International Journal of Network Security | ||
1. | Improving Security of A Communication-efficient Three-party Password Authentication Key Exchange Protocol
|
|
Cheng-Chi Lee, Shih-Ting Chiu, and Chun-Ta Li, Vol. 17, No. 1, 2015, pp. 1-6 Article Full Text PDF |
||
2. | Energy-Efficient Security for Voice over IP
|
|
Hoseb M. Dermanilian, Farah Saab, Imad H. Elhajj, Ayman Kayssi, and Ali Chehab, Vol. 17, No. 1, 2015, pp. 7-22 Article Full Text PDF |
||
3. | Ciphertext-Auditable Identity-Based Encryption
|
|
Changlu Lin, Yong Li, Kewei Lv, and Chin-Chen Chang, Vol. 17, No. 1, 2015, pp. 23-28 Article Full Text PDF |
||
4. | Notes on Proxy Signcryption and Multi-proxy Signature Schemes
|
|
Chunhua Pan, Shunpeng Li, Qihui Zhu, Chunzhi Wang, and Mingwu Zhang, Vol. 17, No. 1, 2015, pp. 29-33 Article Full Text PDF |
||
5. | Highly Secure Network Switches with Quantum Key Distribution Systems
|
|
Mikio Fujiwara, Tomoyasu Domeki, Shiho Moriai, and Masahide Sasaki, Vol. 17, No. 1, 2015, pp. 34-39 Article Full Text PDF |
||
6. | Convertible Multi-authenticated Encryption Scheme for Data Communication
|
|
Hui-Feng Huang, Pin-Han Lin, and Min-Hsuan Tsai, Vol. 17, No. 1, 2015, pp. 40-48 Article Full Text PDF |
||
7. | Simulation Study of a Many-to-One Mapping for IPv6 Address Owner Identification in an Enterprise Local Area Network
|
|
Nashrul Hakiem, Mohammad Umar Siddiqi, and Hashum Mohamed Rafiq, Vol. 17, No. 1, 2015, pp. 49-56 Article Full Text PDF |
||
8. | Semi Random Position Based Steganography for Resisting Statistical Steganalysis
|
|
Amitava Nag, Sushanta Biswas, Debasree Sarkar, and ParthaPratim Sarkar, Vol. 17, No. 1, 2015, pp. 57-65 Article Full Text PDF |
||
9. | Automated Analysis of Internet Key Exchange Protocol v2 for Denial of Service Attacks
|
|
Hasmukh Patel and Devesh C. Jinwala, Vol. 17, No. 1, 2015, pp. 66-71 Article Full Text PDF |
||
10. | Energy Characterization of a Security Module in ARM Processor
|
|
Felipe dos Anjos Lima, Edward David Moreno, Dellano Oliveira D. dos Santos, and Wanderson Roger Azevedo Dias, Vol. 17, No. 1, 2015, pp. 72-78 Article Full Text PDF |
||
11. | An Efficient and Distortion-controllable Information Hiding Algorithm for 3D Polygonal Models with Adaptation
|
|
Yuan-Yu Tsai, Wen-Ching Huang, and Bo-Feng Peng, Vol. 17, No. 1, 2015, pp. 79-84 Article Full Text PDF |
||
12. | Unequal Protection Mechanism for Digital Speech Transmission Based on Turbo Codes
|
|
Boqing Xu, Qun Xiao, Zhenxing Qian, and Chuan Qin, Vol. 17, No. 1, 2015, pp. 85-93 Article Full Text PDF |
||
13. | Mitigating Key Escrow in Attribute-based Encryption
|
|
Yongtao Wang, Xiaonan Liu, Lulu Liang, Weiduan Feng, and Guang Yang, Vol. 17, No. 1, 2015, pp. 94-102 Article Full Text PDF |
||