| International Journal of Network Security | ||
| 1. | A False Data Report Filtering Scheme in Wireless Sensor Networks: A Survey
|
|
| Tung-Huang Feng, Wei Teng Li, and Min-Shiang Hwang, Vol. 17, No. 3, 2015, pp. 229-236 Article Full Text PDF |
||
| 2. | A Secure Anonymous Authentication Scheme for Wireless Communications Using Smart Cards
|
|
| Yanrong Lu, Xiaodong Yang, and Xiaobo Wu, Vol. 17, No. 3, 2015, pp. 237-245 Article Full Text PDF |
||
| 3. | Self-verifiable Secret Sharing Scheme with Locatability for Halftone Images
|
|
| YI-Hui Chen, Panyaporn Prangjarote, and Chih-Yang Lin, Vol. 17, No. 3, 2015, pp. 246-250 Article Full Text PDF |
||
| 4. | A New Method for Computing DLP Based on Extending Smooth Numbers to Finite Field for Ephemeral Key Recovery
|
|
| R. Padmavathy and Chakravarthy Bhagvati, Vol. 17, No. 3, 2015, pp. 251-262 Article Full Text PDF |
||
| 5. | A Fully Secure Attribute Based Broadcast Encryption Scheme
|
|
| Qinyi Li and Fengli Zhang, Vol. 17, No. 3, 2015, pp. 263-271 Article Full Text PDF |
||
| 6. | A Survey on Botnet Architectures, Detection and Defences
|
|
| Muhammad Mahmoud, Manjinder Nir, and Ashraf Matrawy, Vol. 17, No. 3, 2015, pp. 272-289 Article Full Text PDF |
||
| 7. | Efficient Compression-Jointed Quality Controllable Scrambling Method for H.264/SVC
|
|
| Ci-Lin Li, Chih-Yang Lin, and Tzung-Her Chen, Vol. 17, No. 3, 2015, pp. 290-297 Article Full Text PDF |
||
| 8. | Improved RSM Algorithm Based on Ensemble Pruning for High-dimensional Steganalysis
|
|
| Feng-Ying He, Tian-Shun Chen, and Shang-Ping Zhong, Vol. 17, No. 3, 2015, pp. 298-306 Article Full Text PDF |
||
| 9. | On the Security of a Forward-backward Secure Signature Scheme
|
|
| Liangliang Wang, Xianping Mao, Kefei Chen, Yongtao Wang, Vol. 17, No. 3, 2015, pp. 307-310 Article Full Text PDF |
||
| 10. | An Investigation of the Merkle Signature Scheme for Cryptographically Generated Address Signatures in Mobile IPv6
|
|
| Sana Qadir, Mohammad Umar Siddiqi, Wajdi Fawzi Mohammed Al-Khateeb, Vol. 17, No. 3, 2015, pp. 311-321 Article Full Text PDF |
||
| 11. | Digital Image Scrambling Algorithm Based on Chaotic Sequence and Decomposition and Recombination of Pixel Values
|
|
| Dong Wang, Chin-Chen Chang, Yining Liu, Guoxiang Song, Yunbo Liu, Vol. 17, No. 3, 2015, pp. 322-327 Article Full Text PDF |
||
| 12. | An Efficient Approach for Privacy Preserving Distributed Clustering in Semi-honest Model Using Elliptic Curve Cryptography
|
|
| Sankita J. Patel, Dharmen Punjani, and Devesh C. Jinwala, Vol. 17, No. 3, 2015, pp. 328-339 Article Full Text PDF |
||
| 13. | An Improved Multi-receiver Generalized Signcryption Scheme
|
|
| Cai-Xue Zhou, Vol. 17, No. 3, 2015, pp. 340-350 Article Full Text PDF |
||
| 14. | The Optimization Research of the Multimedia Packets Processing Method in NIDS with 0/1 Knapsack Problem
|
|
| Xu Zhao, Vol. 17, No. 3, 2015, pp. 351-356 Article Full Text PDF |
||
| 15. | An Authenticated Privacy-preseving Attribute Matchmakng Protocol for Mobile Social Networks
|
|
| Solomon Sarpong, Chunxiang Xu, Xiaojun Zhang, Vol. 17, No. 3, 2015, pp. 357-364 Article Full Text PDF |
||