International Journal of Network Security | ||
1. | The Study of Data Hiding in Medical Images
|
|
Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang, Vol. 14, No. 6, 2012, pp. 301-309 Article Full Text PDF |
||
2. | A New Hierarchical Identity-based Signature Scheme From Lattices In The Standard Model
|
|
Miaomiao Tian, Liusheng Huang, and Wei Yang, Vol. 14, No. 6, 2012, pp. 310-315 Article Full Text PDF |
||
3. | A Stamped Blind Signature Scheme based on Elliptic Curve Discrete Logarithm Problem
|
|
Kalyan Chakraborty and Jay Mehta, Vol. 14, No. 6, 2012, pp. 316-319 Article Full Text PDF |
||
4. | Breaking A Proxy Signature Scheme From Lattices
|
|
Miaomiao Tian and Liusheng Huang, Vol. 14, No. 6, 2012, pp. 320-323 Article Full Text PDF |
||
5. | Harvesting SSL Certificate Data to Identify Web-Fraud
|
|
Mishari Almishari, Emiliano De Cristofaro, Karim El Defrawy, and Gene Tsudik, Vol. 14, No. 6, 2012, pp. 324-338 Article Full Text PDF |
||
6. | AOCD: An Adaptive Outlier Based Coordinated Scan Detection Approach
|
|
Monowar H. Bhuyan, Dhruba Kr. Bhattacharyya, and Jugal K. Kalita, Vol. 14, No. 6, 2012, pp. 339-351 Article Full Text PDF |
||
7. | Adaptive Anomaly-Based Intrusion Detection System Using Fuzzy Controller
|
|
Farzaneh Geramiraz, Amir Saman Memaripour, and Maghsoud Abbaspour, Vol. 14, No. 6, 2012, pp. 352-361 Article Full Text PDF |
||
8. | Security of a Biometric Identity-based Encryption Scheme
|
|
Miaomiao Tian, Wei Yang, and Liusheng Huang, Vol. 14, No. 6, 2012, pp. 362-365 Article Full Text PDF |
||
9. | Reviewer index to volume 14 (2012)
|
|
Article Full Text PDF | ||