| International Journal of Network Security | ||
| 1. | A Study on Implementations of Information Security Risk Assessment: Application to Chlorine Processing System of Water Treatment
|
|
| Chien-Cheng Huang, Kwo-Jean Farn, and Frank Yeong-Sung Lin, Vol. 16, No. 4, 2014, pp. 241-248 Article Full Text PDF |
||
| 2. | CRT Based Threshold Multi Secret Sharing Scheme
|
|
| Subba Rao Y V and Chakravarthy Bhagvati, Vol. 16, No. 4, 2014, pp. 249-255 Article Full Text PDF |
||
| 3. | Fully Anonymous Identity-based Broadcast Encryption without Random Oracles
|
|
| Yanli Ren, Zhihua Niu, Xinpeng Zhang, Vol. 16, No. 4, 2014, pp. 256-264 Article Full Text PDF |
||
| 4. | A Steganographic Method Based on DCT and New Quantization Technique
|
|
| Mohamed Amin, Hatem M. Abdullkader, Hani M. Ibrahem, and Ahmed S. Sakr , Vol. 16, No. 4, 2014, pp. 265-270 Article Full Text PDF |
||
| 5. | A Simple Password Authentication Scheme Based on Geometric Hashing Function
|
|
| Xu Zhuang, Chin-Chen Chang, Zhi-Hui Wang, Yan Zhu, Vol. 16, No. 4, 2014, pp. 271-277 Article Full Text PDF |
||
| 6. | A Provably Secure Certificate Based Ring Signature Without Pairing
|
|
| Zhiguang Qin, Hu Xiong, and Fagen Li, Vol. 16, No. 4, 2014, pp. 278-285 Article Full Text PDF |
||
| 7. | Outsourcing Decryption of Multi-Authority ABE Ciphertexts
|
|
| Keying Li and Hua Ma, Vol. 16, No. 4, 2014, pp. 286-294 Article Full Text PDF |
||
| 8. | A Reversible Steganography Suitable for Embedding Small Amounts of Data
|
|
| Qian Mao, Chin-Chen Chang, and Ting-Feng Chung, Vol. 16, No. 4, 2014, pp. 295-303 Article Full Text PDF |
||
| 9. | Analysis of the WSN MAC Protocols under Jamming DoS Attack
|
|
| Boris Mihajlov and Mitko Bogdanoski, Vol. 16, No. 4, 2014, pp. 304-312 Article Full Text PDF |
||
| 10. | An Improvement of Square Matrix Encoding by Adjusting Digits in a Matrix
|
|
| Chi-Shiang Chan, Yi-Hui Chen, and Yuan-Yu Tsai, Vol. 16, No. 4, 2014, pp. 313-317 Article Full Text PDF |
||
| 11. | Cryptanalysis of Tan's Improvement on a Password Authentication Scheme for Multi-server Environments
|
|
| Tung-Huang Feng, Chung-Huei Ling, and Min-Shiang Hwang, Vol. 16, No. 4, 2014, pp. 318-321 Article Full Text PDF |
||