Quick Search:

Volume: 17, No: 2 (March 1, 2015)

International Journal of Network Security

1. Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme
Zhengjun Cao and Hanyue Cao, Vol. 17, No. 2, 2015, pp. 103-109
Article Full Text PDF

2. Revocable Identity-based Signcryption Scheme Without Random Oracles
Xiangsong Zhang, Zhenhua Liu, Yupu Hu, Tsuyoshi Takagi, Vol. 17, No. 2, 2015, pp. 110-122
Article Full Text PDF

3. A Novel Proactive Multi-secret Sharing Scheme
Bin Feng, Cheng Guo, Mingchu Li, Zhi-Hui Wang, Vol. 17, No. 2, 2015, pp. 123-128
Article Full Text PDF

4. On the Security of a Provably Secure Certificate Based Ring Signature Without Pairing
Geng Ji, Xiong Hu, Qin Zhiguang, Li Fagen, Vol. 17, No. 2, 2015, pp. 129-134
Article Full Text PDF

5. Privacy-preserving Communication for VANETs with Conditionally Anonymous Ring Signature
Shengke Zeng, Yuan Huang, Xingwei Liu, Vol. 17, No. 2, 2015, pp. 135-141
Article Full Text PDF

6. Unidirectional Proxy Re-Encryption for Access Structure Transformation in Attribute-based Encryption Schemes
Xingbing Fu, Vol. 17, No. 2, 2015, pp. 142-149
Article Full Text PDF

7. Firewall Policy Diagram: Structures for Firewall Behavior Comprehension
Patrick G. Clark, Arvin Agah, Vol. 17, No. 2, 2015, pp. 150-159
Article Full Text PDF

8. Improvement on Timestamp-based User Authentication Scheme with Smart Card Lost Attack Resistance
Heri Wijayanto, Min-Shiang Hwang, Vol. 17, No. 2, 2015, pp. 160-164
Article Full Text PDF

9. A Novel Threshold Conference-Key Agreement Protocol Based on Generalized Chinese Remainder Theorem
Cheng Guo, Chin-Chen Chang, Vol. 17, No. 2, 2015, pp. 165-173
Article Full Text PDF

10. A Specification-based Intrusion Detection Framework for Cyber-physical Environment in Electric Power System
Shengyi Pan, Tommy Morris, Uttam Adhikari, Vol. 17, No. 2, 2015, pp. 174-188
Article Full Text PDF

11. An Auto-tuning Sanitizing System for Mitigating Injection Flaws
Jan Min Chen, Vol. 17, No. 2, 2015, pp. 189-198
Article Full Text PDF

12. Group Authentication and Group Key Distribution for Ad Hoc Networks
Feng Wang, Chin-Chen Chang, Yeh-Chieh Chou, Vol. 17, No. 2, 2015, pp. 199-207
Article Full Text PDF

13. Internet of Things: Hotspot-based Discovery Service Architecture with Security Mechanism
Degang Xu, Zhao Wu, Zhongbo Wu, Qilin Zhang, Leihua Qin, Jingli Zhou, Vol. 17, No. 2, 2015, pp. 208-216
Article Full Text PDF

14. Provably Secure Partially Blind Signature Scheme Based on Quadratic Residue
Yi Zhao, Qiliang Yang, Bo Yang, Vol. 17, No. 2, 2015, pp. 217-223
Article Full Text PDF

15. Cryptanalysis of Attribute-based Ring Signcryption Scheme
Hu Xiong, Ji Geng, Zhiguang Qin, and Guobin Zhu, Vol. 17, No. 2, 2015, pp. 224-228
Article Full Text PDF

16. Subject index to volume 17 (2015)
Article Full Text PDF

17. Author index to volume 17 (2015)
Article Full Text PDF

18. Reviewer index to volume 17 (2015)
Article Full Text PDF