Quick Search:

Volume: 16, No: 5 (September 1, 2014)

International Journal of Network Security

1. Distributed Detecting Node Replication Attacks in Wireless Sensor Networks: A Survey
Wei Teng Li, Tung-Huang Feng, and Min-Shiang Hwang, Vol. 16, No. 5, 2014, pp. 323-330
Article Full Text PDF

2. Privacy-enhanced Designated Confirmer Signature without Random Oracles
Shengke Zeng and Hu Xiong, Vol. 16, No. 5, 2014, pp. 331-339
Article Full Text PDF

3. Penny: Secure, Decentralized Data Management
Safwan Mahmud Khan and Kevin W. Hamlen, Vol. 16, No. 5, 2014, pp. 340-354
Article Full Text PDF

4. On the Security of a Secure Batch Verification with Group Testing for VANET
Zhang Jianhong, Xu Min, and Liu Liying, Vol. 16, No. 5, 2014, pp. 355-362
Article Full Text PDF

5. Exploring LSB Substitution and Pixel-value Differencing for Block-based Adaptive Data Hiding
Yuan-Yu Tsai, Jian-Ting Chen, and Chi-Shiang Chan, Vol. 16, No. 5, 2014, pp. 363-368
Article Full Text PDF

6. On the Security of Moessner’s and Khan’s Authentication Scheme for Passive EPCglobal C1G2 RFID Tags
Walid Khedr, Vol. 16, No. 5, 2014, pp. 369-375
Article Full Text PDF

7. The Impact of Resource Consumption Attack on Mobile Ad-hoc Network Routing
Maha Abdelhaq, Raed Alsaqour, Mohammed Al-Hubaishi, Tariq Alahdal, and Mueen Uddin, Vol. 16, No. 5, 2014, pp. 376-381
Article Full Text PDF

8. A Regular Expression Matching Approach to Distributed Wireless Network Security System
Jie Wang, Yanshuo Yu, and Kuanjiu Zhou, Vol. 16, No. 5, 2014, pp. 382-388
Article Full Text PDF

9. Comments and Proofs to Published Paper - A Novel Reversible Robust Watermarking Algorithm Based on a Chaotic System
Chi-Hsien Lin, K. Bharanitharan, and Chin-Chen Chang, Vol. 16, No. 5, 2014, pp. 389-392
Article Full Text PDF

10. Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol
Debiao He, Yuanyuan Zhang, and Jianhua Chen, Vol. 16, No. 5, 2014, pp. 393-396
Article Full Text PDF

11. Comments on FHH Anonymous Multireceiver Encryption
Zhenhua Chen, Shundong Li, Chunzhi Wang, and Mingwu Zhang, Vol. 16, No. 5, 2014, pp. 397-400
Article Full Text PDF

12. Subject index to volume 16 (2014)
Article Full Text PDF

13. Author index to volume 16 (2014)
Article Full Text PDF

14. Reviewer index to volume 16 (2014)
Article Full Text PDF