| International Journal of Network Security | ||
| 1. | The Study of Data Hiding in Medical Images
|
|
| Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang, Vol. 14, No. 6, 2012, pp. 301-309 Article Full Text PDF |
||
| 2. | A New Hierarchical Identity-based Signature Scheme From Lattices In The Standard Model
|
|
| Miaomiao Tian, Liusheng Huang, and Wei Yang, Vol. 14, No. 6, 2012, pp. 310-315 Article Full Text PDF |
||
| 3. | A Stamped Blind Signature Scheme based on Elliptic Curve Discrete Logarithm Problem
|
|
| Kalyan Chakraborty and Jay Mehta, Vol. 14, No. 6, 2012, pp. 316-319 Article Full Text PDF |
||
| 4. | Breaking A Proxy Signature Scheme From Lattices
|
|
| Miaomiao Tian and Liusheng Huang, Vol. 14, No. 6, 2012, pp. 320-323 Article Full Text PDF |
||
| 5. | Harvesting SSL Certificate Data to Identify Web-Fraud
|
|
| Mishari Almishari, Emiliano De Cristofaro, Karim El Defrawy, and Gene Tsudik, Vol. 14, No. 6, 2012, pp. 324-338 Article Full Text PDF |
||
| 6. | AOCD: An Adaptive Outlier Based Coordinated Scan Detection Approach
|
|
| Monowar H. Bhuyan, Dhruba Kr. Bhattacharyya, and Jugal K. Kalita, Vol. 14, No. 6, 2012, pp. 339-351 Article Full Text PDF |
||
| 7. | Adaptive Anomaly-Based Intrusion Detection System Using Fuzzy Controller
|
|
| Farzaneh Geramiraz, Amir Saman Memaripour, and Maghsoud Abbaspour, Vol. 14, No. 6, 2012, pp. 352-361 Article Full Text PDF |
||
| 8. | Security of a Biometric Identity-based Encryption Scheme
|
|
| Miaomiao Tian, Wei Yang, and Liusheng Huang, Vol. 14, No. 6, 2012, pp. 362-365 Article Full Text PDF |
||
| 9. | Reviewer index to volume 14 (2012)
|
|
| Article Full Text PDF | ||