default search action
International Journal of Network Security, Volume 16
Volume 16, Number 1, January 2014
- Pei-Shan Chung, Chi-Wei Liu, Min-Shiang Hwang:
A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments. 1-13 - Karthikeyan Balasubramanian, S. Ramakrishnan, V. Vaithiyanathan, S. Sruti, M. Gomathymeenakshi:
An Improved Steganographic Technique Using LSB Replacement on a Scanned Path Image. 14-18 - Yang Cui, Kirill Morozov, Kazukuni Kobara, Hideki Imai:
Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE. 19-28 - Jayaprakash Kar:
Provably Secure Online/Off-line Identity-Based Signature Scheme for Wireless Sensor Network. 29-39 - Jian-Guo Sun, Guo-Yin Zhang, Ai-Hong Yao, Jun-Peng Wu:
A Reversible Digital Watermarking Algorithm for Vector Maps. 40-45 - Soniya Balram, M. Wilscy:
User Traffic Profile for Traffic Reduction and Effective Bot C&C Detection. 46-52 - Navaneet Ojha, Sahadeo Padhye:
Cryptanalysis of Multi Prime RSA with Secret Key Greater than Public Key. 53-57 - Yanjun Liu, Chin-Chen Chang, Shih-Chang Chang:
An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem. 58-64 - Annamalai Prakash, Rajeswari Mukesh:
A Biometric Approach for Continuous User Authentication by Fusing Hard and Soft Traits. 65-70 - Yunqi Dou, Jiang Weng, Chuangui Ma:
Improved Fault Attack Against Eta Pairing. 71-77 - Debiao He, Muhammad Khurram Khan, Shuhua Wu:
On the Security of a RSA-based Certificateless Signature Scheme. 78-80
Volume 16, Number 2, March 2014
- Tarek M. I. El-Sakka, Mohammed Zaki:
Using Predicate-based Model Checker for Verifying E-Commerce Protocols. 90-101 - Poonam Gera, Kumkum Garg, Manoj Misra:
Trust-based Multi-Path Routing for Enhancing Data Security in MANETs. 102-111 - Abderrahmane Nitaj:
Cryptanalysis of NTRU with two Public Keys. 112-117 - Mohammad Esmaeildoust, Keivan Navi, Shirin Rezaei, Marzieh Gerami:
On the Design of RNS Bases for Modular Multiplication. 118-128 - Yuan Wang, Duncan S. Wong, Liusheng Huang:
One-Pass Key Establishment Protocol for Wireless Roaming with User Anonymity. 129-142 - Mohammad Sabzinejad Farash, Mahmoud Ahmadian-Attari:
A Pairing-free ID-based Key Agreement Protocol with Different PKGs. 143-148 - Benamar Kadri, Mohammed Feham, Abdellah Mhammed:
Efficient and Secured Ant Routing Algorithm for Wireless Sensor Networks. 149-156 - Min Zhou, Mingwu Zhang, Chunzhi Wang, Bo Yang:
CCLAS: A Practical and Compact Certificateless Aggregate Signature with Share Extraction. 157-164
Volume 16, Number 3, May 2014
- Rakesh Matam, Somanath Tripathy:
Provably Secure Routing Protocol for Wireless Mesh Networks. 168-178 - Satyajit Das, Jaydeb Bhaumik:
A Fault Based Attack on MDS-AES. 179-184 - Yunqi Dou, Jiang Weng, Yun Wei, Chuangui Ma:
Fault Attack Against Miller's Algorithm for Even Embedding Degree. 185-193 - Y. V. Subba Rao, Chakravarthy Bhagvati:
CRT based Threshold Multi Secret Sharing scheme. 194-200 - Chin-Chen Chang, Thai Son Nguyen, Chia-Chen Lin:
Reversible Image Hiding for High Image Quality Based on Histogram Shifting and Local Complexity. 201-213 - Mohamed Amin, Hatem M. Abdullkader, Hani M. Ibrahem, Ahmed S. Sakr:
A Steganographic Method Based on DCT and New Quantization Technique. 214-219 - Xi Chen, Yun Liu, Chin-Chen Chang, Cheng Guo:
Generalized Secret Sharing with Linear Hierarchical Secrets. 220-228 - Boqing Zhou, Sujun Li, Jianxin Wang, Siqing Yang, Jingguo Dai:
A Pairwise Key Establishment Scheme for Multiple Deployment Sensor Networks. 229-236
Volume 16, Number 4, July 2014
- Chien-Cheng Huang, Kwo-Jean Farn, Frank Yeong-Sung Lin:
A Study on Implementations of Information Security Risk Assessment: Application to Chlorine Processing System of Water Treatment. 241-248 - Y. V. Subba Rao, Chakravarthy Bhagvati:
CRT Based Threshold Multi Secret Sharing Scheme. 249-255 - Yanli Ren, Zhihua Niu, Xinpeng Zhang:
Fully Anonymous Identity-based Broadcast Encryption without Random Oracles. 256-264 - Mohamed Amin, Hatem M. Abdullkader, Hani M. Ibrahem, Ahmed S. Sakr:
A Steganographic Method Based on DCT, New Quantization Technique. 265-270 - Xu Zhuang, Chin-Chen Chang, Zhi-Hui Wang, Yan Zhu:
A Simple Password Authentication Scheme Based on Geometric Hashing Function. 271-277 - Zhiguang Qin, Hu Xiong, Fagen Li:
A Provably Secure Certificate Based Ring Signature Without Pairing. 278-285 - Keying Li, Hua Ma:
Outsourcing Decryption of Multi-Authority ABE Ciphertexts. 286-294 - Qian Mao, Chin-Chen Chang, Ting-Feng Chung:
A Reversible Steganography Suitable for Embedding Small Amounts of Data. 295-303 - Boris Mihajlov, Mitko Bogdanoski:
Analysis of the WSN MAC Protocols under Jamming DoS Attack. 304-312 - Chi-Shiang Chan, Yi-Hui Chen, Yuan-Yu Tsai:
An Improvement of Square Matrix Encoding by Adjusting Digits in a Matrix. 313-317 - Tung-Huang Feng, Chung-Huei Ling, Min-Shiang Hwang:
Cryptanalysis of Tan's Improvement on a Password Authentication Scheme for Multi-server Environments. 318-321
Volume 16, Number 5, September 2014
- Wei Teng Li, Tung-Huang Feng, Min-Shiang Hwang:
Distributed Detecting Node Replication Attacks in Wireless Sensor Networks: A Survey. 323-330 - Shengke Zeng, Hu Xiong:
Privacy-enhanced Designated Confirmer Signature without Random Oracles. 331-339 - Safwan Mahmud Khan, Kevin W. Hamlen:
Penny: Secure, Decentralized Data Management. 340-354 - Jianhong Zhang, Min Xu, Liying Liu:
On the Security of a Secure Batch Verification with Group Testing for VANET. 355-362 - Yuan-Yu Tsai, Jian-Ting Chen, Chi-Shiang Chan:
Exploring LSB Substitution and Pixel-value Differencing for Block-based Adaptive Data Hiding. 363-368 - Walid I. Khedr:
On the Security of Moessner's and Khan's Authentication Scheme for Passive EPCglobal C1G2 RFID Tags. 369-375 - Maha S. Abdelhaq, Raed A. Alsaqour, Mohammed Al-Hubaishi, Tariq Alahdal, Mueen Uddin:
The Impact of Resource Consumption Attack on Mobile Ad-hoc Network Routing. 376-381 - Jie Wang, Yanshuo Yu, Kuanjiu Zhou:
A Regular Expression Matching Approach to Distributed Wireless Network Security System. 382-388 - Chi-Hsien Lin, K. Bharanitharan, Chin-Chen Chang:
Comments and Proofs to Published Paper - A Novel Reversible Robust Watermarking Algorithm Based on a Chaotic System. 389-392 - Debiao He, Yuanyuan Zhang, Jianhua Chen:
Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol. 393-396 - Zhenhua Chen, Shundong Li, Chunzhi Wang, Mingwu Zhang:
Comments on FHH Anonymous Multireceiver Encryption. 397-400
Volume 16, Number 6, November 2014
- Wei Teng Li, Chung-Huei Ling, Min-Shiang Hwang:
Group Rekeying in Wireless Sensor Networks: A Survey. 400-410 - Xi Chen, Yun Liu, Chin-Chen Chang, Cheng Guo:
Generalized Secret Sharing with Linear Hierarchical Secrets. 411-419 - Lein Harn, Fuyou Miao:
Weighted Secret Sharing Based on the Chinese Remainder Theorem. 420-425 - Yesem Kurt-Peker:
A New Key Agreement Scheme Based on the Triple Decomposition Problem. 426-436 - Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Guangjun Liu:
Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data. 437-443 - Yongtao Wang:
Lattice Ciphertext Policy Attribute-based Encryption in the Standard Model. 444-451 - Mamta Juneja, Parvinder Singh Sandhu:
Improved LSB based Steganography Techniques for Color Images in Spatial Domain. 452-462 - Hui-Feng Huang, Hong-Wei Chang, Po-Kai Yu:
Enhancement of Timestamp-based User Authentication Scheme with Smart Card. 463-467 - CaLynna Sorrells, Lijun Qian:
Quickest Detection of Denial-of-Service Attacks in Cognitive Wireless Networks. 468-476 - Ying-Dar Lin, Yi-Ta Chiang, Yu-Sung Wu, Yuan-Cheng Lai:
Automatic Analysis and Classification of Obfuscated Bot Binaries. 477-486 - Zhi-Hui Wang, Haibo Jin, Xuebo Wang, Chin-Chen Chang:
An Adaptable (n, n) Secret Image Sharing Mechanism Based on Boolean Operation. 487-493 - Qingfeng Cheng:
Cryptanalysis of a New Efficient Authenticated Multiple-Key Exchange Protocol from Bilinear Pairings. 494-497 - Miaomiao Tian, Youwen Zhu, Zhili Chen:
Two Simple Attacks on a Blind Signature Scheme. 498-500
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.