International Journal of Network Security | ||
1. | A Study on Implementations of Information Security Risk Assessment: Application to Chlorine Processing System of Water Treatment
|
|
Chien-Cheng Huang, Kwo-Jean Farn, and Frank Yeong-Sung Lin, Vol. 16, No. 4, 2014, pp. 241-248 Article Full Text PDF |
||
2. | CRT Based Threshold Multi Secret Sharing Scheme
|
|
Subba Rao Y V and Chakravarthy Bhagvati, Vol. 16, No. 4, 2014, pp. 249-255 Article Full Text PDF |
||
3. | Fully Anonymous Identity-based Broadcast Encryption without Random Oracles
|
|
Yanli Ren, Zhihua Niu, Xinpeng Zhang, Vol. 16, No. 4, 2014, pp. 256-264 Article Full Text PDF |
||
4. | A Steganographic Method Based on DCT and New Quantization Technique
|
|
Mohamed Amin, Hatem M. Abdullkader, Hani M. Ibrahem, and Ahmed S. Sakr , Vol. 16, No. 4, 2014, pp. 265-270 Article Full Text PDF |
||
5. | A Simple Password Authentication Scheme Based on Geometric Hashing Function
|
|
Xu Zhuang, Chin-Chen Chang, Zhi-Hui Wang, Yan Zhu, Vol. 16, No. 4, 2014, pp. 271-277 Article Full Text PDF |
||
6. | A Provably Secure Certificate Based Ring Signature Without Pairing
|
|
Zhiguang Qin, Hu Xiong, and Fagen Li, Vol. 16, No. 4, 2014, pp. 278-285 Article Full Text PDF |
||
7. | Outsourcing Decryption of Multi-Authority ABE Ciphertexts
|
|
Keying Li and Hua Ma, Vol. 16, No. 4, 2014, pp. 286-294 Article Full Text PDF |
||
8. | A Reversible Steganography Suitable for Embedding Small Amounts of Data
|
|
Qian Mao, Chin-Chen Chang, and Ting-Feng Chung, Vol. 16, No. 4, 2014, pp. 295-303 Article Full Text PDF |
||
9. | Analysis of the WSN MAC Protocols under Jamming DoS Attack
|
|
Boris Mihajlov and Mitko Bogdanoski, Vol. 16, No. 4, 2014, pp. 304-312 Article Full Text PDF |
||
10. | An Improvement of Square Matrix Encoding by Adjusting Digits in a Matrix
|
|
Chi-Shiang Chan, Yi-Hui Chen, and Yuan-Yu Tsai, Vol. 16, No. 4, 2014, pp. 313-317 Article Full Text PDF |
||
11. | Cryptanalysis of Tan's Improvement on a Password Authentication Scheme for Multi-server Environments
|
|
Tung-Huang Feng, Chung-Huei Ling, and Min-Shiang Hwang, Vol. 16, No. 4, 2014, pp. 318-321 Article Full Text PDF |
||