Quick Search:

Volume: 15, No: 4 (July 1, 2013)

International Journal of Network Security

1. A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments
Cheng-Chi Lee, Pei-Shan Chung, and Min-Shiang Hwang, Vol. 15, No. 4, 2013, pp. 231-240
Article Full Text PDF

2. A Timer Based Acknowledgement Scheme for Node Misbehavior Detection and Isolation in MANET
Ramasamy Murugan and Arumugam Shanmugam, Vol. 15, No. 4, 2013, pp. 241-247
Article Full Text PDF

3. Secure Position Verification Approach for Wireless Ad-hoc Networks
Samir A. Elsagheer Mohamed, Vol. 15, No. 4, 2013, pp. 248-255
Article Full Text PDF

4. Simple Three Party Key Exchange Protocol via Twin Diffie-Hellman Problem
H. K. Pathak and Manju Sanghi, Vol. 15, No. 4, 2013, pp. 256-264
Article Full Text PDF

5. Index Calculus Method based on Smooth Numbers of ±1 over Zp*
R. Padmavathy and Chakravarthy Bhagvati, Vol. 15, No. 4, 2013, pp. 265-273
Article Full Text PDF

6. A Novel Non-repudiable Threshold Proxy Signature Scheme with Known Signers
Samaneh Mashhadi, Vol. 15, No. 4, 2013, pp. 274-279
Article Full Text PDF

7. MHIP: Effective Key Management for Mobile Heterogeneous Sensor Networks
Dulal Kar, Rashad Tatum, and Keith Zejdlik, Vol. 15, No. 4, 2013, pp. 280-290
Article Full Text PDF

8. A Hybrid Fault Tolerant Approach for AES
Chang N. Zhang, Qian Yu, and Xiao Wei Liu, Vol. 15, No. 4, 2013, pp. 291-297
Article Full Text PDF

9. Rain: Reversible Addition with Increased Nonlinearity
Jaydeb Bhaumik, Debdeep Mukhopadhyay, and Dipanwita Roy Chowdhury, Vol. 15, No. 4, 2013, pp. 298-306
Article Full Text PDF

10. An Anonymous Multi-Receiver Encryption Based on RSA
Lein Harn, Chin-Chen Chang, and Hsiao-Ling Wu, Vol. 15, No. 4, 2013, pp. 307-312
Article Full Text PDF

11. Attack against Ibrahim’s Distributed Key Generation for RSA
Błażej Brzeźniak, Lucjan Hanzlik, Przemysław Kubiak, and Mirosław Kutyłowski, Vol. 15, No. 4, 2013, pp. 313-316
Article Full Text PDF

12. Security Flaw of an ECC-based Signcryption Scheme with Anonymity
Hu Xiong , Jianbin Hu, and Zhong Chen, Vol. 15, No. 4, 2013, pp. 317-320
Article Full Text PDF

13. Subject index to volume 15 (2013)
Article Full Text PDF

14. Author index to volume 15 (2013)
Article Full Text PDF

15. Reviewer index to volume 15 (2013)
Article Full Text PDF