Quick Search:

Volume: 14, No: 6 (November 1, 2012)

International Journal of Network Security

1. The Study of Data Hiding in Medical Images
Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang, Vol. 14, No. 6, 2012, pp. 301-309
Article Full Text PDF

2. A New Hierarchical Identity-based Signature Scheme From Lattices In The Standard Model
Miaomiao Tian, Liusheng Huang, and Wei Yang, Vol. 14, No. 6, 2012, pp. 310-315
Article Full Text PDF

3. A Stamped Blind Signature Scheme based on Elliptic Curve Discrete Logarithm Problem
Kalyan Chakraborty and Jay Mehta, Vol. 14, No. 6, 2012, pp. 316-319
Article Full Text PDF

4. Breaking A Proxy Signature Scheme From Lattices
Miaomiao Tian and Liusheng Huang, Vol. 14, No. 6, 2012, pp. 320-323
Article Full Text PDF

5. Harvesting SSL Certificate Data to Identify Web-Fraud
Mishari Almishari, Emiliano De Cristofaro, Karim El Defrawy, and Gene Tsudik, Vol. 14, No. 6, 2012, pp. 324-338
Article Full Text PDF

6. AOCD: An Adaptive Outlier Based Coordinated Scan Detection Approach
Monowar H. Bhuyan, Dhruba Kr. Bhattacharyya, and Jugal K. Kalita, Vol. 14, No. 6, 2012, pp. 339-351
Article Full Text PDF

7. Adaptive Anomaly-Based Intrusion Detection System Using Fuzzy Controller
Farzaneh Geramiraz, Amir Saman Memaripour, and Maghsoud Abbaspour, Vol. 14, No. 6, 2012, pp. 352-361
Article Full Text PDF

8. Security of a Biometric Identity-based Encryption Scheme
Miaomiao Tian, Wei Yang, and Liusheng Huang, Vol. 14, No. 6, 2012, pp. 362-365
Article Full Text PDF

9. Reviewer index to volume 14 (2012)
Article Full Text PDF