International Journal of Network Security | ||
1. | A False Data Report Filtering Scheme in Wireless Sensor Networks: A Survey
|
|
Tung-Huang Feng, Wei Teng Li, and Min-Shiang Hwang, Vol. 17, No. 3, 2015, pp. 229-236 Article Full Text PDF |
||
2. | A Secure Anonymous Authentication Scheme for Wireless Communications Using Smart Cards
|
|
Yanrong Lu, Xiaodong Yang, and Xiaobo Wu, Vol. 17, No. 3, 2015, pp. 237-245 Article Full Text PDF |
||
3. | Self-verifiable Secret Sharing Scheme with Locatability for Halftone Images
|
|
YI-Hui Chen, Panyaporn Prangjarote, and Chih-Yang Lin, Vol. 17, No. 3, 2015, pp. 246-250 Article Full Text PDF |
||
4. | A New Method for Computing DLP Based on Extending Smooth Numbers to Finite Field for Ephemeral Key Recovery
|
|
R. Padmavathy and Chakravarthy Bhagvati, Vol. 17, No. 3, 2015, pp. 251-262 Article Full Text PDF |
||
5. | A Fully Secure Attribute Based Broadcast Encryption Scheme
|
|
Qinyi Li and Fengli Zhang, Vol. 17, No. 3, 2015, pp. 263-271 Article Full Text PDF |
||
6. | A Survey on Botnet Architectures, Detection and Defences
|
|
Muhammad Mahmoud, Manjinder Nir, and Ashraf Matrawy, Vol. 17, No. 3, 2015, pp. 272-289 Article Full Text PDF |
||
7. | Efficient Compression-Jointed Quality Controllable Scrambling Method for H.264/SVC
|
|
Ci-Lin Li, Chih-Yang Lin, and Tzung-Her Chen, Vol. 17, No. 3, 2015, pp. 290-297 Article Full Text PDF |
||
8. | Improved RSM Algorithm Based on Ensemble Pruning for High-dimensional Steganalysis
|
|
Feng-Ying He, Tian-Shun Chen, and Shang-Ping Zhong, Vol. 17, No. 3, 2015, pp. 298-306 Article Full Text PDF |
||
9. | On the Security of a Forward-backward Secure Signature Scheme
|
|
Liangliang Wang, Xianping Mao, Kefei Chen, Yongtao Wang, Vol. 17, No. 3, 2015, pp. 307-310 Article Full Text PDF |
||
10. | An Investigation of the Merkle Signature Scheme for Cryptographically Generated Address Signatures in Mobile IPv6
|
|
Sana Qadir, Mohammad Umar Siddiqi, Wajdi Fawzi Mohammed Al-Khateeb, Vol. 17, No. 3, 2015, pp. 311-321 Article Full Text PDF |
||
11. | Digital Image Scrambling Algorithm Based on Chaotic Sequence and Decomposition and Recombination of Pixel Values
|
|
Dong Wang, Chin-Chen Chang, Yining Liu, Guoxiang Song, Yunbo Liu, Vol. 17, No. 3, 2015, pp. 322-327 Article Full Text PDF |
||
12. | An Efficient Approach for Privacy Preserving Distributed Clustering in Semi-honest Model Using Elliptic Curve Cryptography
|
|
Sankita J. Patel, Dharmen Punjani, and Devesh C. Jinwala, Vol. 17, No. 3, 2015, pp. 328-339 Article Full Text PDF |
||
13. | An Improved Multi-receiver Generalized Signcryption Scheme
|
|
Cai-Xue Zhou, Vol. 17, No. 3, 2015, pp. 340-350 Article Full Text PDF |
||
14. | The Optimization Research of the Multimedia Packets Processing Method in NIDS with 0/1 Knapsack Problem
|
|
Xu Zhao, Vol. 17, No. 3, 2015, pp. 351-356 Article Full Text PDF |
||
15. | An Authenticated Privacy-preseving Attribute Matchmakng Protocol for Mobile Social Networks
|
|
Solomon Sarpong, Chunxiang Xu, Xiaojun Zhang, Vol. 17, No. 3, 2015, pp. 357-364 Article Full Text PDF |
||