Quick Search:

Volume: 17, No: 2 (March 1, 2015)

International Journal of Network Security

1. Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme
Zhengjun Cao and Hanyue Cao, Vol. 17, No. 2, 2015, pp. 103-109
Article Full Text PDF

2. Revocable Identity-based Signcryption Scheme Without Random Oracles
Xiangsong Zhang, Zhenhua Liu, Yupu Hu, Tsuyoshi Takagi, Vol. 17, No. 2, 2015, pp. 110-122
Article Full Text PDF

3. A Novel Proactive Multi-secret Sharing Scheme
Bin Feng, Cheng Guo, Mingchu Li, Zhi-Hui Wang, Vol. 17, No. 2, 2015, pp. 123-128
Article Full Text PDF

4. On the Security of a Provably Secure Certificate Based Ring Signature Without Pairing
Geng Ji, Xiong Hu, Qin Zhiguang, Li Fagen, Vol. 17, No. 2, 2015, pp. 129-134
Article Full Text PDF

5. Privacy-preserving Communication for VANETs with Conditionally Anonymous Ring Signature
Shengke Zeng, Yuan Huang, Xingwei Liu, Vol. 17, No. 2, 2015, pp. 135-141
Article Full Text PDF

6. Unidirectional Proxy Re-Encryption for Access Structure Transformation in Attribute-based Encryption Schemes
Xingbing Fu, Vol. 17, No. 2, 2015, pp. 142-149
Article Full Text PDF

7. Firewall Policy Diagram: Structures for Firewall Behavior Comprehension
Patrick G. Clark, Arvin Agah, Vol. 17, No. 2, 2015, pp. 150-159
Article Full Text PDF

8. Improvement on Timestamp-based User Authentication Scheme with Smart Card Lost Attack Resistance
Heri Wijayanto, Min-Shiang Hwang, Vol. 17, No. 2, 2015, pp. 160-164
Article Full Text PDF

9. A Novel Threshold Conference-Key Agreement Protocol Based on Generalized Chinese Remainder Theorem
Cheng Guo, Chin-Chen Chang, Vol. 17, No. 2, 2015, pp. 165-173
Article Full Text PDF

10. A Specification-based Intrusion Detection Framework for Cyber-physical Environment in Electric Power System
Shengyi Pan, Tommy Morris, Uttam Adhikari, Vol. 17, No. 2, 2015, pp. 174-188
Article Full Text PDF

11. An Auto-tuning Sanitizing System for Mitigating Injection Flaws
Jan Min Chen, Vol. 17, No. 2, 2015, pp. 189-198
Article Full Text PDF

12. Group Authentication and Group Key Distribution for Ad Hoc Networks
Feng Wang, Chin-Chen Chang, Yeh-Chieh Chou, Vol. 17, No. 2, 2015, pp. 199-207
Article Full Text PDF

13. Internet of Things: Hotspot-based Discovery Service Architecture with Security Mechanism
Degang Xu, Zhao Wu, Zhongbo Wu, Qilin Zhang, Leihua Qin, Jingli Zhou, Vol. 17, No. 2, 2015, pp. 208-216
Article Full Text PDF

14. Provably Secure Partially Blind Signature Scheme Based on Quadratic Residue
Yi Zhao, Qiliang Yang, Bo Yang, Vol. 17, No. 2, 2015, pp. 217-223
Article Full Text PDF

15. Cryptanalysis of Attribute-based Ring Signcryption Scheme
Hu Xiong, Ji Geng, Zhiguang Qin, and Guobin Zhu, Vol. 17, No. 2, 2015, pp. 224-228
Article Full Text PDF