International Journal of Network Security | ||
1. | A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments
|
|
Pei-Shan Chung, Chi-Wei Liu, and Min-Shiang Hwang, Vol. 16, No. 1, 2014, pp. 1-13 Article Full Text PDF |
||
2. | An Improved Steganographic Technique Using LSB Replacement on a Scanned Path Image
|
|
B. Karthikeyan, S. Ramakrishnan, V. Vaithiyanathan, S. Sruti, and M. Gomathymeenakshi, Vol. 16, No. 1, 2014, pp. 14-18 Article Full Text PDF |
||
3. | Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE
|
|
Yang Cui, Kirill Morozov, Kazukuni Kobara, and Hideki Imai, Vol. 16, No. 1, 2014, pp. 19-28 Article Full Text PDF |
||
4. | Provably Secure Online/Off-line Identity-Based Signature Scheme for Wireless Sensor Network
|
|
Jayaprakash Kar, Vol. 16, No. 1, 2014, pp. 29-39 Article Full Text PDF |
||
5. | A Reversible Digital Watermarking Algorithm for Vector Maps
|
|
Jian-Guo Sun, Guo-Yin Zhang, Ai-Hong Yao, and Jun-Peng Wu, Vol. 16, No. 1, 2014, pp. 40-45 Article Full Text PDF |
||
6. | User Traffic Profile for Traffic Reduction and Effective Bot C&C Detection
|
|
Soniya Balram and M. Wilscy, Vol. 16, No. 1, 2014, pp. 46-52 Article Full Text PDF |
||
7. | Cryptanalysis of Multi Prime RSA with Secret Key Greater than Public Key
|
|
Navaneet Ojha and Sahadeo Padhye, Vol. 16, No. 1, 2014, pp. 53-57 Article Full Text PDF |
||
8. | An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem
|
|
Yanjun Liu, Chin-Chen Chang, and Shih-Chang Chang, Vol. 16, No. 1, 2014, pp. 58-64 Article Full Text PDF |
||
9. | A Biometric Approach for Continuous User Authentication by Fusing Hard and Soft Traits
|
|
A. Prakash, Vol. 16, No. 1, 2014, pp. 65-70 Article Full Text PDF |
||
10. | Improved Fault Attack Against Eta Pairing
|
|
Yunqi Dou, Jiang Weng, and Chuangui Ma, Vol. 16, No. 1, 2014, pp. 71-77 Article Full Text PDF |
||
11. | On the Security of a RSA-based Certificateless Signature Scheme
|
|
Debiao He, Muhammad Khurram Khan, and Shuhua Wu, Vol. 16, No. 1, 2014, pp. 78-80 Article Full Text PDF |
||