International Journal of Network Security  
1.  A False Data Report Filtering Scheme in Wireless Sensor Networks: A Survey


TungHuang Feng, Wei Teng Li, and MinShiang Hwang, Vol. 17, No. 3, 2015, pp. 229236 Article Full Text PDF 

2.  A Secure Anonymous Authentication Scheme for Wireless Communications Using Smart Cards


Yanrong Lu, Xiaodong Yang, and Xiaobo Wu, Vol. 17, No. 3, 2015, pp. 237245 Article Full Text PDF 

3.  Selfverifiable Secret Sharing Scheme with Locatability for Halftone Images


YIHui Chen, Panyaporn Prangjarote, and ChihYang Lin, Vol. 17, No. 3, 2015, pp. 246250 Article Full Text PDF 

4.  A New Method for Computing DLP Based on Extending Smooth Numbers to Finite Field for Ephemeral Key Recovery


R. Padmavathy and Chakravarthy Bhagvati, Vol. 17, No. 3, 2015, pp. 251262 Article Full Text PDF 

5.  A Fully Secure Attribute Based Broadcast Encryption Scheme


Qinyi Li and Fengli Zhang, Vol. 17, No. 3, 2015, pp. 263271 Article Full Text PDF 

6.  A Survey on Botnet Architectures, Detection and Defences


Muhammad Mahmoud, Manjinder Nir, and Ashraf Matrawy, Vol. 17, No. 3, 2015, pp. 272289 Article Full Text PDF 

7.  Efficient CompressionJointed Quality Controllable Scrambling Method for H.264/SVC


CiLin Li, ChihYang Lin, and TzungHer Chen, Vol. 17, No. 3, 2015, pp. 290297 Article Full Text PDF 

8.  Improved RSM Algorithm Based on Ensemble Pruning for Highdimensional Steganalysis


FengYing He, TianShun Chen, and ShangPing Zhong, Vol. 17, No. 3, 2015, pp. 298306 Article Full Text PDF 

9.  On the Security of a Forwardbackward Secure Signature Scheme


Liangliang Wang, Xianping Mao, Kefei Chen, Yongtao Wang, Vol. 17, No. 3, 2015, pp. 307310 Article Full Text PDF 

10.  An Investigation of the Merkle Signature Scheme for Cryptographically Generated Address Signatures in Mobile IPv6


Sana Qadir, Mohammad Umar Siddiqi, Wajdi Fawzi Mohammed AlKhateeb, Vol. 17, No. 3, 2015, pp. 311321 Article Full Text PDF 

11.  Digital Image Scrambling Algorithm Based on Chaotic Sequence and Decomposition and Recombination of Pixel Values


Dong Wang, ChinChen Chang, Yining Liu, Guoxiang Song, Yunbo Liu, Vol. 17, No. 3, 2015, pp. 322327 Article Full Text PDF 

12.  An Efficient Approach for Privacy Preserving Distributed Clustering in Semihonest Model Using Elliptic Curve Cryptography


Sankita J. Patel, Dharmen Punjani, and Devesh C. Jinwala, Vol. 17, No. 3, 2015, pp. 328339 Article Full Text PDF 

13.  An Improved Multireceiver Generalized Signcryption Scheme


CaiXue Zhou, Vol. 17, No. 3, 2015, pp. 340350 Article Full Text PDF 

14.  The Optimization Research of the Multimedia Packets Processing Method in NIDS with 0/1 Knapsack Problem


Xu Zhao, Vol. 17, No. 3, 2015, pp. 351356 Article Full Text PDF 

15.  An Authenticated Privacypreseving Attribute Matchmakng Protocol for Mobile Social Networks


Solomon Sarpong, Chunxiang Xu, Xiaojun Zhang, Vol. 17, No. 3, 2015, pp. 357364 Article Full Text PDF 
