


default search action
International Journal of Security and Networks, Volume 13
Volume 13, Number 1, 2018
- Appala Naidu Tentu, China Venkaiah Vadlamudi, V. Kamakshi Prasad:

CRT based multi-secret sharing schemes: revisited. 1-9 - Wafa Neji, Kaouther Blibech, Narjes Ben Rajeb:

A secure electronic voting protocol with a simple ballot's encryption function. 10-26 - Lukas Malina, Petr Dzurenda, Jan Hajny:

Evaluation of anonymous digital signatures for privacy-enhancing mobile applications. 27-41 - Ning Xu, Haiping Huang, Zhengtao Li, Yunqi Wang, Chao Sha:

An ID-based authentication scheme to achieve the security of smart card. 42-50 - Bencheng Yu, Peisen Song, Xiaoyuan Xu:

An android malware static detection scheme based on cloud security structure. 51-57 - Xian Guo, Cheng Chen, Ma-Jiang Zhang, Aristide Ngaboyindekwe, Laicheng Cao:

Privacy-aware transmission scheme based on homomorphic proxy re-encryption for NDN. 58-70
Volume 13, Number 2, 2018
- Mohammadreza Ramezani-Chemazi, Maede Ashouri-Talouki:

Toward signature extraction of Metasploit encoding algorithms using static analysis. 71-83 - Yun-Xia Deng, Run-Hua Shi:

An efficient remote anonymous authentication scheme with user revocation. 84-97 - Abu Asaduzzaman, Shanta Mazumder, Sergio Salinas:

A promising security protocol for protecting near field communication devices from networking attacks. 98-107 - Nabila Zrira, Soufiana Mekouar

, El-Houssine Bouyakhf:
A novel approach for graph-based global outlier detection in social networks. 108-128 - Ronak Shah, Kailas Patil

:
A measurement study of the subresource integrity mechanism on real-world applications. 129-138
Volume 13, Number 3, 2018
- Robert Martin, Sanguthevar Rajasekaran:

Information centric approach to analysing security threats and node behaviour in underwater senor networks. 139-152 - Avinash Srinivasan, Jie Wu:

VOUCH-AP: privacy preserving open-access 802.11 public hotspot AP authentication mechanism with co-located evil-twins. 153-168 - Zhijiang Chen, Sixiao Wei, Wei Yu, James H. Nguyen, William G. Hatcher:

A cloud/edge computing streaming system for network traffic monitoring and threat detection. 169-186 - Rajorshi Biswas, Jie Wu:

Preserving source and destination location privacy with controlled routing protocol. 187-198 - Lachemi Khenous, Mourad Amad, Abdellah Boukerram:

Enhanced source location privacy mechanism for WSNs. 199-210
Volume 13, Number 4, 2018
- Nancy J. Carter, Cheng Li, Qun Li, Jennifer A. Stevens, Ed Novak, Zhengrui Qin:

Graphical passwords for older computer users. 211-227 - W. G. Ge, Li Sun:

A security scheme of digital rights management based on agent encryption and key distribution in cloud computing. 228-235 - Guanlin Chen, Zhikang Zhou, Rongxin Zheng, Tongjun Qi:

A smart urban flood control and warning system based on big data. 236-244 - Guanlin Chen, Taimeng Yang, Rui Huang, Zhuoyue Zhu:

A novel flood defense decision support system for smart urban management based on classification and regression tree. 245-251 - Huijuan J. Xu, Xin Zheng:

Security mechanism of dynamic and differentiated protection for telecommunications services based on cloud computing. 252-260 - Eric Chan-Tin, Rakesh Ravishankar:

The case for HTTPS: measuring overhead and impact of certificate authorities. 261-269

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














