Quick Search:

Volume: 15, No: 4 (July 1, 2013)

International Journal of Network Security

1. A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments
Cheng-Chi Lee, Pei-Shan Chung, and Min-Shiang Hwang, Vol. 15, No. 4, 2013, pp. 231-240
Article Full Text PDF

2. A Timer Based Acknowledgement Scheme for Node Misbehavior Detection and Isolation in MANET
Ramasamy Murugan and Arumugam Shanmugam, Vol. 15, No. 4, 2013, pp. 241-247
Article Full Text PDF

3. Secure Position Verification Approach for Wireless Ad-hoc Networks
Samir A. Elsagheer Mohamed, Vol. 15, No. 4, 2013, pp. 248-255
Article Full Text PDF

4. Simple Three Party Key Exchange Protocol via Twin Diffie-Hellman Problem
H. K. Pathak and Manju Sanghi, Vol. 15, No. 4, 2013, pp. 256-264
Article Full Text PDF

5. Index Calculus Method based on Smooth Numbers of ±1 over Zp*
R. Padmavathy and Chakravarthy Bhagvati, Vol. 15, No. 4, 2013, pp. 265-273
Article Full Text PDF

6. A Novel Non-repudiable Threshold Proxy Signature Scheme with Known Signers
Samaneh Mashhadi, Vol. 15, No. 4, 2013, pp. 274-279
Article Full Text PDF

7. MHIP: Effective Key Management for Mobile Heterogeneous Sensor Networks
Dulal Kar, Rashad Tatum, and Keith Zejdlik, Vol. 15, No. 4, 2013, pp. 280-290
Article Full Text PDF

8. A Hybrid Fault Tolerant Approach for AES
Chang N. Zhang, Qian Yu, and Xiao Wei Liu, Vol. 15, No. 4, 2013, pp. 291-297
Article Full Text PDF

9. Rain: Reversible Addition with Increased Nonlinearity
Jaydeb Bhaumik, Debdeep Mukhopadhyay, and Dipanwita Roy Chowdhury, Vol. 15, No. 4, 2013, pp. 298-306
Article Full Text PDF

10. An Anonymous Multi-Receiver Encryption Based on RSA
Lein Harn, Chin-Chen Chang, and Hsiao-Ling Wu, Vol. 15, No. 4, 2013, pp. 307-312
Article Full Text PDF

11. Attack against Ibrahim’s Distributed Key Generation for RSA
Błażej Brzeźniak, Lucjan Hanzlik, Przemysław Kubiak, and Mirosław Kutyłowski, Vol. 15, No. 4, 2013, pp. 313-316
Article Full Text PDF

12. Security Flaw of an ECC-based Signcryption Scheme with Anonymity
Hu Xiong , Jianbin Hu, and Zhong Chen, Vol. 15, No. 4, 2013, pp. 317-320
Article Full Text PDF