Quick Search:

Volume: 17, No: 4 (July 1, 2015)

International Journal of Network Security

1. Secure and Self-healing Control Centers of Critical Infrastructures using Intrusion Tolerance
Maryam Tanha, Fazirulhisyam Hashim, Shamala Subramaniam, Vol. 17, No. 4, 2015, pp. 365-382
Article Full Text PDF

2. Ranking Intrusion Likelihoods with Exploitability of Network Vulnerabilities in a Large-Scale Attack Model
Rattikorn Hewett, Phongphun Kijsanayothin, Vol. 17, No. 4, 2015, pp. 383-394
Article Full Text PDF

3. A Novel Untraceable Authentication Scheme for Mobile Roaming in GLOMONET
Hai-Duong Le, Chin-Chen Chang, and Yeh-Chieh Chou, Vol. 17, No. 4, 2015, pp. 395-404
Article Full Text PDF

4. EA Based Dynamic Key Generation in RC4 Ciphering Applied to CMS
Ashraf Aboshosha, Kamal A. ElDahshan, Eman K. Elsayed, Ahmed A. Elngar, Vol. 17, No. 4, 2015, pp. 405-412
Article Full Text PDF

5. Improved RFID Authentication Protocol Based on Randomized McEliece Cryptosystem
Noureddine Chikouche, Foudil Cherif, Pierre-Louis Cayrel, Mohamed Benmohammed, Vol. 17, No. 4, 2015, pp. 413-422
Article Full Text PDF

6. Global Analysis of a SEIQV Epidemic Model for Scanning Worms with Quarantine Strategy
Fangwei Wang, Yong Yang, Yunkai Zhang, Jianfang Ma, Vol. 17, No. 4, 2015, pp. 423-430
Article Full Text PDF

7. The Secure Transaction Protocol in NFC Card Emulation Mode
Yi-Lun Chi, Cheng Hao Chen, Iuon-Chang Lin, Min-Shiang Hwang, Vol. 17, No. 4, 2015, pp. 431-438
Article Full Text PDF

8. Repairable Image Authentication Scheme
Yi-Hui Chen, Chih-Yang Lin, Wanutchaporn Sirakriengkrai, I-Chun Weng, Vol. 17, No. 4, 2015, pp. 439-444
Article Full Text PDF

9. A Study of Relationship between RSA Public Key Cryptosystem and Goldbach’s Conjecture Properties
Chenglian Liu, Chin-Chen Chang, Zhi-Pan Wu, Shi-Lin Ye, Vol. 17, No. 4, 2015, pp. 445-453
Article Full Text PDF

10. Improvement of Green-Hohenberger Adaptive Oblivious Transfer: A Review
Zhengjun Cao, Lihua Liu, Vol. 17, No. 4, 2015, pp. 454-462
Article Full Text PDF

11. An Efficient Batch Verifying Scheme for Detecting Illegal Signatures
Yanli Ren, Shuozhong Wang, Xinpeng Zhang, Min-Shiang Hwang, Vol. 17, No. 4, 2015, pp. 463-470
Article Full Text PDF

12. Fault-tolerant Verifiable Keyword Symmetric Searchable Encryption in Hybrid Cloud
Jie Wang, Xiao Yu, and Ming Zhao, Vol. 17, No. 4, 2015, pp. 471-483
Article Full Text PDF

13. Cryptanalysis of Key Exchange method in Wireless Communication
Arindam Sarkar, Jyotsna Kumar Mandal, Vol. 17, No. 4, 2015, pp. 484-493
Article Full Text PDF

14. Security Analysis of a Pairing-free Identity-based Authenticated Group Key Agreement Protocol for Imbalanced Mobile Networks
Qingfeng Cheng, Vol. 17, No. 4, 2015, pp. 494-496
Article Full Text PDF