International Journal of Network Security | ||
1. | Secure and Self-healing Control Centers of Critical Infrastructures using Intrusion Tolerance
|
|
Maryam Tanha, Fazirulhisyam Hashim, Shamala Subramaniam, Vol. 17, No. 4, 2015, pp. 365-382 Article Full Text PDF |
||
2. | Ranking Intrusion Likelihoods with Exploitability of Network Vulnerabilities in a Large-Scale Attack Model
|
|
Rattikorn Hewett, Phongphun Kijsanayothin, Vol. 17, No. 4, 2015, pp. 383-394 Article Full Text PDF |
||
3. | A Novel Untraceable Authentication Scheme for Mobile Roaming in GLOMONET
|
|
Hai-Duong Le, Chin-Chen Chang, and Yeh-Chieh Chou, Vol. 17, No. 4, 2015, pp. 395-404 Article Full Text PDF |
||
4. | EA Based Dynamic Key Generation in RC4 Ciphering Applied to CMS
|
|
Ashraf Aboshosha, Kamal A. ElDahshan, Eman K. Elsayed, Ahmed A. Elngar, Vol. 17, No. 4, 2015, pp. 405-412 Article Full Text PDF |
||
5. | Improved RFID Authentication Protocol Based on Randomized McEliece Cryptosystem
|
|
Noureddine Chikouche, Foudil Cherif, Pierre-Louis Cayrel, Mohamed Benmohammed, Vol. 17, No. 4, 2015, pp. 413-422 Article Full Text PDF |
||
6. | Global Analysis of a SEIQV Epidemic Model for Scanning Worms with Quarantine Strategy
|
|
Fangwei Wang, Yong Yang, Yunkai Zhang, Jianfang Ma, Vol. 17, No. 4, 2015, pp. 423-430 Article Full Text PDF |
||
7. | The Secure Transaction Protocol in NFC Card Emulation Mode
|
|
Yi-Lun Chi, Cheng Hao Chen, Iuon-Chang Lin, Min-Shiang Hwang, Vol. 17, No. 4, 2015, pp. 431-438 Article Full Text PDF |
||
8. | Repairable Image Authentication Scheme
|
|
Yi-Hui Chen, Chih-Yang Lin, Wanutchaporn Sirakriengkrai, I-Chun Weng, Vol. 17, No. 4, 2015, pp. 439-444 Article Full Text PDF |
||
9. | A Study of Relationship between RSA Public Key Cryptosystem and Goldbach’s Conjecture Properties
|
|
Chenglian Liu, Chin-Chen Chang, Zhi-Pan Wu, Shi-Lin Ye, Vol. 17, No. 4, 2015, pp. 445-453 Article Full Text PDF |
||
10. | Improvement of Green-Hohenberger Adaptive Oblivious Transfer: A Review
|
|
Zhengjun Cao, Lihua Liu, Vol. 17, No. 4, 2015, pp. 454-462 Article Full Text PDF |
||
11. | An Efficient Batch Verifying Scheme for Detecting Illegal Signatures
|
|
Yanli Ren, Shuozhong Wang, Xinpeng Zhang, Min-Shiang Hwang, Vol. 17, No. 4, 2015, pp. 463-470 Article Full Text PDF |
||
12. | Fault-tolerant Verifiable Keyword Symmetric Searchable Encryption in Hybrid Cloud
|
|
Jie Wang, Xiao Yu, and Ming Zhao, Vol. 17, No. 4, 2015, pp. 471-483 Article Full Text PDF |
||
13. | Cryptanalysis of Key Exchange method in Wireless Communication
|
|
Arindam Sarkar, Jyotsna Kumar Mandal, Vol. 17, No. 4, 2015, pp. 484-493 Article Full Text PDF |
||
14. | Security Analysis of a Pairing-free Identity-based Authenticated Group Key Agreement Protocol for Imbalanced Mobile Networks
|
|
Qingfeng Cheng, Vol. 17, No. 4, 2015, pp. 494-496 Article Full Text PDF |
||