International Journal of Network Security | ||
1. | A Study of Conjunctive Keyword Searchable Schemes
|
|
Cheng-Chi Lee, Shih-Ting Hsu, Min-Shiang Hwang, Vol. 15, No. 5, 2013, pp. 321-330 Article Full Text PDF |
||
2. | Performance Analysis of Steiner Tree-based Decentralization Mechanism (STDM) for Privacy Protection in Wireless Sensor Networks
|
|
B. Sathish Babu, Jayashree N, and Pallapa Venkataram, Vol. 15, No. 5, 2013, pp. 331-340 Article Full Text PDF |
||
3. | Key Generation Protocol in IBC
|
|
Dhruti Sharma and Devesh Jinwala, Vol. 15, No. 5, 2013, pp. 341-349 Article Full Text PDF |
||
4. | Security Analysis of a Dynamic ID-based Authentication Scheme for Multi-server Environment Using Smart Cards
|
|
Debiao He, Weijing Zhao, and Shuhua Wu, Vol. 15, No. 5, 2013, pp. 350-356 Article Full Text PDF |
||
5. | ID-based Deniable Authentication Protocol based on Diffie-Hellman Problem on Elliptic Curve
|
|
Jayaprakash Kar, Vol. 15, No. 5, 2013, pp. 357-364 Article Full Text PDF |
||
6. | A Semi-Fragile Image Content Authentication Technique based on Secure Hash in Frequency Domain
|
|
P. D. Sheba Kezia Malarchelvi, Vol. 15, No. 5, 2013, pp. 365-372 Article Full Text PDF |
||
7. | Wireless Honeypot: Framework, Architectures and Tools
|
|
Radhika Goel, Anjali Sardana, and R. C. Joshi, Vol. 15, No. 5, 2013, pp. 373-383 Article Full Text PDF |
||
8. | Security Analysis of a Suite of Deniable Authentication Protocols
|
|
Haibo Tian, Xiaofeng Chen, Baodian Wei, and Yi Liu, Vol. 15, No. 5, 2013, pp. 384-389 Article Full Text PDF |
||
9. | A Survey on Various Cyber Attacks and their Classification
|
|
M. Uma and G. Padmavathi, Vol. 15, No. 5, 2013, pp. 390-396 Article Full Text PDF |
||
10. | Security for Mobile Operators in Practice
|
|
Christos K. Dimitriadis, Vol. 15, No. 5, 2013, pp. 397-404 Article Full Text PDF |
||
11. | Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy
|
|
Jung-San Lee, Chin-Chen Chang, and Kuo-Jui Wei, Vol. 15, No. 5, 2013, pp. 405-410 Article Full Text PDF |
||