International Journal of Network Security  
1.  A Study of Attributebased Proxy Reencryption Scheme in Cloud Environments


PeiShan Chung, ChiWei Liu, and MinShiang Hwang, Vol. 16, No. 1, 2014, pp. 113 Article Full Text PDF 

2.  An Improved Steganographic Technique Using LSB Replacement on a Scanned Path Image


B. Karthikeyan, S. Ramakrishnan, V. Vaithiyanathan, S. Sruti, and M. Gomathymeenakshi, Vol. 16, No. 1, 2014, pp. 1418 Article Full Text PDF 

3.  Efficient Constructions of Deterministic Encryption from Hybrid Encryption and CodeBased PKE


Yang Cui, Kirill Morozov, Kazukuni Kobara, and Hideki Imai, Vol. 16, No. 1, 2014, pp. 1928 Article Full Text PDF 

4.  Provably Secure Online/Offline IdentityBased Signature Scheme for Wireless Sensor Network


Jayaprakash Kar, Vol. 16, No. 1, 2014, pp. 2939 Article Full Text PDF 

5.  A Reversible Digital Watermarking Algorithm for Vector Maps


JianGuo Sun, GuoYin Zhang, AiHong Yao, and JunPeng Wu, Vol. 16, No. 1, 2014, pp. 4045 Article Full Text PDF 

6.  User Traffic Profile for Traffic Reduction and Effective Bot C&C Detection


Soniya Balram and M. Wilscy, Vol. 16, No. 1, 2014, pp. 4652 Article Full Text PDF 

7.  Cryptanalysis of Multi Prime RSA with Secret Key Greater than Public Key


Navaneet Ojha and Sahadeo Padhye, Vol. 16, No. 1, 2014, pp. 5357 Article Full Text PDF 

8.  An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem


Yanjun Liu, ChinChen Chang, and ShihChang Chang, Vol. 16, No. 1, 2014, pp. 5864 Article Full Text PDF 

9.  A Biometric Approach for Continuous User Authentication by Fusing Hard and Soft Traits


A. Prakash, Vol. 16, No. 1, 2014, pp. 6570 Article Full Text PDF 

10.  Improved Fault Attack Against Eta Pairing


Yunqi Dou, Jiang Weng, and Chuangui Ma, Vol. 16, No. 1, 2014, pp. 7177 Article Full Text PDF 

11.  On the Security of a RSAbased Certificateless Signature Scheme


Debiao He, Muhammad Khurram Khan, and Shuhua Wu, Vol. 16, No. 1, 2014, pp. 7880 Article Full Text PDF 
