International Journal of Network Security | ||
1. | Distributed Detecting Node Replication Attacks in Wireless Sensor Networks: A Survey
|
|
Wei Teng Li, Tung-Huang Feng, and Min-Shiang Hwang, Vol. 16, No. 5, 2014, pp. 323-330 Article Full Text PDF |
||
2. | Privacy-enhanced Designated Confirmer Signature without Random Oracles
|
|
Shengke Zeng and Hu Xiong, Vol. 16, No. 5, 2014, pp. 331-339 Article Full Text PDF |
||
3. | Penny: Secure, Decentralized Data Management
|
|
Safwan Mahmud Khan and Kevin W. Hamlen, Vol. 16, No. 5, 2014, pp. 340-354 Article Full Text PDF |
||
4. | On the Security of a Secure Batch Verification with Group Testing for VANET
|
|
Zhang Jianhong, Xu Min, and Liu Liying, Vol. 16, No. 5, 2014, pp. 355-362 Article Full Text PDF |
||
5. | Exploring LSB Substitution and Pixel-value Differencing for Block-based Adaptive Data Hiding
|
|
Yuan-Yu Tsai, Jian-Ting Chen, and Chi-Shiang Chan, Vol. 16, No. 5, 2014, pp. 363-368 Article Full Text PDF |
||
6. | On the Security of Moessner’s and Khan’s Authentication Scheme for Passive EPCglobal C1G2 RFID Tags
|
|
Walid Khedr, Vol. 16, No. 5, 2014, pp. 369-375 Article Full Text PDF |
||
7. | The Impact of Resource Consumption Attack on Mobile Ad-hoc Network Routing
|
|
Maha Abdelhaq, Raed Alsaqour, Mohammed Al-Hubaishi, Tariq Alahdal, and Mueen Uddin, Vol. 16, No. 5, 2014, pp. 376-381 Article Full Text PDF |
||
8. | A Regular Expression Matching Approach to Distributed Wireless Network Security System
|
|
Jie Wang, Yanshuo Yu, and Kuanjiu Zhou, Vol. 16, No. 5, 2014, pp. 382-388 Article Full Text PDF |
||
9. | Comments and Proofs to Published Paper - A Novel Reversible Robust Watermarking Algorithm Based on a Chaotic System
|
|
Chi-Hsien Lin, K. Bharanitharan, and Chin-Chen Chang, Vol. 16, No. 5, 2014, pp. 389-392 Article Full Text PDF |
||
10. | Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol
|
|
Debiao He, Yuanyuan Zhang, and Jianhua Chen, Vol. 16, No. 5, 2014, pp. 393-396 Article Full Text PDF |
||
11. | Comments on FHH Anonymous Multireceiver Encryption
|
|
Zhenhua Chen, Shundong Li, Chunzhi Wang, and Mingwu Zhang, Vol. 16, No. 5, 2014, pp. 397-400 Article Full Text PDF |
||