Quick Search:

Volume: 17, No: 3 (May 1, 2015)

International Journal of Network Security

1. A False Data Report Filtering Scheme in Wireless Sensor Networks: A Survey
Tung-Huang Feng, Wei Teng Li, and Min-Shiang Hwang, Vol. 17, No. 3, 2015, pp. 229-236
Article Full Text PDF

2. A Secure Anonymous Authentication Scheme for Wireless Communications Using Smart Cards
Yanrong Lu, Xiaodong Yang, and Xiaobo Wu, Vol. 17, No. 3, 2015, pp. 237-245
Article Full Text PDF

3. Self-verifiable Secret Sharing Scheme with Locatability for Halftone Images
YI-Hui Chen, Panyaporn Prangjarote, and Chih-Yang Lin, Vol. 17, No. 3, 2015, pp. 246-250
Article Full Text PDF

4. A New Method for Computing DLP Based on Extending Smooth Numbers to Finite Field for Ephemeral Key Recovery
R. Padmavathy and Chakravarthy Bhagvati, Vol. 17, No. 3, 2015, pp. 251-262
Article Full Text PDF

5. A Fully Secure Attribute Based Broadcast Encryption Scheme
Qinyi Li and Fengli Zhang, Vol. 17, No. 3, 2015, pp. 263-271
Article Full Text PDF

6. A Survey on Botnet Architectures, Detection and Defences
Muhammad Mahmoud, Manjinder Nir, and Ashraf Matrawy, Vol. 17, No. 3, 2015, pp. 272-289
Article Full Text PDF

7. Efficient Compression-Jointed Quality Controllable Scrambling Method for H.264/SVC
Ci-Lin Li, Chih-Yang Lin, and Tzung-Her Chen, Vol. 17, No. 3, 2015, pp. 290-297
Article Full Text PDF

8. Improved RSM Algorithm Based on Ensemble Pruning for High-dimensional Steganalysis
Feng-Ying He, Tian-Shun Chen, and Shang-Ping Zhong, Vol. 17, No. 3, 2015, pp. 298-306
Article Full Text PDF

9. On the Security of a Forward-backward Secure Signature Scheme
Liangliang Wang, Xianping Mao, Kefei Chen, Yongtao Wang, Vol. 17, No. 3, 2015, pp. 307-310
Article Full Text PDF

10. An Investigation of the Merkle Signature Scheme for Cryptographically Generated Address Signatures in Mobile IPv6
Sana Qadir, Mohammad Umar Siddiqi, Wajdi Fawzi Mohammed Al-Khateeb, Vol. 17, No. 3, 2015, pp. 311-321
Article Full Text PDF

11. Digital Image Scrambling Algorithm Based on Chaotic Sequence and Decomposition and Recombination of Pixel Values
Dong Wang, Chin-Chen Chang, Yining Liu, Guoxiang Song, Yunbo Liu, Vol. 17, No. 3, 2015, pp. 322-327
Article Full Text PDF

12. An Efficient Approach for Privacy Preserving Distributed Clustering in Semi-honest Model Using Elliptic Curve Cryptography
Sankita J. Patel, Dharmen Punjani, and Devesh C. Jinwala, Vol. 17, No. 3, 2015, pp. 328-339
Article Full Text PDF

13. An Improved Multi-receiver Generalized Signcryption Scheme
Cai-Xue Zhou, Vol. 17, No. 3, 2015, pp. 340-350
Article Full Text PDF

14. The Optimization Research of the Multimedia Packets Processing Method in NIDS with 0/1 Knapsack Problem
Xu Zhao, Vol. 17, No. 3, 2015, pp. 351-356
Article Full Text PDF

15. An Authenticated Privacy-preseving Attribute Matchmakng Protocol for Mobile Social Networks
Solomon Sarpong, Chunxiang Xu, Xiaojun Zhang, Vol. 17, No. 3, 2015, pp. 357-364
Article Full Text PDF

16. Subject index to volume 17 (2015)
Article Full Text PDF

17. Author index to volume 17 (2015)
Article Full Text PDF

18. Reviewer index to volume 17 (2015)
Article Full Text PDF