| International Journal of Network Security | ||
| 1. | Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme
|
|
| Zhengjun Cao and Hanyue Cao, Vol. 17, No. 2, 2015, pp. 103-109 Article Full Text PDF |
||
| 2. | Revocable Identity-based Signcryption Scheme Without Random Oracles
|
|
| Xiangsong Zhang, Zhenhua Liu, Yupu Hu, Tsuyoshi Takagi, Vol. 17, No. 2, 2015, pp. 110-122 Article Full Text PDF |
||
| 3. | A Novel Proactive Multi-secret Sharing Scheme
|
|
| Bin Feng, Cheng Guo, Mingchu Li, Zhi-Hui Wang, Vol. 17, No. 2, 2015, pp. 123-128 Article Full Text PDF |
||
| 4. | On the Security of a Provably Secure Certificate Based Ring Signature Without Pairing
|
|
| Geng Ji, Xiong Hu, Qin Zhiguang, Li Fagen, Vol. 17, No. 2, 2015, pp. 129-134 Article Full Text PDF |
||
| 5. | Privacy-preserving Communication for VANETs with Conditionally Anonymous Ring Signature
|
|
| Shengke Zeng, Yuan Huang, Xingwei Liu, Vol. 17, No. 2, 2015, pp. 135-141 Article Full Text PDF |
||
| 6. | Unidirectional Proxy Re-Encryption for Access Structure Transformation in Attribute-based Encryption Schemes
|
|
| Xingbing Fu, Vol. 17, No. 2, 2015, pp. 142-149 Article Full Text PDF |
||
| 7. | Firewall Policy Diagram: Structures for Firewall Behavior Comprehension
|
|
| Patrick G. Clark, Arvin Agah, Vol. 17, No. 2, 2015, pp. 150-159 Article Full Text PDF |
||
| 8. | Improvement on Timestamp-based User Authentication Scheme with Smart Card Lost Attack Resistance
|
|
| Heri Wijayanto, Min-Shiang Hwang, Vol. 17, No. 2, 2015, pp. 160-164 Article Full Text PDF |
||
| 9. | A Novel Threshold Conference-Key Agreement Protocol Based on Generalized Chinese Remainder Theorem
|
|
| Cheng Guo, Chin-Chen Chang, Vol. 17, No. 2, 2015, pp. 165-173 Article Full Text PDF |
||
| 10. | A Specification-based Intrusion Detection Framework for Cyber-physical Environment in Electric Power System
|
|
| Shengyi Pan, Tommy Morris, Uttam Adhikari, Vol. 17, No. 2, 2015, pp. 174-188 Article Full Text PDF |
||
| 11. | An Auto-tuning Sanitizing System for Mitigating Injection Flaws
|
|
| Jan Min Chen, Vol. 17, No. 2, 2015, pp. 189-198 Article Full Text PDF |
||
| 12. | Group Authentication and Group Key Distribution for Ad Hoc Networks
|
|
| Feng Wang, Chin-Chen Chang, Yeh-Chieh Chou, Vol. 17, No. 2, 2015, pp. 199-207 Article Full Text PDF |
||
| 13. | Internet of Things: Hotspot-based Discovery Service Architecture with Security Mechanism
|
|
| Degang Xu, Zhao Wu, Zhongbo Wu, Qilin Zhang, Leihua Qin, Jingli Zhou, Vol. 17, No. 2, 2015, pp. 208-216 Article Full Text PDF |
||
| 14. | Provably Secure Partially Blind Signature Scheme Based on Quadratic Residue
|
|
| Yi Zhao, Qiliang Yang, Bo Yang, Vol. 17, No. 2, 2015, pp. 217-223 Article Full Text PDF |
||
| 15. | Cryptanalysis of Attribute-based Ring Signcryption Scheme
|
|
| Hu Xiong, Ji Geng, Zhiguang Qin, and Guobin Zhu, Vol. 17, No. 2, 2015, pp. 224-228 Article Full Text PDF |
||