


default search action
International Journal of Security and Networks, Volume 14
Volume 14, Number 1, 2019
- Suresh Prasad Kannojia, Jasvant Kumar

:
XOR-based unexpanded meaningful visual secret sharing scheme. 1-9 - Kiki Rizki, Argyro Lamproudi, Marco Tiloca, Shahid Raza

:
Group-IKEv2 for multicast IPsec in the internet of things. 10-22 - Ling Song, Liqin Zhao, Jin Ye:

A DV-Hop positioning algorithm based on the glowworm swarm optimisation of mixed chaotic strategy. 23-33 - Yani Cui, Jia Ren, Delong Fu, Chao Dong:

A formation generation algorithm of multiple agents in naval battlefield environments. 34-46 - B. Thanudas, Sreelal Shridharan

, Velankanni Cyril Raj, Anugolu Purnesh Sairam, Vinay Gajmoti, Palash Joshi:
A novel architecture for an integrated enterprise network security system. 47-60
Volume 14, Number 2, 2019
- Tayeb Diab, Marc Gilg

, Pascal Lorenz
:
A secure communication model using lightweight Diffie-Hellman method in vehicular ad hoc networks. 61-77 - Mikhail Styugin:

Dynamic key password authentication. 78-85 - Chao Wang:

A dynamic evolution model of balanced energy consumption scale-free fault-tolerant topology based on fitness function for wireless sensor networks. 86-94 - Along Yu, Jiajia Ji, Shiyu Sun:

An improved multi-objective genetic algorithm and data fusion in structural damage identification. 95-102 - Victor G. T. da Costa, Sylvio Barbon Junior

, Rodrigo Sanches Miani, Joel J. P. C. Rodrigues, Bruno Bogaz Zarpelão:
Mobile botnets detection based on machine learning over system calls. 103-118
Volume 14, Number 3, 2019
- Praveen Kumar Premkamal, Syam Kumar Pasupuleti, P. J. A. Alphonse:

Efficient revocable CP-ABE for big data access control in cloud computing. 119-132 - Imad El Ghoubach, Rachid Ben Abbou, Fatiha Mrabti:

Efficient and secure data sharing with outsourced decryption and efficient revocation for cloud storage systems. 133-145 - Thiago S. Rocha, Eduardo Souto, Khalil El-Khatib:

Techniques to detect data leakage in mobile applications. 146-157 - Naveen Bindra, Manu Sood:

Why, what and how to measure and improve the security of networks (a snapshot of the current situation of security metrics and the way forward). 158-166 - Anil Yadav, Nitin Rakesh, Sujata Pandey, Rajat Kumar Singh:

Optimising the DTLS handshake design for TEE enabled sensor nodes. 167-179
Volume 14, Number 4, 2019
- Guillaume Brogi, Elena Di Bernardino:

Hidden Markov models for advanced persistent threats. 181-190 - Ben Smyth, Yoshikazu Hanatani:

Non-malleable encryption with proofs of plaintext knowledge and applications to voting. 191-204 - Malek Rekik, Amel Meddeb-Makhlouf, Faouzi Zarai, Petros Nicopolitidis:

OAP-WMN: optimised and secure authentication protocol for wireless mesh networks. 205-220 - Imen Bouabidi, Pr. Mahmoud Abdellaoui:

A novel cryptographic solution to secure mobile wireless sensors networks. 221-237 - L. Mancy, S. Maria Celestin Vigila

:
Medical image protection using diffusion, substitution and reversible data hiding based on prediction. 238-249

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














