Quick Search:

Volume: 16, No: 5 (September 1, 2014)

International Journal of Network Security

1. Distributed Detecting Node Replication Attacks in Wireless Sensor Networks: A Survey
Wei Teng Li, Tung-Huang Feng, and Min-Shiang Hwang, Vol. 16, No. 5, 2014, pp. 323-330
Article Full Text PDF

2. Privacy-enhanced Designated Confirmer Signature without Random Oracles
Shengke Zeng and Hu Xiong, Vol. 16, No. 5, 2014, pp. 331-339
Article Full Text PDF

3. Penny: Secure, Decentralized Data Management
Safwan Mahmud Khan and Kevin W. Hamlen, Vol. 16, No. 5, 2014, pp. 340-354
Article Full Text PDF

4. On the Security of a Secure Batch Verification with Group Testing for VANET
Zhang Jianhong, Xu Min, and Liu Liying, Vol. 16, No. 5, 2014, pp. 355-362
Article Full Text PDF

5. Exploring LSB Substitution and Pixel-value Differencing for Block-based Adaptive Data Hiding
Yuan-Yu Tsai, Jian-Ting Chen, and Chi-Shiang Chan, Vol. 16, No. 5, 2014, pp. 363-368
Article Full Text PDF

6. On the Security of Moessner’s and Khan’s Authentication Scheme for Passive EPCglobal C1G2 RFID Tags
Walid Khedr, Vol. 16, No. 5, 2014, pp. 369-375
Article Full Text PDF

7. The Impact of Resource Consumption Attack on Mobile Ad-hoc Network Routing
Maha Abdelhaq, Raed Alsaqour, Mohammed Al-Hubaishi, Tariq Alahdal, and Mueen Uddin, Vol. 16, No. 5, 2014, pp. 376-381
Article Full Text PDF

8. A Regular Expression Matching Approach to Distributed Wireless Network Security System
Jie Wang, Yanshuo Yu, and Kuanjiu Zhou, Vol. 16, No. 5, 2014, pp. 382-388
Article Full Text PDF

9. Comments and Proofs to Published Paper - A Novel Reversible Robust Watermarking Algorithm Based on a Chaotic System
Chi-Hsien Lin, K. Bharanitharan, and Chin-Chen Chang, Vol. 16, No. 5, 2014, pp. 389-392
Article Full Text PDF

10. Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol
Debiao He, Yuanyuan Zhang, and Jianhua Chen, Vol. 16, No. 5, 2014, pp. 393-396
Article Full Text PDF

11. Comments on FHH Anonymous Multireceiver Encryption
Zhenhua Chen, Shundong Li, Chunzhi Wang, and Mingwu Zhang, Vol. 16, No. 5, 2014, pp. 397-400
Article Full Text PDF