Quick Search:

Volume: 17, No: 1 (January 1, 2015)

International Journal of Network Security

1. Improving Security of A Communication-efficient Three-party Password Authentication Key Exchange Protocol
Cheng-Chi Lee, Shih-Ting Chiu, and Chun-Ta Li, Vol. 17, No. 1, 2015, pp. 1-6
Article Full Text PDF

2. Energy-Efficient Security for Voice over IP
Hoseb M. Dermanilian, Farah Saab, Imad H. Elhajj, Ayman Kayssi, and Ali Chehab, Vol. 17, No. 1, 2015, pp. 7-22
Article Full Text PDF

3. Ciphertext-Auditable Identity-Based Encryption
Changlu Lin, Yong Li, Kewei Lv, and Chin-Chen Chang, Vol. 17, No. 1, 2015, pp. 23-28
Article Full Text PDF

4. Notes on Proxy Signcryption and Multi-proxy Signature Schemes
Chunhua Pan, Shunpeng Li, Qihui Zhu, Chunzhi Wang, and Mingwu Zhang, Vol. 17, No. 1, 2015, pp. 29-33
Article Full Text PDF

5. Highly Secure Network Switches with Quantum Key Distribution Systems
Mikio Fujiwara, Tomoyasu Domeki, Shiho Moriai, and Masahide Sasaki, Vol. 17, No. 1, 2015, pp. 34-39
Article Full Text PDF

6. Convertible Multi-authenticated Encryption Scheme for Data Communication
Hui-Feng Huang, Pin-Han Lin, and Min-Hsuan Tsai, Vol. 17, No. 1, 2015, pp. 40-48
Article Full Text PDF

7. Simulation Study of a Many-to-One Mapping for IPv6 Address Owner Identification in an Enterprise Local Area Network
Nashrul Hakiem, Mohammad Umar Siddiqi, and Hashum Mohamed Rafiq, Vol. 17, No. 1, 2015, pp. 49-56
Article Full Text PDF

8. Semi Random Position Based Steganography for Resisting Statistical Steganalysis
Amitava Nag, Sushanta Biswas, Debasree Sarkar, and ParthaPratim Sarkar, Vol. 17, No. 1, 2015, pp. 57-65
Article Full Text PDF

9. Automated Analysis of Internet Key Exchange Protocol v2 for Denial of Service Attacks
Hasmukh Patel and Devesh C. Jinwala, Vol. 17, No. 1, 2015, pp. 66-71
Article Full Text PDF

10. Energy Characterization of a Security Module in ARM Processor
Felipe dos Anjos Lima, Edward David Moreno, Dellano Oliveira D. dos Santos, and Wanderson Roger Azevedo Dias, Vol. 17, No. 1, 2015, pp. 72-78
Article Full Text PDF

11. An Efficient and Distortion-controllable Information Hiding Algorithm for 3D Polygonal Models with Adaptation
Yuan-Yu Tsai, Wen-Ching Huang, and Bo-Feng Peng, Vol. 17, No. 1, 2015, pp. 79-84
Article Full Text PDF

12. Unequal Protection Mechanism for Digital Speech Transmission Based on Turbo Codes
Boqing Xu, Qun Xiao, Zhenxing Qian, and Chuan Qin, Vol. 17, No. 1, 2015, pp. 85-93
Article Full Text PDF

13. Mitigating Key Escrow in Attribute-based Encryption
Yongtao Wang, Xiaonan Liu, Lulu Liang, Weiduan Feng, and Guang Yang, Vol. 17, No. 1, 2015, pp. 94-102
Article Full Text PDF