![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
International Journal of Security and Networks, Volume 13
Volume 13, Number 1, 2018
- Appala Naidu Tentu, China Venkaiah Vadlamudi, V. Kamakshi Prasad:
CRT based multi-secret sharing schemes: revisited. 1-9 - Wafa Neji, Kaouther Blibech, Narjes Ben Rajeb:
A secure electronic voting protocol with a simple ballot's encryption function. 10-26 - Lukas Malina, Petr Dzurenda, Jan Hajny:
Evaluation of anonymous digital signatures for privacy-enhancing mobile applications. 27-41 - Ning Xu, Haiping Huang, Zhengtao Li, Yunqi Wang, Chao Sha:
An ID-based authentication scheme to achieve the security of smart card. 42-50 - Bencheng Yu, Peisen Song, Xiaoyuan Xu:
An android malware static detection scheme based on cloud security structure. 51-57 - Xian Guo, Cheng Chen, Ma-Jiang Zhang, Aristide Ngaboyindekwe, Laicheng Cao:
Privacy-aware transmission scheme based on homomorphic proxy re-encryption for NDN. 58-70
Volume 13, Number 2, 2018
- Mohammadreza Ramezani-Chemazi, Maede Ashouri-Talouki:
Toward signature extraction of Metasploit encoding algorithms using static analysis. 71-83 - Yun-Xia Deng, Run-Hua Shi:
An efficient remote anonymous authentication scheme with user revocation. 84-97 - Abu Asaduzzaman, Shanta Mazumder, Sergio Salinas:
A promising security protocol for protecting near field communication devices from networking attacks. 98-107 - Nabila Zrira, Soufiana Mekouar
, El-Houssine Bouyakhf:
A novel approach for graph-based global outlier detection in social networks. 108-128 - Ronak Shah, Kailas Patil
:
A measurement study of the subresource integrity mechanism on real-world applications. 129-138
Volume 13, Number 3, 2018
- Robert Martin, Sanguthevar Rajasekaran:
Information centric approach to analysing security threats and node behaviour in underwater senor networks. 139-152 - Avinash Srinivasan, Jie Wu:
VOUCH-AP: privacy preserving open-access 802.11 public hotspot AP authentication mechanism with co-located evil-twins. 153-168 - Zhijiang Chen, Sixiao Wei, Wei Yu, James H. Nguyen, William G. Hatcher:
A cloud/edge computing streaming system for network traffic monitoring and threat detection. 169-186 - Rajorshi Biswas, Jie Wu:
Preserving source and destination location privacy with controlled routing protocol. 187-198 - Lachemi Khenous, Mourad Amad, Abdellah Boukerram:
Enhanced source location privacy mechanism for WSNs. 199-210
Volume 13, Number 4, 2018
- Nancy J. Carter, Cheng Li, Qun Li, Jennifer A. Stevens, Ed Novak, Zhengrui Qin:
Graphical passwords for older computer users. 211-227 - W. G. Ge, Li Sun:
A security scheme of digital rights management based on agent encryption and key distribution in cloud computing. 228-235 - Guanlin Chen, Zhikang Zhou, Rongxin Zheng, Tongjun Qi:
A smart urban flood control and warning system based on big data. 236-244 - Guanlin Chen, Taimeng Yang, Rui Huang, Zhuoyue Zhu:
A novel flood defense decision support system for smart urban management based on classification and regression tree. 245-251 - Huijuan J. Xu, Xin Zheng:
Security mechanism of dynamic and differentiated protection for telecommunications services based on cloud computing. 252-260 - Eric Chan-Tin, Rakesh Ravishankar:
The case for HTTPS: measuring overhead and impact of certificate authorities. 261-269
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.