International Journal of Network Security | ||
1. | A Survey of Digital Evidences Forensic and Cybercrime Investigation Procedure
|
|
Jia-Rong Sun, Mao-Lin Shih, Min-Shiang Hwang, Vol. 17, No. 5, 2015, pp. 497-509 Article Full Text PDF |
||
2. | An Extended Identity Based Authenticated Asymmetric Group Key Agreement Protocol
|
|
Reddi Siva Ranjani, D. Lalitha Bhaskari, P. S. Avadhani, Vol. 17, No. 5, 2015, pp. 510-516 Article Full Text PDF |
||
3. | A Security Quantitative Analysis Method For Access Control Based on Security Entropy
|
|
Tian-Wei Che, Jian-Feng Ma, Na Li, Chao Wang, Vol. 17, No. 5, 2015, pp. 517-521 Article Full Text PDF |
||
4. | Adoption of a Fuzzy Based Classification Model for P2P Botnet Detection
|
|
Pijush Barthakur, Manoj Dahal, Mrinal Kanti Ghose, Vol. 17, No. 5, 2015, pp. 522-534 Article Full Text PDF |
||
5. | Analysing and Improving Performance and Security of Cryptographically Generated Address Algorithm for Mobile IPv6 Networks
|
|
Sana Qadir, Mohammad Umar Siddiqi, Wajdi F. M. Al-Khateeb, Vol. 17, No. 5, 2015, pp. 535-547 Article Full Text PDF |
||
6. | Provably-Secure Certificateless Key Encapsulation Mechanism for e-Healthcare System
|
|
Hui-Xian Shi, Rui Guo, Vol. 17, No. 5, 2015, pp. 548-557 Article Full Text PDF |
||
7. | A Study of DWT-SVD Based Multiple Watermarking Scheme for Medical Images
|
|
Natarajan Mohananthini and Govindarajan Yamuna, Vol. 17, No. 5, 2015, pp. 558-568 Article Full Text PDF |
||
8. | Leveraging P2P Interactions for Efficient Location Privacy in Database-driven Dynamic Spectrum Access
|
|
Erald Troja, Spiridon Bakiras, Vol. 17, No. 5, 2015, pp. 569-579 Article Full Text PDF |
||
9. | Provably Secure Identity-based Aggregate Signcryption Scheme in Random Oracles
|
|
Jayaprakash Kar, Vol. 17, No. 5, 2015, pp. 580-587 Article Full Text PDF |
||
10. | Elliptic Curve Based Dynamic Contributory Group Key Agreement Protocol for Secure Group Communication over Ad-hoc Networks
|
|
Vankamamidi Srinivasa Naresh and Nistala V.E.S. Murthy, Vol. 17, No. 5, 2015, pp. 588-596 Article Full Text PDF |
||
11. | An Improved Certificateless Signcryption in the Standard Model
|
|
Lin Cheng, Qiaoyan Wen, Vol. 17, No. 5, 2015, pp. 597-606 Article Full Text PDF |
||
12. | Adjustment Hiding Method Based on Exploiting Modification Direction
|
|
Chin-Feng Lee, Chin-Chen Chang, Pei-Yan Pai, Chia-Ming Liu , Vol. 17, No. 5, 2015, pp. 607-618 Article Full Text PDF |
||
13. | A Practical Forward-Secure Public-Key Encryption Scheme with Untrusted Update
|
|
Xiujie Zhang, Chunxiang Xu, Vol. 17, No. 5, 2015, pp. 619-628 Article Full Text PDF |
||
14. | Cryptanalysis of Two PAKE Protocols for Body Area Networks and Smart Environments
|
|
Mohsen Toorani, Vol. 17, No. 5, 2015, pp. 629-636 Article Full Text PDF |
||
15. | A Component Histogram Map Based Text Similarity Detection Algorithm
|
|
Huajun Huang, Shuang Pang, Qiong Deng, Jiaohua Qin, Vol. 17, No. 5, 2015, pp. 637-642 Article Full Text PDF |
||
16. | A Meaningful Scheme for Sharing Secret Images Using Mosaic Images
|
|
Shengyun Zhai, Fan Li, Chin-Chen Chang, Qian Mao, Vol. 17, No. 5, 2015, pp. 643-649 Article Full Text PDF |
||