default search action
International Journal of Network Security, Volume 18
Volume 18, Number 1, January 2016
- Adarsh Kumar, Krishna Gopal, Alok Aggarwal:
Design and Analysis of Lightweight Trust Mechanism for Secret Data using Lightweight Cryptographic Primitives in MANETs. 1-18 - Dhekra Essaidani, Hassene Seddik, Ezzedine Ben Braiek:
Asynchronous Invariant Digital Image Watermarking in Radon Field for Resistant Encrypted Watermark. 19-32 - Ziba Eslami, Mahnaz Noroozi, Saideh Kabiri Rad:
Provably Secure Group Key Exchange Protocol in the Presence of Dishonest Insiders. 33-42 - Zhiyong Zhang, Lijun Yang, Hanman Li, Fei Xiang:
A Quantitative and Qualitative Analysis-based Security Risk Assessment for Multimedia Social Networks. 43-51 - Zhi-Hui Wang, Xu Zhuang, Chin-Chen Chang, Chuan Qin, Yan Zhu:
Reversible Data Hiding Based on Geometric Structure of Pixel Groups. 52-59 - Shuaiting Qiao, Wenbao Han, Yifa Li, Luyao Jiao:
Construction of Extended Multivariate Public Key Cryptosystems. 60-67 - Prabir Kumar Naskar, Hari Narayan Khan, Atal Chaudhuri:
A Key Based Secure Threshold Cryptography for Secret Image. 68-81 - Gaurav Sharma, Suman Bala, Anil K. Verma:
An Improved RSA-based Certificateless Signature Scheme for Wireless Sensor Networks. 82-89 - Feng Wang, Chin-Chen Chang, Changlu Lin, Shih-Chang Chang:
Secure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues. 90-98 - Suresh Kumar Balakrishnan, V. P. Jagathy Raj:
Practical Implementation of a Secure Email System Using Certificateless Cryptography and Domain Name System. 99-107 - Chao-Liang Liu, Gwoboa Horng, Du-Shiau Tsai:
Speeding up Pairing Computation Using Non-adjacent Form and ELM Method. 108-115 - Hongfeng Zhu, Yifeng Zhang, Yan Zhang, Haiyang Li:
A Novel and Provable Authenticated Key Agreement Protocol with Privacy Protection Based on Chaotic Maps towards Mobile Network. 116-123 - Seyyed Amin Seyyedi, Vasili Sadau, Nick Ivanov:
A Secure Steganography Method Based on Integer Lifting Wavelet Transform. 124-132 - Wei-Fu Hsien, Chou Chen Yang, Min-Shiang Hwang:
A Survey of Public Auditing for Secure Data Storage in Cloud Computing. 133-142 - Harini Narasimhan, T. R. Padmanabhan:
3CAuth - A Novel Multi-Factor Authentication Scheme Using QR-Code. 143-150 - Normahirah Nek Abd Rahman, Muhammad Rezal Kamel Ariffin:
The Development of Deniable Authentication Protocol Based on The Bivariate Function Hard Problem. 151-157 - Xuyun Nie, Chuanyong Hou, Zhaohu Xu, Gang Lu:
Analysis of Second Order Matrices Construction in MFE Public Key Cryptosystem. 158-164 - Yang Ming, Yumin Wang:
Cryptanalysis of an Identity Based Signcryption Scheme in the Standard Model. 165-171 - Ruhul Amin:
Cryptanalysis and Efficient Dynamic ID Based Remote User Authentication Scheme in Multi-server Environment Using Smart Card. 172-181 - Quan Qian, Jing Cai, Mengbo Xie, Rui Zhang:
Malicious Behavior Monitoring for Android Applications. 182-192 - Guangsong Li, Qi Jiang, Yanan Shi, Fushan Wei:
Anonymous Network Information Acquirement Protocol for Mobile Users in Heterogeneous Wireless Networks. 193-200
Volume 18, Number 2, March 2016
- Chin-Chen Chang, Chin-Yu Sun, Shih-Chang Chang:
A Strong RSA-based and Certificateless-based Signature Scheme. 201-208 - Hongfeng Zhu, Yan Zhang, Haiyang Li, Lin Lin:
A Novel Biometrics-based One-Time Commitment Authenticated Key Agreement Scheme with Privacy Protection for Mobile Network. 209-216 - Dianli Guo, Fengtong Wen:
A More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC. 217-223 - Samant Saurabh, Ashok Singh Sairam:
Increasing Accuracy and Reliability of IP Traceback for DDoS Attack Using Completion Condition. 224-234 - Hisham Abdalla, Hu Xiong, Abubaker Wahaballa, Philip Avornyo, Zhiguang Qin:
Anonymous Pairing-Free and Certificateless Key Exchange Protocol for DRM System. 235-243 - Xiao Ma, Tongjiang Yan, Daode Zhang, Yanyan Liu:
Linear Complexity of Some Binary Interleaved Sequences of Period 4N. 244-249 - Azz El Arab El Hossaini, Mohamed El Aroussi, Khadija Jamali, Samir Mbarki, Mohammed Wahbi:
A New Robust Blind Copyright Protection Scheme Based on Visual Cryptography and Steerable Pyramid. 250-262 - Abhimanyu Kumar, Sachin Tripathi:
Anonymous ID-based Group Key Agreement Protocol without Pairing. 263-273 - Da-Chun Wu, Ming-Yao Chen:
Information Hiding in Standard MIDI Files Based on Velocity Reference Values. 274-282 - Jun Ye, Haiyan Zhang, Changyou Fu:
Verifiable Delegation of Polynomials. 283-290 - Erukala Suresh Babu, C. Naga Raju, Munaga H. M. Krishna Prasad:
Inspired Pseudo Biotic DNA Based Cryptographic Mechanism Against Adaptive Cryptographic Attacks. 291-303 - Zheng Yang, Daigu Zhang:
Towards Modelling Perfect Forward Secrecy for One-round Group Key Exchange. 304-315 - Miroslav Stampar:
Inferential SQL Injection Attacks. 316-325 - Hongfeng Zhu, Yifeng Zhang, Yu Xia, Haiyang Li:
Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New Architecture in Standard Model. 326-334 - Hai-Duong Le, Ngoc-Tu Nguyen, Chin-Chen Chang:
Provably Secure and Efficient Three-Factor Authenticated Key Agreement Scheme with Untraceability. 335-344 - Said Bouchkaren, Saiida Lazaar:
A New Iterative Secret Key Cryptosystem Based on Reversible and Irreversible Cellular Automata. 345-353 - Quan Qian, Yan-Long Jia, Rui Zhang:
A Lightweight RFID Security Protocol Based on Elliptic Curve Crytography. 354-361 - Prasanth Kumar Thandra, J. Rajan, S. A. V. Satya Murty:
Cryptanalysis of an Efficient Passwortd Authentication Scheme. 362-368 - Nikolay Andreevich Moldovyan, Alexander Andreevich Moldovyan, Andrey Nikolaevich Berezin:
On Using Mersenne Primes in Designing Cryptoschemes. 369-373 - Yimin Wang, Hong Zhong, Yan Xu, Jie Cui:
ECPB: Efficient Conditional Privacy-Preserving Authentication Scheme Supporting Batch Verification for VANETs. 374-382 - Kailas Patil, Braun Frederik:
A Measurement Study of the Content Security Policy on Real-World Applications. 383-392 - Fushan Wei, Yun Wei, Chuangui Ma:
Attack on An ID-based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants. 393-396 - Chung-Huei Ling, Wei-Fu Hsien, Min-Shiang Hwang:
A Double Circular Chain Intrusion Detection for Cloud Computing Based on AdjointVM Approach. 397-400
Volume 18, Number 3, May 2016
- Hongfeng Zhu, Yan Zhang, Xiaodan Wang:
A Novel One-Time Identity-Password Authenticated Scheme Based on Biometrics for E-coupon System. 401-409 - Fan Li, Qian Mao, Chin-Chen Chang:
A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method. 410-419 - Mehdi Hosseinzadeh Aghdam, Peyman Kabiri:
Feature Selection for Intrusion Detection System Using Ant Colony Optimization. 420-432 - Suchart Khummanee, Kitt Tientanopajai:
The Policy Mapping Algorithm for High-speed Firewall Policy Verifying. 433-444 - Younes Asimi, Abdallah Amghar, Ahmed Asimi, Yassine Sadqi:
New Random Generator of a Safe Cryptographic Salt Per Session. 445-453 - Feng Wang, Chin-Chen Chang, Changlu Lin:
Security Analysis on Secure Untraceable Off-line Electronic Cash System. 454-458 - Anthéa Mayzaud, Remi Badonnel, Isabelle Chrisment:
A Taxonomy of Attacks in RPL-based Internet of Things. 459-473 - Arindom Ain, Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita:
Rank Correlation for Low-Rate DDoS Attack Detection: An Empirical Evaluation. 474-480 - Yilei Wang, Wenyi Bao, Yang Zhao, Hu Xiong, Zhiguang Qin:
An ElGamal Encryption with Fuzzy Keyword Search on Cloud Environment. 481-486 - Chenhuang Wu, Xiaoni Du, Zhengtao Jiang:
Linear Complexity of a Family of Pseudorandom Discrete Logarithm Threshold Sequences. 487-492 - Fangwei Wang, Fang Yang, Changguang Wang, Dongmei Zhao, Yunkai Zhang:
Stability Analysis of a Worm Propagation Model with Quarantine and Vaccination. 493-500 - Deris Stiawan, Mohd Yazid Idris, Abdul Hanan Abdullah, Mohammed AlQurashi, Rahmat Budiarto:
Penetration Testing and Mitigation of Vulnerabilities Windows Server. 501-513 - Alka Chaudhary, V. N. Tiwari, Anil Kumar:
A Novel Intrusion Detection System Based on Soft Computing Techniques Using Neuro- Fuzzy Classifier for Packet Dropping Attack in MANETs. 514-522 - Ali Kartit, Hamza Kamal Idrissi, Mohamed Belkhouraf:
Improved Methods and Principles for Designing and Analyzing Security Protocols. 523-528 - Mohamad Badra, Sherali Zeadally:
An Improved Privacy Solution for the Smart Grid. 529-537 - Zhengjun Cao, Lihua Liu, Zhenzhen Yan:
An Improved Lindell-Waisbard Private Web Search Scheme. 538-543 - Xing Zhang, Rongxing Lu, Hong Zhang, Chungen Xu:
A New Digital Signature Scheme from Layered Cellular Automata. 544-552 - Tanmoy Maitra, Ruhul Amin, Debasis Giri, P. D. Srivastava:
An Efficient and Robust User Authentication Scheme for Hierarchical Wireless Sensor Networks without Tamper-Proof Smart Card. 553-564 - Chien-Cheng Huang, Kwo-Jean Farn:
A Study on E-Taiwan Promotion Information Security Governance Programs with E-government Implementation of Information Security Management Standardization. 565-578 - Govand Kadir, Torben Kuseler, Ihsan Alshahib Lami:
SMPR: A Smartphone Based MANET Using Prime Numbers to Enhance the Network-nodes Reachability and Security of Routing Protocols. 579-589 - Chung-Huei Ling, Shih-Ming Chen, Min-Shiang Hwang:
Cryptanalysis of Tseng-Wu Group Key Exchange Protocol. 590-593 - Chin-Yu Sun, Ching-Chun Chang:
Cryptanalysis of a Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems. 594-596 - Fuh-Gwo Jeng, Shu-Yuan Lin, Bing-Jian Wang, Chih-Hung Wang, Tzung-Her Chen:
On the Security of Privacy-preserving Keyword Searching for Cloud Storage Services. 597-600
Volume 18, Number 4, July 2016
- Ahmed Asimi, Younes Asimi, Abdellah Amghar, Yassine Sadqi:
Strong Zero-knowledge Authentication Based on Virtual Passwords. 601-616 - Yanjun Liu, Chin-Chen Chang:
An Integratable Verifiable Secret Sharing Mechanism. 617-624 - Solomon Sarpong, Chunxiang Xu, Xiaojun Zhang:
PPAM: Privacy-preserving Attributes Matchmaking Protocol for Mobile Social Networks Secure against Malicious Users. 625-632 - Biswapati Jana, Debasis Giri, Shyamal Kumar Mondal:
Dual-Image Based Reversible Data Hiding Scheme Using Pixel Value Difference Expansion. 633-643 - Kai-Hao Chen, Xiaoming Tang, Peng Xu, Man Guo, Weidong Qiu, Zheng Gong:
An Improved Automatic Search Method for Differential Trails in TEA Cipher. 644-649 - Chi-Wei Liu, Wei-Fu Hsien, Chou Chen Yang, Min-Shiang Hwang:
A Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing. 650-666 - Christopher W. Badenhop, Benjamin W. P. Ramsey, Barry E. Mullins:
An Analytical Black Hole Attack Model Using a Stochastic Topology Approximation Technique for Reactive Ad-Hoc Routing Protocols. 667-677 - Annamalai Prakash, R. Dhanalakshmi:
Stride Towards Proposing Multi-Modal Biometric Authentication for Online Exam. 678-687 - Hongfeng Zhu, Yifeng Zhang, Yan Zhang:
A Provably Password Authenticated Key Exchange Scheme Based on Chaotic Maps in Different Realm. 688-698 - Dinesh Singh, Dhiren Patel, Bhavesh Borisaniya, Chirag Modi:
Collaborative IDS Framework for Cloud. 699-709 - Lein Harn, Feng Wang:
Threshold Signature Scheme without Using Polynomial Interpolation. 710-717 - Shun Zhang, Tiegang Gao, Liang Yang:
A Reversible Data Hiding Scheme Based on Histogram Modification in Integer DWT Domain for BTC Compressed Images. 718-727 - Fuh-Gwo Jeng, Jyun-Ci Huang, Tzung-Her Chen:
An Improved Anonymous Buyer-Reseller Watermarking Protocol. 728-735 - Bhawani Shanker Bhati, Pallapa Venkataram:
Performance Analysis of Location Privacy Preserving Scheme for MANETs. 736-749 - K. Bharanitharan, Chin-Chen Chang, Yang Hai Rui, Zhi-Hui Wang:
Efficient Pixel Prediction Algorithm for Reversible Data Hiding. 750-757 - Krishna Bhowal, Debasree Sarkar, Sushanta Biswas, Partha Pratim Sarkar:
Secured Genetic Algorithm Based Image Hiding Technique with Boolean Functions. 758-768 - Mohammed Ramadan, Fagen Li, Chunxiang Xu, Abdeldime Mohamed, Hisham Abdalla, Ahmed Abdalla Ali:
User-to-User Mutual Authentication and Key Agreement Scheme for LTE Cellular System. 769-781 - Jianghong Wei, Wenfen Liu, Xuexian Hu:
Secure and Efficient Smart Card Based Remote User Password Authentication Scheme. 782-792 - Chih-Cheng Chen, Hanmin Chien, Gwoboa Horng:
Cryptanalysis of a Compact Certificateless Aggregate Signature Scheme. 793-797 - Martin Stanek:
Weaknesses of Password Authentication Scheme Based on Geometric Hashing. 798-801
Volume 18, Number 5, September 2016
- Hongfeng Zhu, Yifeng Zhang, Yang Sun:
Provably Secure Multi-server Privacy-Protection System Based on Chebyshev Chaotic Maps without Using Symmetric Cryptography. 803-815 - Qing-Qing Xie, Shunrong Jiang, Liangmin Wang, Chin-Chen Chang:
Composable Secure Roaming Authentication Protocol for Cloud-assisted Body Sensor Networks. 816-831 - Yosra Ben Saied, Alexis Olivereau:
A Lightweight Threat Detection System for Industrial Wireless Sensor Networks. 842-854 - Amar Buchade, Rajesh Ingle:
Key Trees Combining Algorithm for Overlapping Resource Access Members. 855-860 - Anirban Goswami, Nabin Ghoshal:
Imperceptible Image Authentication Using Wavelets. 861-873 - Dileep Kumar Pattipati, Appala Naidu Tentu, V. Ch. Venkaiah, Allam Appa Rao:
Sequential Secret Sharing Scheme Based on Level Ordered Access Structure. 874-881 - Hui Xiao, Hongbin Wang, Meitong Lin:
The Research on File Encryption Method Based on File Content Partitioning Restructuring. 882-887 - Osman Wahballa, Abubaker Wahaballa, Fagen Li, Chunxiang Xu:
A Secure and Robust Certificateless Public Key Steganography Based on SVD-DDWT. 888-899 - Chi-Wei Liu, Wei-Fu Hsien, Chou Chen Yang, Min-Shiang Hwang:
A Survey of Attribute-based Access Control with User Revocation in Cloud Data Storage. 900-916 - Zhenhua Chen, Shundong Li, Qiong Huang, Jianhua Yan, Yong Ding:
A Joint Random Secret Sharing Scheme with Public Verifiability. 917-925 - Parimalla Subhash, S. Ramachandram:
Trust Based HWMP Protocol in High-Performance Wireless Mesh Networks. 926-937 - Mohammed Hassouna, Eihab Bashier, Bazara I. A. Barry:
A Strongly Secure Certificateless Digital Signature Scheme in the Random Oracle Model. 938-945 - Depeng Li, Srinivas Sampalli:
Group Rekeying Scheme for Dynamic Peer Group Security in Collaborative Networks. 946-959 - Rang Zhou, Chunxiang Xu, Wanpeng Li, Jining Zhao:
An ID-based Hierarchical Access Control Scheme with Constant Size Public Parameter. 960-968 - Murari Mandal, Gaurav Sharma, Anil K. Verma:
A Computational Review of Identity-based Signcryption Schemes. 969-977 - Amar Buchade, Rajesh Ingle:
Analysis of Algorithms for Overlapping Resource Access Members in Cloud Computing. 978-986 - Shaoquan Jiang, Zailiang Tang, Mingsheng Wang:
On the CLD Attack to a Statistical Model of a Key Stream Generator. 987-992 - Yan Xu, Liusheng Huang, Miaomiao Tian, Hong Zhong:
Insecurity of a Certificate-free Ad Hoc Anonymous Authentication. 993-996 - Yanjun Liu, Chin-Chen Chang, Chin-Yu Sun:
Notes on "An Anonymous Multi-server Authenticated Key Agreement Scheme Based on Trust Computing Using Smart Card and Biometrics". 997-1000
Volume 18, Number 6, November 2016
- Hongfeng Zhu:
Secure Chaotic Maps-based Group Key Agreement Scheme with Privacy Preserving. 1001-1009 - Chin-Chen Chang, Wei-Yuan Hsueh, Ting-Fang Cheng:
An Advanced Anonymous and Biometrics-based Multi-server Authentication Scheme Using Smart Cards. 1010-1021 - Ming-Ru Xie, Chia-Chun Wu, Jau-Ji Shen, Min-Shiang Hwang:
A Survey of Data Distortion Watermarking Relational Databases. 1022-1033 - Nurhashikin Mohd Salleh, Siti Rahayu Selamat, Robiah Yusof, Shahrin Sahib:
Discovering Cyber Terrorism Using Trace Pattern. 1034-1040 - Hiten Choudhury, Basav Roychoudhury, Dilip Kr. Saikia:
Security Extension for Relaxed Trust Requirement in Non3GPP Access to the EPS. 1041-1053 - Zhengjun Cao, Lihua Liu, Olivier Markowitch:
On Two Kinds of Flaws in Some Server-Aided Verification Schemes. 1054-1059 - Trung Ngo Thanh, Tae-Young Choe:
A Stubborn Security Model Based on Three-factor Authentication and Modified Public Key. 1060-1070 - Xiuxia Tian, Lisha Li, Jinguo Li, Hongjiao Li, Chunhua Gu:
Secret Share Based Program Access Authorization Protocol for Smart Metering. 1071-1079 - Ashraf Aboshosha, Kamal A. ElDahshan, Eman K. Elsayed, Ahmed A. Elngar:
Secure Authentication Protocol Based on Machine-metrics and RC4-EA Hashing. 1080-1088 - Maged Hamada Ibrahim:
Octopus: An Edge-fog Mutual Authentication Scheme. 1089-1101 - Jiaohua Qin, Ruxin Sun, Xuyu Xiang, Hao Li, Huajun Huang:
Anti-fake Digital Watermarking Algorithm Based on QR Codes and DWT. 1102-1108 - Zheng Yang, Chao Liu, Wanping Liu, Song Luo, Hua Long, Shuangqing Li:
A Lightweight Generic Compiler for Authenticated Key Exchange from Non-interactive Key Exchange with Auxiliary Input. 1109-1121 - Junlan Bai, Chin-Chen Chang:
A High Payload Steganographic Scheme for Compressed Images with Hamming Code. 1122-1129 - Warakorn Srichavengsup, Wimol San-Um:
Data Encryption Scheme Based on Rules of Cellular Automata and Chaotic Map Function for Information Security. 1130-1142 - Ya Gao, Peng Zeng, Kim-Kwang Raymond Choo, Fu Song:
An Improved Online/Offline Identity-Based Signature Scheme for WSNs. 1143-1151 - Lamri Laouamer, Omar Tayan:
An Efficient and Robust Hybrid Watermarking Scheme for Text-Images. 1152-1158 - Qais Qassim, Abdullah Mohd Zin, Mohd Juzaiddin Ab Aziz:
Anomalies Classification Approach for Network-based Intrusion Detection System. 1159-1172 - Peng-yu Cui:
An Improved Ownership Transfer and Mutual Authentication for Lightweight RFID Protocols. 1173-1179 - Ouissem Ben Fredj:
An Automatic Alert Unification Method for Heterogeneous Alert Signatures. 1180-1191 - Qiao Peng, Youliang Tian:
A Publicly Verifiable Secret Sharing Scheme Based on Multilinear Diffie-Hellman Assumption. 1192-1200
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.