| International Journal of Network Security | ||
| 1. | Secure and Self-healing Control Centers of Critical Infrastructures using Intrusion Tolerance
|
|
| Maryam Tanha, Fazirulhisyam Hashim, Shamala Subramaniam, Vol. 17, No. 4, 2015, pp. 365-382 Article Full Text PDF |
||
| 2. | Ranking Intrusion Likelihoods with Exploitability of Network Vulnerabilities in a Large-Scale Attack Model
|
|
| Rattikorn Hewett, Phongphun Kijsanayothin, Vol. 17, No. 4, 2015, pp. 383-394 Article Full Text PDF |
||
| 3. | A Novel Untraceable Authentication Scheme for Mobile Roaming in GLOMONET
|
|
| Hai-Duong Le, Chin-Chen Chang, and Yeh-Chieh Chou, Vol. 17, No. 4, 2015, pp. 395-404 Article Full Text PDF |
||
| 4. | EA Based Dynamic Key Generation in RC4 Ciphering Applied to CMS
|
|
| Ashraf Aboshosha, Kamal A. ElDahshan, Eman K. Elsayed, Ahmed A. Elngar, Vol. 17, No. 4, 2015, pp. 405-412 Article Full Text PDF |
||
| 5. | Improved RFID Authentication Protocol Based on Randomized McEliece Cryptosystem
|
|
| Noureddine Chikouche, Foudil Cherif, Pierre-Louis Cayrel, Mohamed Benmohammed, Vol. 17, No. 4, 2015, pp. 413-422 Article Full Text PDF |
||
| 6. | Global Analysis of a SEIQV Epidemic Model for Scanning Worms with Quarantine Strategy
|
|
| Fangwei Wang, Yong Yang, Yunkai Zhang, Jianfang Ma, Vol. 17, No. 4, 2015, pp. 423-430 Article Full Text PDF |
||
| 7. | The Secure Transaction Protocol in NFC Card Emulation Mode
|
|
| Yi-Lun Chi, Cheng Hao Chen, Iuon-Chang Lin, Min-Shiang Hwang, Vol. 17, No. 4, 2015, pp. 431-438 Article Full Text PDF |
||
| 8. | Repairable Image Authentication Scheme
|
|
| Yi-Hui Chen, Chih-Yang Lin, Wanutchaporn Sirakriengkrai, I-Chun Weng, Vol. 17, No. 4, 2015, pp. 439-444 Article Full Text PDF |
||
| 9. | A Study of Relationship between RSA Public Key Cryptosystem and Goldbach’s Conjecture Properties
|
|
| Chenglian Liu, Chin-Chen Chang, Zhi-Pan Wu, Shi-Lin Ye, Vol. 17, No. 4, 2015, pp. 445-453 Article Full Text PDF |
||
| 10. | Improvement of Green-Hohenberger Adaptive Oblivious Transfer: A Review
|
|
| Zhengjun Cao, Lihua Liu, Vol. 17, No. 4, 2015, pp. 454-462 Article Full Text PDF |
||
| 11. | An Efficient Batch Verifying Scheme for Detecting Illegal Signatures
|
|
| Yanli Ren, Shuozhong Wang, Xinpeng Zhang, Min-Shiang Hwang, Vol. 17, No. 4, 2015, pp. 463-470 Article Full Text PDF |
||
| 12. | Fault-tolerant Verifiable Keyword Symmetric Searchable Encryption in Hybrid Cloud
|
|
| Jie Wang, Xiao Yu, and Ming Zhao, Vol. 17, No. 4, 2015, pp. 471-483 Article Full Text PDF |
||
| 13. | Cryptanalysis of Key Exchange method in Wireless Communication
|
|
| Arindam Sarkar, Jyotsna Kumar Mandal, Vol. 17, No. 4, 2015, pp. 484-493 Article Full Text PDF |
||
| 14. | Security Analysis of a Pairing-free Identity-based Authenticated Group Key Agreement Protocol for Imbalanced Mobile Networks
|
|
| Qingfeng Cheng, Vol. 17, No. 4, 2015, pp. 494-496 Article Full Text PDF |
||