| International Journal of Network Security | ||
| 1. | A Study of Conjunctive Keyword Searchable Schemes
|
|
| Cheng-Chi Lee, Shih-Ting Hsu, Min-Shiang Hwang, Vol. 15, No. 5, 2013, pp. 321-330 Article Full Text PDF |
||
| 2. | Performance Analysis of Steiner Tree-based Decentralization Mechanism (STDM) for Privacy Protection in Wireless Sensor Networks
|
|
| B. Sathish Babu, Jayashree N, and Pallapa Venkataram, Vol. 15, No. 5, 2013, pp. 331-340 Article Full Text PDF |
||
| 3. | Key Generation Protocol in IBC
|
|
| Dhruti Sharma and Devesh Jinwala, Vol. 15, No. 5, 2013, pp. 341-349 Article Full Text PDF |
||
| 4. | Security Analysis of a Dynamic ID-based Authentication Scheme for Multi-server Environment Using Smart Cards
|
|
| Debiao He, Weijing Zhao, and Shuhua Wu, Vol. 15, No. 5, 2013, pp. 350-356 Article Full Text PDF |
||
| 5. | ID-based Deniable Authentication Protocol based on Diffie-Hellman Problem on Elliptic Curve
|
|
| Jayaprakash Kar, Vol. 15, No. 5, 2013, pp. 357-364 Article Full Text PDF |
||
| 6. | A Semi-Fragile Image Content Authentication Technique based on Secure Hash in Frequency Domain
|
|
| P. D. Sheba Kezia Malarchelvi, Vol. 15, No. 5, 2013, pp. 365-372 Article Full Text PDF |
||
| 7. | Wireless Honeypot: Framework, Architectures and Tools
|
|
| Radhika Goel, Anjali Sardana, and R. C. Joshi, Vol. 15, No. 5, 2013, pp. 373-383 Article Full Text PDF |
||
| 8. | Security Analysis of a Suite of Deniable Authentication Protocols
|
|
| Haibo Tian, Xiaofeng Chen, Baodian Wei, and Yi Liu, Vol. 15, No. 5, 2013, pp. 384-389 Article Full Text PDF |
||
| 9. | A Survey on Various Cyber Attacks and their Classification
|
|
| M. Uma and G. Padmavathi, Vol. 15, No. 5, 2013, pp. 390-396 Article Full Text PDF |
||
| 10. | Security for Mobile Operators in Practice
|
|
| Christos K. Dimitriadis, Vol. 15, No. 5, 2013, pp. 397-404 Article Full Text PDF |
||
| 11. | Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy
|
|
| Jung-San Lee, Chin-Chen Chang, and Kuo-Jui Wei, Vol. 15, No. 5, 2013, pp. 405-410 Article Full Text PDF |
||