International Journal of Network Security | ||
1. | A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments
|
|
Cheng-Chi Lee, Pei-Shan Chung, and Min-Shiang Hwang, Vol. 15, No. 4, 2013, pp. 231-240 Article Full Text PDF |
||
2. | A Timer Based Acknowledgement Scheme for Node Misbehavior Detection and Isolation in MANET
|
|
Ramasamy Murugan and Arumugam Shanmugam, Vol. 15, No. 4, 2013, pp. 241-247 Article Full Text PDF |
||
3. | Secure Position Verification Approach for Wireless Ad-hoc Networks
|
|
Samir A. Elsagheer Mohamed, Vol. 15, No. 4, 2013, pp. 248-255 Article Full Text PDF |
||
4. | Simple Three Party Key Exchange Protocol via Twin Diffie-Hellman Problem
|
|
H. K. Pathak and Manju Sanghi, Vol. 15, No. 4, 2013, pp. 256-264 Article Full Text PDF |
||
5. | Index Calculus Method based on Smooth Numbers of ±1 over Zp*
|
|
R. Padmavathy and Chakravarthy Bhagvati, Vol. 15, No. 4, 2013, pp. 265-273 Article Full Text PDF |
||
6. | A Novel Non-repudiable Threshold Proxy Signature Scheme with Known Signers
|
|
Samaneh Mashhadi, Vol. 15, No. 4, 2013, pp. 274-279 Article Full Text PDF |
||
7. | MHIP: Effective Key Management for Mobile Heterogeneous Sensor Networks
|
|
Dulal Kar, Rashad Tatum, and Keith Zejdlik, Vol. 15, No. 4, 2013, pp. 280-290 Article Full Text PDF |
||
8. | A Hybrid Fault Tolerant Approach for AES
|
|
Chang N. Zhang, Qian Yu, and Xiao Wei Liu, Vol. 15, No. 4, 2013, pp. 291-297 Article Full Text PDF |
||
9. | Rain: Reversible Addition with Increased Nonlinearity
|
|
Jaydeb Bhaumik, Debdeep Mukhopadhyay, and Dipanwita Roy Chowdhury, Vol. 15, No. 4, 2013, pp. 298-306 Article Full Text PDF |
||
10. | An Anonymous Multi-Receiver Encryption Based on RSA
|
|
Lein Harn, Chin-Chen Chang, and Hsiao-Ling Wu, Vol. 15, No. 4, 2013, pp. 307-312 Article Full Text PDF |
||
11. | Attack against Ibrahim’s Distributed Key Generation for RSA
|
|
Błażej Brzeźniak, Lucjan Hanzlik, Przemysław Kubiak, and Mirosław Kutyłowski, Vol. 15, No. 4, 2013, pp. 313-316 Article Full Text PDF |
||
12. | Security Flaw of an ECC-based Signcryption Scheme with Anonymity
|
|
Hu Xiong , Jianbin Hu, and Zhong Chen, Vol. 15, No. 4, 2013, pp. 317-320 Article Full Text PDF |
||