default search action
International Journal of Security and Networks, Volume 14
Volume 14, Number 1, 2019
- Suresh Prasad Kannojia, Jasvant Kumar:
XOR-based unexpanded meaningful visual secret sharing scheme. 1-9 - Kiki Rizki, Argyro Lamproudi, Marco Tiloca, Shahid Raza:
Group-IKEv2 for multicast IPsec in the internet of things. 10-22 - Ling Song, Liqin Zhao, Jin Ye:
A DV-Hop positioning algorithm based on the glowworm swarm optimisation of mixed chaotic strategy. 23-33 - Yani Cui, Jia Ren, Delong Fu, Chao Dong:
A formation generation algorithm of multiple agents in naval battlefield environments. 34-46 - B. Thanudas, Sreelal Shridharan, Velankanni Cyril Raj, Anugolu Purnesh Sairam, Vinay Gajmoti, Palash Joshi:
A novel architecture for an integrated enterprise network security system. 47-60
Volume 14, Number 2, 2019
- Tayeb Diab, Marc Gilg, Pascal Lorenz:
A secure communication model using lightweight Diffie-Hellman method in vehicular ad hoc networks. 61-77 - Mikhail Styugin:
Dynamic key password authentication. 78-85 - Chao Wang:
A dynamic evolution model of balanced energy consumption scale-free fault-tolerant topology based on fitness function for wireless sensor networks. 86-94 - Along Yu, Jiajia Ji, Shiyu Sun:
An improved multi-objective genetic algorithm and data fusion in structural damage identification. 95-102 - Victor G. T. da Costa, Sylvio Barbon Junior, Rodrigo Sanches Miani, Joel J. P. C. Rodrigues, Bruno Bogaz Zarpelão:
Mobile botnets detection based on machine learning over system calls. 103-118
Volume 14, Number 3, 2019
- Praveen Kumar Premkamal, Syam Kumar Pasupuleti, P. J. A. Alphonse:
Efficient revocable CP-ABE for big data access control in cloud computing. 119-132 - Imad El Ghoubach, Rachid Ben Abbou, Fatiha Mrabti:
Efficient and secure data sharing with outsourced decryption and efficient revocation for cloud storage systems. 133-145 - Thiago S. Rocha, Eduardo Souto, Khalil El-Khatib:
Techniques to detect data leakage in mobile applications. 146-157 - Naveen Bindra, Manu Sood:
Why, what and how to measure and improve the security of networks (a snapshot of the current situation of security metrics and the way forward). 158-166 - Anil Yadav, Nitin Rakesh, Sujata Pandey, Rajat Kumar Singh:
Optimising the DTLS handshake design for TEE enabled sensor nodes. 167-179
Volume 14, Number 4, 2019
- Guillaume Brogi, Elena Di Bernardino:
Hidden Markov models for advanced persistent threats. 181-190 - Ben Smyth, Yoshikazu Hanatani:
Non-malleable encryption with proofs of plaintext knowledge and applications to voting. 191-204 - Malek Rekik, Amel Meddeb-Makhlouf, Faouzi Zarai, Petros Nicopolitidis:
OAP-WMN: optimised and secure authentication protocol for wireless mesh networks. 205-220 - Imen Bouabidi, Pr. Mahmoud Abdellaoui:
A novel cryptographic solution to secure mobile wireless sensors networks. 221-237 - L. Mancy, S. Maria Celestin Vigila:
Medical image protection using diffusion, substitution and reversible data hiding based on prediction. 238-249
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.