Quick Search:

Volume: 16, No: 4 (July 1, 2014)

International Journal of Network Security

1. A Study on Implementations of Information Security Risk Assessment: Application to Chlorine Processing System of Water Treatment
Chien-Cheng Huang, Kwo-Jean Farn, and Frank Yeong-Sung Lin, Vol. 16, No. 4, 2014, pp. 241-248
Article Full Text PDF

2. CRT Based Threshold Multi Secret Sharing Scheme
Subba Rao Y V and Chakravarthy Bhagvati, Vol. 16, No. 4, 2014, pp. 249-255
Article Full Text PDF

3. Fully Anonymous Identity-based Broadcast Encryption without Random Oracles
Yanli Ren, Zhihua Niu, Xinpeng Zhang, Vol. 16, No. 4, 2014, pp. 256-264
Article Full Text PDF

4. A Steganographic Method Based on DCT and New Quantization Technique
Mohamed Amin, Hatem M. Abdullkader, Hani M. Ibrahem, and Ahmed S. Sakr , Vol. 16, No. 4, 2014, pp. 265-270
Article Full Text PDF

5. A Simple Password Authentication Scheme Based on Geometric Hashing Function
Xu Zhuang, Chin-Chen Chang, Zhi-Hui Wang, Yan Zhu, Vol. 16, No. 4, 2014, pp. 271-277
Article Full Text PDF

6. A Provably Secure Certificate Based Ring Signature Without Pairing
Zhiguang Qin, Hu Xiong, and Fagen Li, Vol. 16, No. 4, 2014, pp. 278-285
Article Full Text PDF

7. Outsourcing Decryption of Multi-Authority ABE Ciphertexts
Keying Li and Hua Ma, Vol. 16, No. 4, 2014, pp. 286-294
Article Full Text PDF

8. A Reversible Steganography Suitable for Embedding Small Amounts of Data
Qian Mao, Chin-Chen Chang, and Ting-Feng Chung, Vol. 16, No. 4, 2014, pp. 295-303
Article Full Text PDF

9. Analysis of the WSN MAC Protocols under Jamming DoS Attack
Boris Mihajlov and Mitko Bogdanoski, Vol. 16, No. 4, 2014, pp. 304-312
Article Full Text PDF

10. An Improvement of Square Matrix Encoding by Adjusting Digits in a Matrix
Chi-Shiang Chan, Yi-Hui Chen, and Yuan-Yu Tsai, Vol. 16, No. 4, 2014, pp. 313-317
Article Full Text PDF

11. Cryptanalysis of Tan's Improvement on a Password Authentication Scheme for Multi-server Environments
Tung-Huang Feng, Chung-Huei Ling, and Min-Shiang Hwang, Vol. 16, No. 4, 2014, pp. 318-321
Article Full Text PDF

12. Subject index to volume 16 (2014)
Article Full Text PDF

13. Author index to volume 16 (2014)
Article Full Text PDF

14. Reviewer index to volume 16 (2014)
Article Full Text PDF