| International Journal of Network Security | ||
| 1. | A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments
|
|
| Pei-Shan Chung, Chi-Wei Liu, and Min-Shiang Hwang, Vol. 16, No. 1, 2014, pp. 1-13 Article Full Text PDF |
||
| 2. | An Improved Steganographic Technique Using LSB Replacement on a Scanned Path Image
|
|
| B. Karthikeyan, S. Ramakrishnan, V. Vaithiyanathan, S. Sruti, and M. Gomathymeenakshi, Vol. 16, No. 1, 2014, pp. 14-18 Article Full Text PDF |
||
| 3. | Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE
|
|
| Yang Cui, Kirill Morozov, Kazukuni Kobara, and Hideki Imai, Vol. 16, No. 1, 2014, pp. 19-28 Article Full Text PDF |
||
| 4. | Provably Secure Online/Off-line Identity-Based Signature Scheme for Wireless Sensor Network
|
|
| Jayaprakash Kar, Vol. 16, No. 1, 2014, pp. 29-39 Article Full Text PDF |
||
| 5. | A Reversible Digital Watermarking Algorithm for Vector Maps
|
|
| Jian-Guo Sun, Guo-Yin Zhang, Ai-Hong Yao, and Jun-Peng Wu, Vol. 16, No. 1, 2014, pp. 40-45 Article Full Text PDF |
||
| 6. | User Traffic Profile for Traffic Reduction and Effective Bot C&C Detection
|
|
| Soniya Balram and M. Wilscy, Vol. 16, No. 1, 2014, pp. 46-52 Article Full Text PDF |
||
| 7. | Cryptanalysis of Multi Prime RSA with Secret Key Greater than Public Key
|
|
| Navaneet Ojha and Sahadeo Padhye, Vol. 16, No. 1, 2014, pp. 53-57 Article Full Text PDF |
||
| 8. | An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem
|
|
| Yanjun Liu, Chin-Chen Chang, and Shih-Chang Chang, Vol. 16, No. 1, 2014, pp. 58-64 Article Full Text PDF |
||
| 9. | A Biometric Approach for Continuous User Authentication by Fusing Hard and Soft Traits
|
|
| A. Prakash, Vol. 16, No. 1, 2014, pp. 65-70 Article Full Text PDF |
||
| 10. | Improved Fault Attack Against Eta Pairing
|
|
| Yunqi Dou, Jiang Weng, and Chuangui Ma, Vol. 16, No. 1, 2014, pp. 71-77 Article Full Text PDF |
||
| 11. | On the Security of a RSA-based Certificateless Signature Scheme
|
|
| Debiao He, Muhammad Khurram Khan, and Shuhua Wu, Vol. 16, No. 1, 2014, pp. 78-80 Article Full Text PDF |
||