Quick Search:

Volume: 16, No: 3 (May 1, 2014)

International Journal of Network Security

1. Critical Factors of Educational Institutions Adoption for BS 10012: Personal Information Management System
Cheng-Yi Liu, Shan-Shan Yang, and Iuon-Chang Lin, Vol. 16, No. 3, 2014, pp. 161-167
Article Full Text PDF

2. A Pairing-free ID-based Key Agreement Protocol with Different PKGs
Mohammad Sabzinejad Farash, Mahmoud Ahmadian Attari, Vol. 16, No. 3, 2014, pp. 168-173
Article Full Text PDF

3. CCLAS: A Practical and Compact Certificateless Aggregate Signature with Share Extraction
Min Zhou, Mingwu Zhang, Chunzhi Wang, and Bo Yang, Vol. 16, No. 3, 2014, pp. 174-181
Article Full Text PDF

4. Provably Secure Routing Protocol for Wireless Mesh Networks
Rakesh Matam and Somanath Tripathy, Vol. 16, No. 3, 2014, pp. 182-192
Article Full Text PDF

5. A Fault Based Attack on MDS-AES
Satyajit Das and Jaydeb Bhaumik, Vol. 16, No. 3, 2014, pp. 193-198
Article Full Text PDF

6. Fault Attack Against Miller's Algorithm for Even Embedding Degree
Yunqi Dou, Jiang Weng, Yun Wei, and Chuangui Ma, Vol. 16, No. 3, 2014, pp. 199-207
Article Full Text PDF

7. Reversible Image Hiding for High Image Quality Based on Histogram Shifting and Local Complexity
Chin-Chen Chang, Thai-Son Nguyen, and Chia-Chen Lin, Vol. 16, No. 3, 2014, pp. 208-220
Article Full Text PDF

8. A Pairwise Key Establishment Scheme for Multiple Deployment Sensor Networks
Boqing Zhou, Sujun Li, Jianxin Wang, Siqing Yang, and Jingguo Dai, Vol. 16, No. 3, 2014, pp. 221-228
Article Full Text PDF

9. Robust Two-Factor Authentication and Key Agreement Preserving User Privacy
Qi Jiang, Jianfeng Ma, Guangsong Li, and Li Yang, Vol. 16, No. 3, 2014, pp. 229-240
Article Full Text PDF

10. Subject index to volume 16 (2014)
Article Full Text PDF

11. Author index to volume 16 (2014)
Article Full Text PDF

12. Reviewer index to volume 16 (2014)
Article Full Text PDF