Quick Search:

Volume: 16, No: 6 (November 1, 2014)

International Journal of Network Security

1. Group Rekeying in Wireless Sensor Networks: A Survey
Wei Teng Li, Chung-Huei Ling, and Min-Shiang Hwang, Vol. 16, No. 6, 2014, pp. 401-410
Article Full Text PDF

2. Generalized Secret Sharing with Linear Hierarchical Secrets
Xi Chen, Yun Liu, Chin-Chen Chang, and Cheng Guo, Vol. 16, No. 6, 2014, pp. 411-419
Article Full Text PDF

3. Weighted Secret Sharing Based on the Chinese Remainder Theorem
Lein Harn and Fuyou Miao, Vol. 16, No. 6, 2014, pp. 420-425
Article Full Text PDF

4. A New Key Agreement Scheme Based on the Triple Decomposition Problem
Yesem Kurt Peker, Vol. 16, No. 6, 2014, pp. 426-436
Article Full Text PDF

5. Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data
Ximeng Liu, Jianfeng Ma, Jinbo Xiong, and Guangjun Liu, Vol. 16, No. 6, 2014, pp. 437-443
Article Full Text PDF

6. Lattice Ciphertext Policy Attribute-based Encryption in the Standard Model
Yongtao Wang, Vol. 16, No. 6, 2014, pp. 444-451
Article Full Text PDF

7. Improved LSB based Steganography Techniques for Color Images in Spatial Domain
Mamta Juneja and Parvinder Singh Sandhu, Vol. 16, No. 6, 2014, pp. 452-462
Article Full Text PDF

8. Enhancement of Timestamp-based User Authentication Scheme with Smart Card
Hui-Feng Huang, Hong-Wei Chang, and Po-Kai Yu, Vol. 16, No. 6, 2014, pp. 463-467
Article Full Text PDF

9. Quickest Detection of Denial-of-Service Attacks in Cognitive Wireless Networks
CaLynna Sorrells and Lijun Qian, Vol. 16, No. 6, 2014, pp. 468-476
Article Full Text PDF

10. Automatic Analysis and Classification of Obfuscated Bot Binaries
Ying-Dar Lin, Yi-Ta Chiang, Yu-Sung Wu, and Yuan-Cheng Lai, Vol. 16, No. 6, 2014, pp. 477-486
Article Full Text PDF

11. An Adaptable (n, n) Secret Image Sharing Mechanism Based on Boolean Operation
Zhi-Hui Wang, Haibo Jin, Xuebo Wang, and Chin-Chen Chang, Vol. 16, No. 6, 2014, pp. 487-493
Article Full Text PDF

12. Cryptanalysis of a New Efficient Authenticated Multiple-Key Exchange Protocol from Bilinear Pairings
Qingfeng Cheng, Vol. 16, No. 6, 2014, pp. 494-497
Article Full Text PDF

13. Two Simple Attacks on a Blind Signature Scheme
Miaomiao Tian, Youwen Zhu, and Zhili Chen, Vol. 16, No. 6, 2014, pp. 498-500
Article Full Text PDF

14. Reviewer index to volume 16 (2014)
Article Full Text PDF