| International Journal of Network Security | ||
| 1. | Group Rekeying in Wireless Sensor Networks: A Survey
|
|
| Wei Teng Li, Chung-Huei Ling, and Min-Shiang Hwang, Vol. 16, No. 6, 2014, pp. 401-410 Article Full Text PDF |
||
| 2. | Generalized Secret Sharing with Linear Hierarchical Secrets
|
|
| Xi Chen, Yun Liu, Chin-Chen Chang, and Cheng Guo, Vol. 16, No. 6, 2014, pp. 411-419 Article Full Text PDF |
||
| 3. | Weighted Secret Sharing Based on the Chinese Remainder Theorem
|
|
| Lein Harn and Fuyou Miao, Vol. 16, No. 6, 2014, pp. 420-425 Article Full Text PDF |
||
| 4. | A New Key Agreement Scheme Based on the Triple Decomposition Problem
|
|
| Yesem Kurt Peker, Vol. 16, No. 6, 2014, pp. 426-436 Article Full Text PDF |
||
| 5. | Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data
|
|
| Ximeng Liu, Jianfeng Ma, Jinbo Xiong, and Guangjun Liu, Vol. 16, No. 6, 2014, pp. 437-443 Article Full Text PDF |
||
| 6. | Lattice Ciphertext Policy Attribute-based Encryption in the Standard Model
|
|
| Yongtao Wang, Vol. 16, No. 6, 2014, pp. 444-451 Article Full Text PDF |
||
| 7. | Improved LSB based Steganography Techniques for Color Images in Spatial Domain
|
|
| Mamta Juneja and Parvinder Singh Sandhu, Vol. 16, No. 6, 2014, pp. 452-462 Article Full Text PDF |
||
| 8. | Enhancement of Timestamp-based User Authentication Scheme with Smart Card
|
|
| Hui-Feng Huang, Hong-Wei Chang, and Po-Kai Yu, Vol. 16, No. 6, 2014, pp. 463-467 Article Full Text PDF |
||
| 9. | Quickest Detection of Denial-of-Service Attacks in Cognitive Wireless Networks
|
|
| CaLynna Sorrells and Lijun Qian, Vol. 16, No. 6, 2014, pp. 468-476 Article Full Text PDF |
||
| 10. | Automatic Analysis and Classification of Obfuscated Bot Binaries
|
|
| Ying-Dar Lin, Yi-Ta Chiang, Yu-Sung Wu, and Yuan-Cheng Lai, Vol. 16, No. 6, 2014, pp. 477-486 Article Full Text PDF |
||
| 11. | An Adaptable (n, n) Secret Image Sharing Mechanism Based on Boolean Operation
|
|
| Zhi-Hui Wang, Haibo Jin, Xuebo Wang, and Chin-Chen Chang, Vol. 16, No. 6, 2014, pp. 487-493 Article Full Text PDF |
||
| 12. | Cryptanalysis of a New Efficient Authenticated Multiple-Key Exchange Protocol from Bilinear Pairings
|
|
| Qingfeng Cheng, Vol. 16, No. 6, 2014, pp. 494-497 Article Full Text PDF |
||
| 13. | Two Simple Attacks on a Blind Signature Scheme
|
|
| Miaomiao Tian, Youwen Zhu, and Zhili Chen, Vol. 16, No. 6, 2014, pp. 498-500 Article Full Text PDF |
||
| 14. | Reviewer index to volume 16 (2014)
|
|
| Article Full Text PDF | ||