International Journal of Network Security | ||
1. | Critical Factors of Educational Institutions Adoption for BS 10012: Personal Information Management System
|
|
Cheng-Yi Liu, Shan-Shan Yang, and Iuon-Chang Lin, Vol. 16, No. 3, 2014, pp. 161-167 Article Full Text PDF |
||
2. | A Pairing-free ID-based Key Agreement Protocol with Different PKGs
|
|
Mohammad Sabzinejad Farash, Mahmoud Ahmadian Attari, Vol. 16, No. 3, 2014, pp. 168-173 Article Full Text PDF |
||
3. | CCLAS: A Practical and Compact Certificateless Aggregate Signature with Share Extraction
|
|
Min Zhou, Mingwu Zhang, Chunzhi Wang, and Bo Yang, Vol. 16, No. 3, 2014, pp. 174-181 Article Full Text PDF |
||
4. | Provably Secure Routing Protocol for Wireless Mesh Networks
|
|
Rakesh Matam and Somanath Tripathy, Vol. 16, No. 3, 2014, pp. 182-192 Article Full Text PDF |
||
5. | A Fault Based Attack on MDS-AES
|
|
Satyajit Das and Jaydeb Bhaumik, Vol. 16, No. 3, 2014, pp. 193-198 Article Full Text PDF |
||
6. | Fault Attack Against Miller's Algorithm for Even Embedding Degree
|
|
Yunqi Dou, Jiang Weng, Yun Wei, and Chuangui Ma, Vol. 16, No. 3, 2014, pp. 199-207 Article Full Text PDF |
||
7. | Reversible Image Hiding for High Image Quality Based on Histogram Shifting and Local Complexity
|
|
Chin-Chen Chang, Thai-Son Nguyen, and Chia-Chen Lin, Vol. 16, No. 3, 2014, pp. 208-220 Article Full Text PDF |
||
8. | A Pairwise Key Establishment Scheme for Multiple Deployment Sensor Networks
|
|
Boqing Zhou, Sujun Li, Jianxin Wang, Siqing Yang, and Jingguo Dai, Vol. 16, No. 3, 2014, pp. 221-228 Article Full Text PDF |
||
9. | Robust Two-Factor Authentication and Key Agreement Preserving User Privacy
|
|
Qi Jiang, Jianfeng Ma, Guangsong Li, and Li Yang, Vol. 16, No. 3, 2014, pp. 229-240 Article Full Text PDF |
||