International Journal of Network Security | ||
1. | Group Rekeying in Wireless Sensor Networks: A Survey
|
|
Wei Teng Li, Chung-Huei Ling, and Min-Shiang Hwang, Vol. 16, No. 6, 2014, pp. 401-410 Article Full Text PDF |
||
2. | Generalized Secret Sharing with Linear Hierarchical Secrets
|
|
Xi Chen, Yun Liu, Chin-Chen Chang, and Cheng Guo, Vol. 16, No. 6, 2014, pp. 411-419 Article Full Text PDF |
||
3. | Weighted Secret Sharing Based on the Chinese Remainder Theorem
|
|
Lein Harn and Fuyou Miao, Vol. 16, No. 6, 2014, pp. 420-425 Article Full Text PDF |
||
4. | A New Key Agreement Scheme Based on the Triple Decomposition Problem
|
|
Yesem Kurt Peker, Vol. 16, No. 6, 2014, pp. 426-436 Article Full Text PDF |
||
5. | Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data
|
|
Ximeng Liu, Jianfeng Ma, Jinbo Xiong, and Guangjun Liu, Vol. 16, No. 6, 2014, pp. 437-443 Article Full Text PDF |
||
6. | Lattice Ciphertext Policy Attribute-based Encryption in the Standard Model
|
|
Yongtao Wang, Vol. 16, No. 6, 2014, pp. 444-451 Article Full Text PDF |
||
7. | Improved LSB based Steganography Techniques for Color Images in Spatial Domain
|
|
Mamta Juneja and Parvinder Singh Sandhu, Vol. 16, No. 6, 2014, pp. 452-462 Article Full Text PDF |
||
8. | Enhancement of Timestamp-based User Authentication Scheme with Smart Card
|
|
Hui-Feng Huang, Hong-Wei Chang, and Po-Kai Yu, Vol. 16, No. 6, 2014, pp. 463-467 Article Full Text PDF |
||
9. | Quickest Detection of Denial-of-Service Attacks in Cognitive Wireless Networks
|
|
CaLynna Sorrells and Lijun Qian, Vol. 16, No. 6, 2014, pp. 468-476 Article Full Text PDF |
||
10. | Automatic Analysis and Classification of Obfuscated Bot Binaries
|
|
Ying-Dar Lin, Yi-Ta Chiang, Yu-Sung Wu, and Yuan-Cheng Lai, Vol. 16, No. 6, 2014, pp. 477-486 Article Full Text PDF |
||
11. | An Adaptable (n, n) Secret Image Sharing Mechanism Based on Boolean Operation
|
|
Zhi-Hui Wang, Haibo Jin, Xuebo Wang, and Chin-Chen Chang, Vol. 16, No. 6, 2014, pp. 487-493 Article Full Text PDF |
||
12. | Cryptanalysis of a New Efficient Authenticated Multiple-Key Exchange Protocol from Bilinear Pairings
|
|
Qingfeng Cheng, Vol. 16, No. 6, 2014, pp. 494-497 Article Full Text PDF |
||
13. | Two Simple Attacks on a Blind Signature Scheme
|
|
Miaomiao Tian, Youwen Zhu, and Zhili Chen, Vol. 16, No. 6, 2014, pp. 498-500 Article Full Text PDF |
||
14. | Reviewer index to volume 16 (2014)
|
|
Article Full Text PDF | ||