, Abhinav Sharma, Ravi Ojha, Devesh Jinwala:

A Secure Communication Model for Expressive Access Control Using CP-ABE. 193-204 - Qian Mao, Chin-Chen Chang:

Turbo Unequal Error Protection Codes with Multiple Protection Levels. 205-216 - Yang Sun, Xueshuai Feng, Hongfeng Zhu:

Two-phase Commit with Security Services: Using Distinctive Proofs to Relieve Fragile Communications. 217-228 - Lunzhi Deng, Huawei Huang, Yunyun Qu:

Identity Based Proxy Signature from RSA without Pairings. 229-235 - Junshe Wang, Jinliang Liu, Hongbin Zhang:

Access Control Based Resource Allocation in Cloud Computing Environment. 236-243 - Abdulghani Ali Ahmed, Noorul Ahlami Kamarul Zaman:

Attack Intention Recognition: A Review. 244-250 - Dipen Contractor, Dhiren R. Patel:

Accountability in Cloud Computing by Means of Chain of Trust. 251-259 - Lifeng Yuan, Mingchu Li, Cheng Guo, Wei-Tong Hu, Zhi-Hui Wang:

A Verifiable E-voting Scheme with Secret Sharing. 260-271 - Hua Ma, Ting Peng, Zhenhua Liu:

Directly Revocable and Verifiable Key-Policy Attribute-based Encryption for Large Universe. 272-284 - Cai-Sen Chen, Xi Yu, Yang-Xia Xiang, Xiong Li, Tengrun Li:

An Improved DPA Attack on DES with Forth and Back Random Round Algorithm. 285-294 - Maged Hamada Ibrahim:

SecureCoin: A Robust Secure and Efficient Protocol for Anonymous Bitcoin Ecosystem. 295-312 - Xingbing Fu, Xunyun Nie, Fagen Li:

Outsource the Ciphertext Decryption of Inner Product Predicate Encryption Scheme Based on Prime Order Bilinear Map. 313-322 - Zhengjun Cao, Lihua Liu:

A Note on Two Schemes for Secure Outsourcing of Linear Programming. 323-326
Volume 19, Number 3, May 2017
- Li Liu, Anhong Wang, Chin-Chen Chang, Zhihong Li:

A Secret Image Sharing with Deep-steganography and Two-stage Authentication Based on Matrix Encoding. 327-334 - Ahmed Drissi, Ahmed Asimi:

Behavioral and Security Study of the OHFGC Hash Function. 335-339 - Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li:

Message Recovery via an Efficient Multi-Proxy Signature With Self-certified Keys. 340-346 - Cong Jin, Hui Liu:

A Color Image Encryption Scheme Based on Arnold Scrambling and Quantum Chaotic. 347-357 - Udai Pratap Rao, Nikhil Kumar Singh:

Weighted Role Based Data Dependency Approach for Intrusion Detection in Database. 358-370 - Yang Sun, Hongfeng Zhu, Xueshuai Feng:

A Novel and Concise Multi-receiver Protocol Based on Chaotic Maps with Privacy Protection. 371-382 - Sunny Behal, Krishan Kumar:

Characterization and Comparison of DDoS Attack Tools and Traffic Generators: A Review. 383-393 - Seyed Mahmood Hashemi, Jingsha He, Alireza Ebrahimi Basabi:

Multi-objective Optimization for Computer Security and Privacy. 394-405 - Chenglian Liu:

A Study of Relationship Among Goldbach Conjecture, Twin Prime and Fibonacci Number. 406-412 - Devi Thiyagarajan, R. Ganesan:

Cryptographically imposed model for Efficient Multiple Keyword-based Search over Encrypted Data in Cloud by Secure Index using Bloom Filter and False Random Bit Generator. 413-420 - K. Arthi, M. Chandra Mouli Reddy:

A Secure and Efficient Privacy-Preserving Attribute Matchmaking Protocol for Mobile Social Networks. 421-429 - Raghav V. Sampangi, Srinivas Sampalli:

Metamorphic Framework for Key Management and Authentication in Resource-Constrained Wireless Networks. 430-442 - Cheng-Yi Tsai, Chi-Yu Liu, Shyh-Chang Tsaur, Min-Shiang Hwang:

A Publicly Verifiable Authenticated Encryption Scheme Based on Factoring and Discrete Logarithms. 443-448 - Jianxing Cai, Yanli Ren, Tiejin Jiang:

Verifiable Outsourcing Computation of Modular Exponentiations with Single Server. 449-457 - Yibing Wang, Jie Fang, Fuhu Wu:

Application of Community Detection Algorithm with Link Clustering in Inhibition of Social Network Worms. 458-468 - Lidong Han, Qi Xie, Wenhao Liu:

An Improved Biometric Based Authentication Scheme with User Anonymity Using Elliptic Curve Cryptosystem. 469-478 - Khalid Charif, Ahmed Drissi, Zine El Abidine Guennoun:

A Pseudo Random Number Generator Based on Chaotic Billiards. 479-486
Volume 19, Number 4, July 2017
- Hongfeng Zhu, Yifeng Zhang:

An Improved Two-party Password-Authenticated Key Agreement Protocol with Privacy Protection Based on Chaotic Maps. 487-497 - Mayada Tarek, Osama Ouda, Taher Hamza:

Pre-image Resistant Cancelable Biometrics Scheme Using Bidirectional Memory Model. 498-506 - Cong Jin, Xiaoyan Wang:

Propagation Model with Varying Population Size of Removable Memory Device Virus. 507-516 - Pipat Hiranvanichakorn:

Provably Authenticated Group Key Agreement Based on Braid Groups - The Dynamic Case. 517-527 - Seyed Mahmood Hashemi, Jingsha He:

An Evolutionary Multi-objective Approach for Modelling Network Security. 528-536 - Thangakumar Jeyaprakash, Rajeswari Mukesh:

A New Trusted Routing Protocol for Vehicular Ad Hoc Networks Using Trusted Metrics. 537-545 - Ruifang Meng, Tongjiang Yan:

New Constructions of Binary Interleaved Sequences with Low Autocorrelation. 546-550 - Mohammed Hassouna, Bazara I. A. Barry, Eihab Bashier:

A New Level 3 Trust Hierarchal Certificateless Public Key Cryptography Scheme in the Random Oracle Model. 551-558 - Balamurugan Balusamy, P. Venkata Krishna, G. S. Tamizh Arasi, Victor Chang:

A Secured Access Control Technique for Cloud Computing Environment Using Attribute Based Hierarchical Structure and Token Granting System. 559-572 - Yang Chen, Yang Zhao, Hu Xiong, Feng Yue:

A Certificateless Strong Designated Verifier Signature Scheme with Non-delegatability. 573-582 - Mina Malekzadeh, Moghis Ashrostaghi:

COL-MOD: A New Module to Quantify the Weight of Damage Incurred by Collision Attacks. 583-592 - Sujarani Rajendran, Manivannan Doraipandian:

Chaotic Map Based Random Image Steganography Using LSB Technique. 593-598 - Asif Uddin Khan, Bikram Kesari Ratha:

A Secure Strong Designated Verifier Signature Scheme. 599-604 - Jianhong Zhang, Pengyan Li, Min Xu:

On the Security of an Mutual Verifiable Provable Data Auditing in Public Cloud Storage. 605-612 - Zhixiong Chen, Vladimir Edemskiy:

Linear Complexity of Quaternary Sequences Over Z4 Derived From Generalized Cyclotomic Classes Modulo 2p. 613-622 - Yilei Wang, Dongjie Yan, Fagen Li, Hu Xiong:

A Key-insulated Proxy Re-encryption Scheme for Data Sharing in a Cloud Environment. 623-630 - Yanna Ma:

NFC Communications-based Mutual Authentication Scheme for the Internet of Things. 631-638 - Wan-Yu Chao, Cheng-Yi Tsai, Min-Shiang Hwang:

An Improved Key-Management Scheme for Hierarchical Access Control. 639-643 - Zhengping Jin, Hong Zhang, Zhongxian Li:

Security on a Knapsack-Type Encryption Scheme Based Upon Hybrid-Model Assumption. 644-647 - Wei-Liang Tai, Ya-Fen Chang:

Comments on a Secure Authentication Scheme for IoT and Cloud Servers. 648-651
Volume 19, Number 5, September 2017
- Iuon-Chang Lin, Tzu-Chun Liao:

A Survey of Blockchain Security Issues and Challenges. 653-659 - Ebenezer Popoola, Aderemi Oluyinka Adewumi:

Efficient Feature Selection Technique for Network Intrusion Detection System Using Discrete Differential Evolution and Decision. 660-669 - Minhong Sun, Yuan Qin, Jianrong Bao, Xutao Yu:

GPS Spoofing Detection Based on Decision Fusion with a K-out-of-N Rule. 670-674 - Yousef Farhaoui:

Design and Implementation of an Intrusion Prevention System Inspired Immune Systems. 675-683 - K. Brindha, N. Jeyanthi:

Securing Portable Document Format File Using Extended Visual Cryptography to Protect Cloud Data Storage. 684-693 - Ihsan Jabbar, Saad Najim Alsaad:

Design and Implementation of Secure Remote e-Voting System Using Homomorphic Encryption. 694-703 - Peng Hu, Haiying Gao:

A Key-Policy Attribute-based Encryption Scheme for General Circuit from Bilinear Maps. 704-710 - Pramote Kuacharoen:

An Anti-Phishing Password Authentication Protocol. 711-719 - Ye Tian, Yanbin Peng, Gaimei Gao, Xinguang Peng:

Role-based Access Control for Body Area Networks Using Attribute-based Encryption in Cloud Storage. 720-726 - Mohd Zaki Mas'ud, Shahrin Sahib, Mohd Faizal Abdollah, Siti Rahayu Selamat, Choo Yun Huoy:

A Comparative Study on Feature Selection Method for N-gram Mobile Malware Detection. 727-733 - Sunny Behal, Krishan Kumar, Monika Sachdeva:

Discriminating Flash Events from DDoS Attacks: A Comprehensive Review. 734-741 - Umesh Kumar Singh, Chanchala Joshi:

Information Security Risk Management Framework for University Computing Environment. 742-751 - Qiu-Yu Zhang, Wen-Jin Hu, Si-Bin Qiao, Yi-Bo Huang:

Speech Perceptual Hashing Authentication Algorithm Based on Spectral Subtraction and Energy to Entropy Ratio. 752-760 - Swaswati Goswami, Nazrul Hoque, Dhruba K. Bhattacharyya, Jugal Kalita:

An Unsupervised Method for Detection of XSS Attack. 761-775 - Osman Wahballa, Abubaker Wahaballa, Fagen Li, Idris Ibn Idris, Chunxiang Xu:

Medical Image Encryption Scheme Based on Arnold Transformation and ID-AK Protocol. 776-784 - Min Wu, Jianhua Chen, Ruibing Wang:

An Enhanced Anonymous Password-based Authenticated Key Agreement Scheme with Formal Proof. 785-793 - Caimei Wang, Yan Xiong, Wenjuan Cheng, Wenchao Huang, Huihua Xia, Jianmeng Huang:

A General Formal Framework of Analyzing Selective Disclosure Attribute-Based Credential Systems. 794-803 - Caihui Lan, Haifeng Li, Shoulin Yin, Lin Teng:

A New Security Cloud Storage Data Encryption Scheme Based on Identity Proxy Re-encryption. 804-810 - Fei Tang, Yousheng Zhou:

Policy-based Signatures for Predicates. 811-822 - Qianying Zhang, Zhiping Shi:

A New Way to Prevent UKS Attacks Using Hardware Security Chips. 823-831 - Thai-Ngoc Luong, Thanh Tu Vo:

Whirlwind: A New Method to Attack Routing Protocol in Mobile Ad Hoc Network. 832-838 - Jyh-Jian Sheu:

Distinguishing Medical Web Pages from Pornographic Ones: An Efficient Pornography Websites Filtering Method. 839-850 - Yifei Yao, Fanhua Yu:

Privacy-preserving Similarity Sorting in Multi-party Model. 851-857 - Yu-Lun Wang, Jau-Ji Shen, Min-Shiang Hwang:

An Improved Dual Image-based Reversible Hiding Technique Using LSB Matching. 858-862
Volume 19, Number 6, November 2017
- Jong-Shin Chen, Cheng-Ying Yang, Min-Shiang Hwang:

The Capacity Analysis in the Secure Cooperative Communication System. 863-869 - Mourade Azrour, Yousef Farhaoui, Mohammed Ouanan:

A New Authentication and Key Exchange Protocol for Session Initiation Protocol Using Smart Card. 870-879 - Rui-Hong Dong, Dong-Fang Wu

, Qiu-Yu Zhang:
The Integrated Artificial Immune Intrusion Detection Model Based on Decision-theoretic Rough Set. 880-888 - Zakariae Tbatou, Ahmed Asimi, Younes Asimi, Yassine Sadqi, Azidine Guezzaz:

A New Mutuel Kerberos Authentication Protocol for Distributed Systems. 889-898 - Yuwei Xu, Chuankun Wu:

Further Characterization of H Vectorial Functions. 899-903 - Guifa Hou, Zhijie Wang:

A Robust and Efficient Remote Authentication Scheme from Elliptic Curve Cryptosystem. 904-911 - Arup Kumar Chattopadhyay, Amitava Nag, Koushik Majumder:

Secure Data Outsourcing on Cloud Using Secret Sharing Scheme. 912-921 - I-Chun Weng, Tzung-Her Chen:

A Novel Weighted Visual Cryptography Scheme with High Visual Quality. 922-928 - Ram Charan Baishya, Nazrul Hoque, Dhruba Kumar Bhattacharyya:

DDoS Attack Detection Using Unique Source IP Deviation. 929-939 - Libo He, Chen Yuan, Hu Xiong, Zhiguang Qin:

An Efficient and Provably Secure Certificateless Key Insulated Encryption with Applications to Mobile Internet. 940-949 - Zhengjun Cao, Lihua Liu, Olivier Markowitch:

Analysis of One Scheme for Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates. 950-954 - Safi Ibrahim, Mohamed Hamdy, Eman Shaaban:

Towards an Optimum Authentication Service Allocation and Availability in VANETs. 955-965 - Ming Luo, Yuwei Wan, Donghua Huang:

Certificateless Hybrid Signcryption Scheme with Known Session-Specific Temporary Information Security. 966-972 - Mohamed Ali Hamza, Jianfei Sun, Xuyun Nie, Zhiquan Qin, Hu Xiong:

Revocable ABE with Bounded Ciphertext in Cloud Computing. 973-983 - M. Y. Mohamed Parvees, J. Abdul Samath, B. Parameswaran Bose:

Protecting Large Size Medical Images with Logistic Map Using Dynamic Parameters and Key Image. 984-994 - Rui Guo, Huixian Shi:

Confidentiality-Preserving Personal Health Records in Tele-Healthcare System Using Authenticated Certificateless Encryption. 995-1004 - Hang Gao, Mengting Hu, Tiegang Gao, Renhong Cheng:

Double Verifiable Lossless Secret Sharing Based on Hyper-chaos Generated Random Grid. 1005-1015 - Jianjun Zhang, Huajun Huang, Lucai Wang, HaiJun Lin, Deng Gao:

Coverless Text Information Hiding Method Using the Frequent Words Hash. 1016-1023 - Kavitha R, Padmavathi G:

Advanced Random Time Queue Blocking for Effective Protection of Application Servers Against Low-Rate DoS Attacks. 1024-1035 - Zhiyong Luo, Bo You, Peng Wang, Jie Su, Yi Liang:

Analysis and Optimization of System Intrusion Tolerance Capacity Based on Markov. 1036-1043 - Yang Zhao, Pengcheng Fan, Haoting Cai, Zhiguang Qin, Hu Xiong:

Attribute-based Encryption with Non-Monotonic Access Structures Supporting Fine-Grained Attribute Revocation in M-healthcare. 1044-1052 - Jongho Moon, Donghoon Lee, Jaewook Jung, Dongho Won:

Improvement of Efficient and Secure Smart Card Based Password Authentication Scheme. 1053-1061 - Sang Ni, Mengbo Xie, Quan Qian:

Clustering Based K-anonymity Algorithm for Privacy Preservation. 1062-1071 - Fang Ren, Dong Zheng, WeiJing Wang:

An Efficient Code Based Digital Signature Algorithm. 1072-1079

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














