International Journal of Network Security | ||
1. | Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme
|
|
Zhengjun Cao and Hanyue Cao, Vol. 17, No. 2, 2015, pp. 103-109 Article Full Text PDF |
||
2. | Revocable Identity-based Signcryption Scheme Without Random Oracles
|
|
Xiangsong Zhang, Zhenhua Liu, Yupu Hu, Tsuyoshi Takagi, Vol. 17, No. 2, 2015, pp. 110-122 Article Full Text PDF |
||
3. | A Novel Proactive Multi-secret Sharing Scheme
|
|
Bin Feng, Cheng Guo, Mingchu Li, Zhi-Hui Wang, Vol. 17, No. 2, 2015, pp. 123-128 Article Full Text PDF |
||
4. | On the Security of a Provably Secure Certificate Based Ring Signature Without Pairing
|
|
Geng Ji, Xiong Hu, Qin Zhiguang, Li Fagen, Vol. 17, No. 2, 2015, pp. 129-134 Article Full Text PDF |
||
5. | Privacy-preserving Communication for VANETs with Conditionally Anonymous Ring Signature
|
|
Shengke Zeng, Yuan Huang, Xingwei Liu, Vol. 17, No. 2, 2015, pp. 135-141 Article Full Text PDF |
||
6. | Unidirectional Proxy Re-Encryption for Access Structure Transformation in Attribute-based Encryption Schemes
|
|
Xingbing Fu, Vol. 17, No. 2, 2015, pp. 142-149 Article Full Text PDF |
||
7. | Firewall Policy Diagram: Structures for Firewall Behavior Comprehension
|
|
Patrick G. Clark, Arvin Agah, Vol. 17, No. 2, 2015, pp. 150-159 Article Full Text PDF |
||
8. | Improvement on Timestamp-based User Authentication Scheme with Smart Card Lost Attack Resistance
|
|
Heri Wijayanto, Min-Shiang Hwang, Vol. 17, No. 2, 2015, pp. 160-164 Article Full Text PDF |
||
9. | A Novel Threshold Conference-Key Agreement Protocol Based on Generalized Chinese Remainder Theorem
|
|
Cheng Guo, Chin-Chen Chang, Vol. 17, No. 2, 2015, pp. 165-173 Article Full Text PDF |
||
10. | A Specification-based Intrusion Detection Framework for Cyber-physical Environment in Electric Power System
|
|
Shengyi Pan, Tommy Morris, Uttam Adhikari, Vol. 17, No. 2, 2015, pp. 174-188 Article Full Text PDF |
||
11. | An Auto-tuning Sanitizing System for Mitigating Injection Flaws
|
|
Jan Min Chen, Vol. 17, No. 2, 2015, pp. 189-198 Article Full Text PDF |
||
12. | Group Authentication and Group Key Distribution for Ad Hoc Networks
|
|
Feng Wang, Chin-Chen Chang, Yeh-Chieh Chou, Vol. 17, No. 2, 2015, pp. 199-207 Article Full Text PDF |
||
13. | Internet of Things: Hotspot-based Discovery Service Architecture with Security Mechanism
|
|
Degang Xu, Zhao Wu, Zhongbo Wu, Qilin Zhang, Leihua Qin, Jingli Zhou, Vol. 17, No. 2, 2015, pp. 208-216 Article Full Text PDF |
||
14. | Provably Secure Partially Blind Signature Scheme Based on Quadratic Residue
|
|
Yi Zhao, Qiliang Yang, Bo Yang, Vol. 17, No. 2, 2015, pp. 217-223 Article Full Text PDF |
||
15. | Cryptanalysis of Attribute-based Ring Signcryption Scheme
|
|
Hu Xiong, Ji Geng, Zhiguang Qin, and Guobin Zhu, Vol. 17, No. 2, 2015, pp. 224-228 Article Full Text PDF |
||