Quick Search:

Volume: 17, No: 3 (May 1, 2015)

International Journal of Network Security

1. A False Data Report Filtering Scheme in Wireless Sensor Networks: A Survey
Tung-Huang Feng, Wei Teng Li, and Min-Shiang Hwang, Vol. 17, No. 3, 2015, pp. 229-236
Article Full Text PDF

2. A Secure Anonymous Authentication Scheme for Wireless Communications Using Smart Cards
Yanrong Lu, Xiaodong Yang, and Xiaobo Wu, Vol. 17, No. 3, 2015, pp. 237-245
Article Full Text PDF

3. Self-verifiable Secret Sharing Scheme with Locatability for Halftone Images
YI-Hui Chen, Panyaporn Prangjarote, and Chih-Yang Lin, Vol. 17, No. 3, 2015, pp. 246-250
Article Full Text PDF

4. A New Method for Computing DLP Based on Extending Smooth Numbers to Finite Field for Ephemeral Key Recovery
R. Padmavathy and Chakravarthy Bhagvati, Vol. 17, No. 3, 2015, pp. 251-262
Article Full Text PDF

5. A Fully Secure Attribute Based Broadcast Encryption Scheme
Qinyi Li and Fengli Zhang, Vol. 17, No. 3, 2015, pp. 263-271
Article Full Text PDF

6. A Survey on Botnet Architectures, Detection and Defences
Muhammad Mahmoud, Manjinder Nir, and Ashraf Matrawy, Vol. 17, No. 3, 2015, pp. 272-289
Article Full Text PDF

7. Efficient Compression-Jointed Quality Controllable Scrambling Method for H.264/SVC
Ci-Lin Li, Chih-Yang Lin, and Tzung-Her Chen, Vol. 17, No. 3, 2015, pp. 290-297
Article Full Text PDF

8. Improved RSM Algorithm Based on Ensemble Pruning for High-dimensional Steganalysis
Feng-Ying He, Tian-Shun Chen, and Shang-Ping Zhong, Vol. 17, No. 3, 2015, pp. 298-306
Article Full Text PDF

9. On the Security of a Forward-backward Secure Signature Scheme
Liangliang Wang, Xianping Mao, Kefei Chen, Yongtao Wang, Vol. 17, No. 3, 2015, pp. 307-310
Article Full Text PDF

10. An Investigation of the Merkle Signature Scheme for Cryptographically Generated Address Signatures in Mobile IPv6
Sana Qadir, Mohammad Umar Siddiqi, Wajdi Fawzi Mohammed Al-Khateeb, Vol. 17, No. 3, 2015, pp. 311-321
Article Full Text PDF

11. Digital Image Scrambling Algorithm Based on Chaotic Sequence and Decomposition and Recombination of Pixel Values
Dong Wang, Chin-Chen Chang, Yining Liu, Guoxiang Song, Yunbo Liu, Vol. 17, No. 3, 2015, pp. 322-327
Article Full Text PDF

12. An Efficient Approach for Privacy Preserving Distributed Clustering in Semi-honest Model Using Elliptic Curve Cryptography
Sankita J. Patel, Dharmen Punjani, and Devesh C. Jinwala, Vol. 17, No. 3, 2015, pp. 328-339
Article Full Text PDF

13. An Improved Multi-receiver Generalized Signcryption Scheme
Cai-Xue Zhou, Vol. 17, No. 3, 2015, pp. 340-350
Article Full Text PDF

14. The Optimization Research of the Multimedia Packets Processing Method in NIDS with 0/1 Knapsack Problem
Xu Zhao, Vol. 17, No. 3, 2015, pp. 351-356
Article Full Text PDF

15. An Authenticated Privacy-preseving Attribute Matchmakng Protocol for Mobile Social Networks
Solomon Sarpong, Chunxiang Xu, Xiaojun Zhang, Vol. 17, No. 3, 2015, pp. 357-364
Article Full Text PDF