Quick Search:

Volume: 16, No: 1 (January 1, 2014)

International Journal of Network Security

1. A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments
Pei-Shan Chung, Chi-Wei Liu, and Min-Shiang Hwang, Vol. 16, No. 1, 2014, pp. 1-13
Article Full Text PDF

2. An Improved Steganographic Technique Using LSB Replacement on a Scanned Path Image
B. Karthikeyan, S. Ramakrishnan, V. Vaithiyanathan, S. Sruti, and M. Gomathymeenakshi, Vol. 16, No. 1, 2014, pp. 14-18
Article Full Text PDF

3. Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE
Yang Cui, Kirill Morozov, Kazukuni Kobara, and Hideki Imai, Vol. 16, No. 1, 2014, pp. 19-28
Article Full Text PDF

4. Provably Secure Online/Off-line Identity-Based Signature Scheme for Wireless Sensor Network
Jayaprakash Kar, Vol. 16, No. 1, 2014, pp. 29-39
Article Full Text PDF

5. A Reversible Digital Watermarking Algorithm for Vector Maps
Jian-Guo Sun, Guo-Yin Zhang, Ai-Hong Yao, and Jun-Peng Wu, Vol. 16, No. 1, 2014, pp. 40-45
Article Full Text PDF

6. User Traffic Profile for Traffic Reduction and Effective Bot C&C Detection
Soniya Balram and M. Wilscy, Vol. 16, No. 1, 2014, pp. 46-52
Article Full Text PDF

7. Cryptanalysis of Multi Prime RSA with Secret Key Greater than Public Key
Navaneet Ojha and Sahadeo Padhye, Vol. 16, No. 1, 2014, pp. 53-57
Article Full Text PDF

8. An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem
Yanjun Liu, Chin-Chen Chang, and Shih-Chang Chang, Vol. 16, No. 1, 2014, pp. 58-64
Article Full Text PDF

9. A Biometric Approach for Continuous User Authentication by Fusing Hard and Soft Traits
A. Prakash, Vol. 16, No. 1, 2014, pp. 65-70
Article Full Text PDF

10. Improved Fault Attack Against Eta Pairing
Yunqi Dou, Jiang Weng, and Chuangui Ma, Vol. 16, No. 1, 2014, pp. 71-77
Article Full Text PDF

11. On the Security of a RSA-based Certificateless Signature Scheme
Debiao He, Muhammad Khurram Khan, and Shuhua Wu, Vol. 16, No. 1, 2014, pp. 78-80
Article Full Text PDF