Quick Search:

Volume: 14, No: 6 (November 1, 2012)

International Journal of Network Security

1. The Study of Data Hiding in Medical Images
Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang, Vol. 14, No. 6, 2012, pp. 301-309
Article Full Text PDF

2. A New Hierarchical Identity-based Signature Scheme From Lattices In The Standard Model
Miaomiao Tian, Liusheng Huang, and Wei Yang, Vol. 14, No. 6, 2012, pp. 310-315
Article Full Text PDF

3. A Stamped Blind Signature Scheme based on Elliptic Curve Discrete Logarithm Problem
Kalyan Chakraborty and Jay Mehta, Vol. 14, No. 6, 2012, pp. 316-319
Article Full Text PDF

4. Breaking A Proxy Signature Scheme From Lattices
Miaomiao Tian and Liusheng Huang, Vol. 14, No. 6, 2012, pp. 320-323
Article Full Text PDF

5. Harvesting SSL Certificate Data to Identify Web-Fraud
Mishari Almishari, Emiliano De Cristofaro, Karim El Defrawy, and Gene Tsudik, Vol. 14, No. 6, 2012, pp. 324-338
Article Full Text PDF

6. AOCD: An Adaptive Outlier Based Coordinated Scan Detection Approach
Monowar H. Bhuyan, Dhruba Kr. Bhattacharyya, and Jugal K. Kalita, Vol. 14, No. 6, 2012, pp. 339-351
Article Full Text PDF

7. Adaptive Anomaly-Based Intrusion Detection System Using Fuzzy Controller
Farzaneh Geramiraz, Amir Saman Memaripour, and Maghsoud Abbaspour, Vol. 14, No. 6, 2012, pp. 352-361
Article Full Text PDF

8. Security of a Biometric Identity-based Encryption Scheme
Miaomiao Tian, Wei Yang, and Liusheng Huang, Vol. 14, No. 6, 2012, pp. 362-365
Article Full Text PDF

9. Subject index to volume 14 (2012)
Article Full Text PDF

10. Author index to volume 14 (2012)
Article Full Text PDF

11. Reviewer index to volume 14 (2012)
Article Full Text PDF