Quick Search:

Volume: 16, No: 4 (July 1, 2014)

International Journal of Network Security

1. A Study on Implementations of Information Security Risk Assessment: Application to Chlorine Processing System of Water Treatment
Chien-Cheng Huang, Kwo-Jean Farn, and Frank Yeong-Sung Lin, Vol. 16, No. 4, 2014, pp. 241-248
Article Full Text PDF

2. CRT Based Threshold Multi Secret Sharing Scheme
Subba Rao Y V and Chakravarthy Bhagvati, Vol. 16, No. 4, 2014, pp. 249-255
Article Full Text PDF

3. Fully Anonymous Identity-based Broadcast Encryption without Random Oracles
Yanli Ren, Zhihua Niu, Xinpeng Zhang, Vol. 16, No. 4, 2014, pp. 256-264
Article Full Text PDF

4. A Steganographic Method Based on DCT and New Quantization Technique
Mohamed Amin, Hatem M. Abdullkader, Hani M. Ibrahem, and Ahmed S. Sakr , Vol. 16, No. 4, 2014, pp. 265-270
Article Full Text PDF

5. A Simple Password Authentication Scheme Based on Geometric Hashing Function
Xu Zhuang, Chin-Chen Chang, Zhi-Hui Wang, Yan Zhu, Vol. 16, No. 4, 2014, pp. 271-277
Article Full Text PDF

6. A Provably Secure Certificate Based Ring Signature Without Pairing
Zhiguang Qin, Hu Xiong, and Fagen Li, Vol. 16, No. 4, 2014, pp. 278-285
Article Full Text PDF

7. Outsourcing Decryption of Multi-Authority ABE Ciphertexts
Keying Li and Hua Ma, Vol. 16, No. 4, 2014, pp. 286-294
Article Full Text PDF

8. A Reversible Steganography Suitable for Embedding Small Amounts of Data
Qian Mao, Chin-Chen Chang, and Ting-Feng Chung, Vol. 16, No. 4, 2014, pp. 295-303
Article Full Text PDF

9. Analysis of the WSN MAC Protocols under Jamming DoS Attack
Boris Mihajlov and Mitko Bogdanoski, Vol. 16, No. 4, 2014, pp. 304-312
Article Full Text PDF

10. An Improvement of Square Matrix Encoding by Adjusting Digits in a Matrix
Chi-Shiang Chan, Yi-Hui Chen, and Yuan-Yu Tsai, Vol. 16, No. 4, 2014, pp. 313-317
Article Full Text PDF

11. Cryptanalysis of Tan's Improvement on a Password Authentication Scheme for Multi-server Environments
Tung-Huang Feng, Chung-Huei Ling, and Min-Shiang Hwang, Vol. 16, No. 4, 2014, pp. 318-321
Article Full Text PDF