Quick Search:

Volume: 15, No: 5 (September 1, 2013)

International Journal of Network Security

1. A Study of Conjunctive Keyword Searchable Schemes
Cheng-Chi Lee, Shih-Ting Hsu, Min-Shiang Hwang, Vol. 15, No. 5, 2013, pp. 321-330
Article Full Text PDF

2. Performance Analysis of Steiner Tree-based Decentralization Mechanism (STDM) for Privacy Protection in Wireless Sensor Networks
B. Sathish Babu, Jayashree N, and Pallapa Venkataram, Vol. 15, No. 5, 2013, pp. 331-340
Article Full Text PDF

3. Key Generation Protocol in IBC
Dhruti Sharma and Devesh Jinwala, Vol. 15, No. 5, 2013, pp. 341-349
Article Full Text PDF

4. Security Analysis of a Dynamic ID-based Authentication Scheme for Multi-server Environment Using Smart Cards
Debiao He, Weijing Zhao, and Shuhua Wu, Vol. 15, No. 5, 2013, pp. 350-356
Article Full Text PDF

5. ID-based Deniable Authentication Protocol based on Diffie-Hellman Problem on Elliptic Curve
Jayaprakash Kar, Vol. 15, No. 5, 2013, pp. 357-364
Article Full Text PDF

6. A Semi-Fragile Image Content Authentication Technique based on Secure Hash in Frequency Domain
P. D. Sheba Kezia Malarchelvi, Vol. 15, No. 5, 2013, pp. 365-372
Article Full Text PDF

7. Wireless Honeypot: Framework, Architectures and Tools
Radhika Goel, Anjali Sardana, and R. C. Joshi, Vol. 15, No. 5, 2013, pp. 373-383
Article Full Text PDF

8. Security Analysis of a Suite of Deniable Authentication Protocols
Haibo Tian, Xiaofeng Chen, Baodian Wei, and Yi Liu, Vol. 15, No. 5, 2013, pp. 384-389
Article Full Text PDF

9. A Survey on Various Cyber Attacks and their Classification
M. Uma and G. Padmavathi, Vol. 15, No. 5, 2013, pp. 390-396
Article Full Text PDF

10. Security for Mobile Operators in Practice
Christos K. Dimitriadis, Vol. 15, No. 5, 2013, pp. 397-404
Article Full Text PDF

11. Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy
Jung-San Lee, Chin-Chen Chang, and Kuo-Jui Wei, Vol. 15, No. 5, 2013, pp. 405-410
Article Full Text PDF