Quick Search:

Volume: 16, No: 6 (November 1, 2014)

International Journal of Network Security

1. Group Rekeying in Wireless Sensor Networks: A Survey
Wei Teng Li, Chung-Huei Ling, and Min-Shiang Hwang, Vol. 16, No. 6, 2014, pp. 401-410
Article Full Text PDF

2. Generalized Secret Sharing with Linear Hierarchical Secrets
Xi Chen, Yun Liu, Chin-Chen Chang, and Cheng Guo, Vol. 16, No. 6, 2014, pp. 411-419
Article Full Text PDF

3. Weighted Secret Sharing Based on the Chinese Remainder Theorem
Lein Harn and Fuyou Miao, Vol. 16, No. 6, 2014, pp. 420-425
Article Full Text PDF

4. A New Key Agreement Scheme Based on the Triple Decomposition Problem
Yesem Kurt Peker, Vol. 16, No. 6, 2014, pp. 426-436
Article Full Text PDF

5. Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data
Ximeng Liu, Jianfeng Ma, Jinbo Xiong, and Guangjun Liu, Vol. 16, No. 6, 2014, pp. 437-443
Article Full Text PDF

6. Lattice Ciphertext Policy Attribute-based Encryption in the Standard Model
Yongtao Wang, Vol. 16, No. 6, 2014, pp. 444-451
Article Full Text PDF

7. Improved LSB based Steganography Techniques for Color Images in Spatial Domain
Mamta Juneja and Parvinder Singh Sandhu, Vol. 16, No. 6, 2014, pp. 452-462
Article Full Text PDF

8. Enhancement of Timestamp-based User Authentication Scheme with Smart Card
Hui-Feng Huang, Hong-Wei Chang, and Po-Kai Yu, Vol. 16, No. 6, 2014, pp. 463-467
Article Full Text PDF

9. Quickest Detection of Denial-of-Service Attacks in Cognitive Wireless Networks
CaLynna Sorrells and Lijun Qian, Vol. 16, No. 6, 2014, pp. 468-476
Article Full Text PDF

10. Automatic Analysis and Classification of Obfuscated Bot Binaries
Ying-Dar Lin, Yi-Ta Chiang, Yu-Sung Wu, and Yuan-Cheng Lai, Vol. 16, No. 6, 2014, pp. 477-486
Article Full Text PDF

11. An Adaptable (n, n) Secret Image Sharing Mechanism Based on Boolean Operation
Zhi-Hui Wang, Haibo Jin, Xuebo Wang, and Chin-Chen Chang, Vol. 16, No. 6, 2014, pp. 487-493
Article Full Text PDF

12. Cryptanalysis of a New Efficient Authenticated Multiple-Key Exchange Protocol from Bilinear Pairings
Qingfeng Cheng, Vol. 16, No. 6, 2014, pp. 494-497
Article Full Text PDF

13. Two Simple Attacks on a Blind Signature Scheme
Miaomiao Tian, Youwen Zhu, and Zhili Chen, Vol. 16, No. 6, 2014, pp. 498-500
Article Full Text PDF

14. Subject index to volume 16 (2014)
Article Full Text PDF

15. Author index to volume 16 (2014)
Article Full Text PDF

16. Reviewer index to volume 16 (2014)
Article Full Text PDF